Sajid Khan have 24+ years of diverse expertise and is a Versatile and highly innovative CISO, Cybersecurity Advisor , Cyber security architecture, design, Cyber security engineering teams, read and blue teams and implementation of security solutions and Expertise in risk management, cybersecurity strategy, and governance and Cloud Services, including Azure, and Google Cloud and security frameworks such as NIST, ISO 27001, CIS, and compliance standards and MSS, MSSP, MDR, and SOC delivery models and emerging cybersecurity technologies and industry trends, cybersecurity frameworks and standards, such as NIST, ISO 27001, and CIS Controls NIST RMF , MSSP, GRC , CSO, ICS, firewalls, intrusion detection and prevention systems, and security information and event management (SIEM) solutions cloud security protocols and best practices, particularly in environments such as AWS or Security Expert with 24+ years of diverse expertise in cutting-edge technologies and Cyber and Info Security, Security advisory services, security tools Anti-Virus, developing and deploying security signatures (YARA, Snort).HIPS, IDS/IPS, forensics, and SIEM platforms ArcSight, Splunk , (IT/Digital Transformations, Cloud -PaaS/SaaS/IaaS, EDR, SOC, Linux, business process re-engineering, mobile OS, VMware, and Unix commands and virtualization security , MSPP, Managed services , NCA ECC, SAMA CSF, ISO 27001:2013, ISO 9001 , HIPAA, HITECH, SOC 2 and NISTISO 27002 and NIST SP800-53r4 Security Controls, IT/OT, ICS SCADA Cyber Security, Office 365 Security, Office 365 Security, Endpoint Security, EDR. XDR. SOAR, ISA 99, ISO/IEC 62443, ISO 27001 ISMS, NIST, COBIT, AI/ML & data integration technologies, Data Centers, DR/BCP, Compute, Storage, Networking, security, Applications, across a wide variety of industry segments. Extensive experience in building sustainable decision-making digital IT infrastructure, Cyber Security and solutions at a global level and for Fortune500 commercial enterprises and leading system integrators in MEA region.
§ Responsible end to end cybersecuirty architecture , Cyber security engineering teams, read and blue teams and with a focus on architecture, design, and implementation of security solutions and cybersecurity frameworks and standards, such as NIST, ISO 27001, and CIS Controls of cyber security and information security , AI and AI security , managed Cloud security and managed Cyber and info and Cloud security, Firewalls, WAF, Web Security Gateways and EDR, PAM, ATP , GRC ISO 27001:2013, ISO 9001 , HIPAA, HITECH, SOC 2 and NISTISO 27002 and NIST SP800-53r4 Security Controls, 27001/2 ISMS process, ISO 27002 and NIST SP800-53r4 Security Controls for different customers.
§ NGN Firewalls, intrusion detection and prevention systems, and security information and event management (SIEM) solutions cloud security protocols and best practices, particularly in environments such as AWS or Azure
§ Expertise in risk management, cybersecurity strategy, and governance and Cloud Services, including Azure, and Google Cloud and security frameworks such as NIST, ISO 27001, CIS, and compliance standards and MSS, MSSP, MDR, and SOC delivery models and emerging cybersecurity technologies and industry trends.
. Project Planning & Execution:
I develop detailed project plans, outlining the scope, schedule, and resources required for the successful delivery of Cybersecurity projects and Programs for e& enterprise customers.
2. Cybersecurity Implementation:
I manage the deployment of cybersecurity solutions such as firewalls, intrusion detection systems, SIEM (Security Information and Event Management) solutions, vulnerability management tools, and endpoint protection.
3. Risk Assessment & Management:
I Identify, assess, and mitigate potential risks throughout the project lifecycle, ensuring that all implemented cybersecurity measures are aligned with the organization’s risk management framework.
4. Stakeholder Communication:
I serve as the primary point of contact between internal stakeholders, clients, and project teams. Ensure timely and effective communication on project status, milestones, risks, and deliverables.
5. Resource Management:
I coordinate and allocate resources, including cybersecurity specialists, network engineers, and third-party vendors, to ensure the successful completion of projects.
6. Compliance & Security Standards:
I ensure that all project deliverables adhere to relevant cybersecurity standards (e.g., NIST, ISO 27001, GDPR) and regulatory requirements. Implement best practices in security governance.
7. Project Documentation:
I Maintain accurate and comprehensive documentation, including project charters, risk assessments, security architecture designs, implementation guides, and post-project reviews.
8. Budget & Financial Oversight:
I Monitor project budgets and financial forecasts. Ensure project costs remain within agreed-upon limits while maximizing resource utilization.
9. Training & Knowledge Transfer:
I oversee knowledge transfer and provide training to IT and security teams on implemented cybersecurity solutions. Ensure a smooth transition to ongoing support.
10. Post-Implementation Review:
I conduct post-implementation audits and assessments to evaluate the effectiveness of deployed cybersecurity solutions and identify areas for improvement.
§ Responsible for managed Cyber security, security tools like Anti-Virus, HIPS, IDS/IPS, forensics, and SIEM platforms (e.g., ArcSight, Splunk).Cyber GRC, Audit and compliance ,ICS, Incident response, EDR Solutions, Splunk, EDR, Cybersecurity, Forensic & Integrity Services , SOC, Cyber and Application and info Security, NCA ECC, SAMA , CSF Cloud, IaaS, SaaS, and PaaS Platforms, Data centers and Applications , Cyber and info Cloud Cyber Security architecture and advisory services & Information technology domain and Cloud Cyber security Operations including Incident Response Management, Threat Management, developing Strategy, relevant process and developing cost effective methods to provide optimal level of security to Etisalat Valuable Healthcare, banking, finical, fintech and public sector Customers and core cyber security process ad methodologies to run the cyber security operations effectively to support business.
§ Responsible for to developing and implementing Cyber Security Documentation , identify security gaps, develop controls and design solutions.
§ Responsible for formulating and implementing strategies for technology risk assessments, GRC and management & compliance strategies aimed at facilitating business expansion and growth.
§ Responsible for pre sales of different security vendors solutions design, POC, respond to RFP, RFQ AND RFI
§ security solutions oracle, SailPoint, CyberArk, BeyondTrust
§ CheckMarx, Veracode, Rapid7, PaloAlto Prisma, Mcafee and Cisco, and IBM.
§ Responsible for Cloud Data security, Linux , Applications security, GRC and GDPR,SOC Type 1 and SOC Type 2, ISO ISMS 27001/2 ISMS, NIST, PCI-DSS-V3.
§ Responsible for architecture, operations and management of secure cloud environments for
§ Also leading development of EDR, CT Cloud Security Infrastructural, IP Networks, MSOC and Data Centers, DR/BCP, application Cyber and Info security and ICT security architecture policies, standards, principles, methods, processes and structures including developing patterns, common models and reusable architecture.
§ Responsible for formulating and managing and implementing ICT Cloud info and cyber security and ICT Security strategy and ICT security Road Map.
§ Responsible for Cyber Security & Information technology domain and Cyber security Operations including Incident Response Management, Threat Management, developing Strategy, relevant process and developing cost effective methods to provide optimal level of security to Etisalat Valuable banking, finical, fintech and public sector Customers and core cyber security process ad methodologies to run the cyber security operations effectively to support business.
§ Responsible for formulating and implementing strategies for technology risk assessments, GRC and management & compliance strategies aimed at facilitating business expansion and growth.
§ Responsible for Data security, GRC and GDPR, ISO ISMS 27001/2 ISMS, NIST, PCI-DSS-V3.
§ Also leading development of ICT Security Infrastructural, IP Networks, MSOC and Data Centers, DR/BCP, application Cyber and Info security and ICT security architecture policies, standards, principles, methods, processes and structures including developing patterns, common models and reusable architecture.
§ Responsible for formulating and managing and implementing ICT info and cyber security and ICT Security strategy and ICT security Road Map.
§ Responsible in consultation with business partners and architectural domains, responsible for alignment of security architecture with best practices and industry standards.
§ Consults and ensures the identification and analysis of specific security factors, service delivery concerns, and protection of privacy issues.
§ Responsible for providing consulting, advisory and expertise as it relates to ICT infrastructure and security frameworks, international standards, legislative and policy matters, and best practices.
§ Supports in identifying, analyzing and evaluating key areas of risks and potential impacts and reviewing risk mitigation strategies and plans
§ Responsible for Providing senior strategic and tactical advice, options and recommendations to senior managers, planners and architects regarding complex ICT and security issues.
§ Driving the organization towards achieving security certifications that assures the privacy of the sensitive information.
§ Responsible end to end management of cybersecurity department Cyber security engineering teams, read and blue teams and with a focus on architecture, design, and implementation of security solutions and cybersecurity frameworks and standards, such as NIST, ISO 27001, and CIS Controls of cyber security and information security , AI and AI security , managed Cloud security and managed Cyber and info and Cloud security, Firewalls, WAF, Web Security Gateways and EDR, PAM, ATP , GRC ISO 27001:2013, ISO 9001 , HIPAA, HITECH, SOC 2 and NISTISO 27002 and NIST SP800-53r4 Security Controls, 27001/2 ISMS process, ISO 27002 and NIST SP800-53r4 Security Controls for different customers.
§ NGN Firewalls, intrusion detection and prevention systems, and security information and event management (SIEM) solutions cloud security protocols and best practices, particularly in environments such as AWS or Azure
§ Expertise in risk management, cybersecurity strategy, and governance and Cloud Services, including Azure, and Google Cloud and security frameworks such as NIST, ISO 27001, CIS, and compliance standards and MSS, MSSP, MDR, and SOC delivery models and emerging cybersecurity technologies and industry trends.
▪ Managed a detailed IT budget of $ US 30 mil and cut costs to align with business needs and forecasted growth.
▪ The Transformation & Migration Program incorporated project best practices across the OGDCL new production Operational HO Data center and migrate to a DR Data center split production environment and install resiliency/recovery for all critical operational processes applications, systems and infrastructure, whilst still keeping full SLA’s and KPI’s to the business and customers.
▪ Responsibilities included transforming and migrating full business functions and processes and designing new infrastructure services (Business, Datacenter, Applications, infrastructure) Invocation, Crisis management criteria and holistic plans to recovery.
▪ Successfully Planed, designed, Implemented, migrated the mission-critical Tier level III data Centre and DR Site ,ERP, IP Network, DCIM, Fiber Optics, and storage and Applications, infrastructure for OGDCL, Actively involved in implementation and construction of data Centre and DR Site IP Network, Security, SAN Storage, Blade Servers, OS, Virtualization, Enterprise Office Application, Collaboration and messaging infrastructure.
Projects and Achievements:
§ Successfully handles end-to-end customers IT Cyber Security/Info Security/, MANAGED SOC, VA, PT, ISO 27001 ISMS and GRC,IAM, IAM Suit RSA SecurID, RSA Access Manager, and IBM and Oracle IAM Suite, End point Security and HIPS and AD security and Router and Switches, Security BCP/DR complex multi-million USD global enterprise projects.
§ Supervised and managed client expectations on various projects at client sites working in teams delivering IT assurance and advisory services to clients. Advised and delivered solutions ranging from client IT audit, assurance, process improvement and modeling, due diligence to IT risk and control. Supervised various Clients Security Risk services projects and Data centers and DR sites, BCP, Recovery and backup and resilience and disaster recovery services.
Responsibilities:
• Security Architecture: Creation and maintain the enterprise's security architecture design. • Security Projects: Project Management for Security Projects • Secure SDLC: Secure Software Development Life Cycle with various tools and checklists • Data Protection: DLP, IRM, Encryption during the Information Lifecycle from creation to destruction/storage • Disaster Recovery / Business Continuity: Creation and maintain enterprise Disaster Recovery Plan and Business Continuity Plan. • Security Standards: ISO 27001, ISO 22301, • Risk Management Frameworks and IT related risks. • Cloud Computing Security management and IAM from RSA SecurID and RSA Access Manger • Information Security International Standards such as ISO 27001, ISO 22301 and best practices
Hired to manage the IT Infrastructure department. Was responsible for IT Project Management, Datacenter operations and network operations and enterprise applications support to manage the network of bigest IT based Glogbal Company
Career highlights were:
▪ Responsible for Management of Data Center and DR, DCIM, Sites and IT Infrastructure Operations and Information Security.
▪ To Design, Implement of IT Infrastructure and Program Manage Equities BCP / Disaster Recovery & Resilience for all applications and Infrastructure Management for all projects.
▪ Software developments of ERP Oracle.