Installation and configuration of SIEM and IDS - Treatment of security incidents by defining a remediation plan and a return to normal - Writing of analysis procedures, action plans, playbooks to standardize and industrialize incident handling - Hunting and detection optimization by optimizing SOC rules to identify weak signals and minimize network noise - Technical audit of stakeholder information systems
Oct 2010 - Nov 2011 (1 year, 1 month)
Audit and consulting on security of information system - Security Monitoring - Project management - Infrastructure networks, systems and telecommunications infrastructure, Information security, Business Continuity Plan....
Master in Cyber Security of Information Systems at the National Institute of Posts and Telecoms
Jamiât Mohammed Al-Khâmiss Rabat, Morocco 2015 - 2017
State Engineer in Telecoms and Information Technology at INPT Rabat
Jamiât Mohammed Al-Khâmiss Rabat, Morocco 2008 - 2010
Application Engineer in IEEA
Université Sidi Mohammed Ben Abdellah-Fès, Morocco 2006 - 2008
Certified Secure Web Application Engineer (CSWAE)
this course learn me how to develop web applications that aren't subject to common vulnerabilities, and how to test and validate that their applications are secure, reliable and resistant to attack.
Training Elastic Stack Elasticsearch, Logstash and Kibana ELK
Understand the issues of information retrieval
Understand the philosophy of search engines and that of Elasticsearch
Understand the complementarity and architecture of Elastic Stack
Secure your environment
Back up and restore your data
Supervise your architecture
Implement an advanced architecture (scalability and clustering)
Certified PECB ISO/IEC 27032 Lead Cybersecurity Manager
ISO/IEC 27032 Cybersecurity training provides a real-world solution to individuals in protecting their privacy and organization data from phishing scams, cyber-attacks, hacking, data breaches, spyware, espionage, sabotage and other cyber threats. This Training provide all the skills to manage and provide solutions to cyber security issues.