Malt welcome

Welcome to Fanar's freelance profile!

Malt gives you access to the best freelancers for your projects. Contact Fanar to discuss your project or search for other freelancer profiles on Malt.

Fanar Al Hayali

cyber sécurité
  • Suggested rate
    €445 / day
  • Experience8-15 years
  • Response rate100%
  • Response time1 hour
The project will begin once you accept Fanar's quote.
Location and workplace preferences
Location
Lille, France
Remote only
Primarily works remotely
Verifications

Freelancer code of conduct signed

Read the Malt code of conduct
Verified email
Languages
Categories
Share this profile
Skill set
Fanar in a few words
Highly skilled in penetration testing and vulnerability assessments, with the ability to identify and remediate critical vulnerabilities in networks and systems. Also passionate about cybersecurity and committed to staying up-to-date with the latest technologies, trends, and best practices in the field.
I am open to opportunities throughout Europe and not limited to just France, so I am available to work in any country in the region.
Kindly take note that I am only available during evenings and weekends for any work-related matters.
Experience
  • Auchan Retail
    Cyber Security Expert Technical L3
    RETAIL (SMALL BUSINESS)
    January 2019 - Today (5 years and 9 months)
    Lille, France
    • With extensive experience in XDR/EDR management and advanced detection techniques, I am able to provide confident and effective protection of digital assets.
    • My expertise in ASM (Attack Surface Management) enables me to identify internet-exposed vulnerabilities proficiently.
    • Collaborating with different departments within an organization, I strive to minimize risk and enhance security.
    • As a security professional, I am committed to building security into the development stages of projects, systems, networks, clouds, and data centers.
    • I am dedicated to researching and implementing the best ways to secure an organization's IT infrastructure.
    • My constant monitoring of attacks and intrusions ensures a timely response to potential threats.
    • My focus is on identifying vulnerabilities and risks in systems and networks to mitigate potential security breaches.
    • As a security specialist, I am always seeking the most effective methods to secure an organization's IT infrastructure.
    • I am dedicated to building security into the development stages of projects, systems, networks, and data centers to minimize potential risks and vulnerabilities.
    Cybersécurité Cybersecurity Vulnerability Management PenTest ASM Network Security Teamwork
  • Revolice
    Senior IT Consultant
    March 2016 - January 2019 (2 years and 10 months)
    Lille, France
    Auchan - DSI - Département Cybersécurité
    • Responsible for Anti-Virus Project (Stores, Drives, Auchan Centrale d'achat, Croix, and Logistique)
    • Responsible for PortailPKI application
    • Responsible for IPS/IDS application
    • Seeking to build security during the development stages of projects, systems, networks and data centers
    • Looking for vulnerabilities and risks in systems and networks
    • Finding the best way to secure the IT infrastructure of an organization
    • Building security into network infrastructures
    • Constantly monitoring attacks and intrusions
    • Develop unique, effective security strategies for systems, networks, data centers, and hardware's
    • Implement/built-in security systems for software, hardware, and components
    • Research best ways to secure company-wide IT infrastructure
    • Monitor software for external intrusions, attacks, and hacks
    • Work with different departments in the organization to reduce the risk
    • Providing secure access to the network for remote users
    • Evaluate company information technology needs and system functionality
    • Develop, implement and continuously improve IT solutions to meet identified needs
    • Providing secure access to the network for remote users
    • Designs and implements robust solutions, programs, and policies for addressing relevant security risks
  • SOFT SOLUTIONS
    IT Manager
    September 2014 - March 2016 (1 year and 6 months)
    Oversee all aspects of IT department operations including IT infrastructure, Communication (LAN, WAN, email, etc.), database, backup recovery, regulatory compliance Manage the day-to-day operations of the IT group including downtime, reporting service levels, defining and tracking IT operational metrics and provide status to management Negotiate with vendors, outsources, and contractors to secure network products and services. Manage and ensure optimal operation of all network hardware and equipment, including routers, switches, hubs, UPSs, and so on. Oversee the administration of user accounts, permissions, and access rights in AD Manage and ensure effectiveness of security solutions, including firewalls, anti-virus solutions, and intrusion detection systems. Prepare overall status and activity metrics that documents and tracks delivery of IT services, planned and unplanned system outages, and other key IT performance metrics Maintains overall security of networks, systems, and data Ensures high availability of critical business systems. Owns and maintains strict controls on data/system backups and recoverability Develop and manage relationships with vendors in support of staff augmentation and systems support Manage overall capacity utilization of Server/hardware environment ensuring it is optimized to meet business requirements
Recommendations
Education
  • B A
    Tabiea
    A+
  • MCSA
    Tabiea
    MCSA
  • CCNA
    Tabiea
    CCNA
  • CWNA
    Tabiea
    CWNA
  • Security +
    Tabiea
    Security +
  • AZ-500T00-A
    Microsoft
    2020
    AZ-500T00-A is the course code for the "Microsoft Azure Security Technologies" training course. It is designed for IT professionals who want to learn how to secure their cloud infrastructure and applications in Microsoft Azure. The course covers a wide range of security topics, including identity and access management, network security, platform protection, data and application protection, and security management. It also includes hands-on labs and exercises that allow students to apply their knowledge in a practical setting. The course is divided into modules, each of which focuses on a specific area of Azure security. The modules include: Security management: This module covers Azure Security Center, Azure Policy, and Azure Monitor. Identity and access management: This module covers Azure Active Directory, role-based access control, and multi-factor authentication. Platform protection: This module covers Azure Firewall, Azure DDoS Protection, and Azure Application Gateway. Data and application protection: This module covers Azure Key Vault, Azure Information Protection, and Azure Storage security. Network security: This module covers Azure Virtual Network, Azure ExpressRoute, and Azure VPN Gateway.
  • Cybereason : Introduction to Malops (CR1005)
    Cybereason
    2022
    Cybereason's Introduction to Malops (CR1005) is a training course that focuses on teaching security professionals how to use the Cybereason Malops platform to detect, investigate, and remediate advanced cyber threats. The course is designed to provide hands-on training on how to use the Cybereason platform to detect and respond to real-world cyber attacks. The course covers a range of topics, including: Introduction to the Cybereason Malops platform: This module covers the basics of the Cybereason Malops platform, including its features, architecture, and functionality. Threat hunting: This module covers the basics of threat hunting, including how to identify and investigate potential threats, and how to use the Cybereason platform to perform effective threat hunting. Incident investigation: This module covers the basics of incident investigation, including how to collect and analyze data, how to reconstruct the attack, and how to use the Cybereason platform to investigate incidents. Threat remediation: This module covers the basics of threat remediation, including how to contain and eliminate threats, and how to use the Cybereason platform to remediate threats.
  • Cybereason's Sensor Management (AD1010)
    Cybereason
    2022
    Cybereason's Sensor Management (AD1010) is a training course that focuses on teaching security professionals how to manage and deploy Cybereason sensors to detect and respond to advanced cyber threats. The course is designed to provide hands-on training on how to deploy and manage Cybereason sensors in complex enterprise environments. The course covers a range of topics, including: Introduction to Cybereason sensors: This module covers the basics of Cybereason sensors, including their architecture, functionality, and deployment options. Sensor deployment: This module covers the process of deploying Cybereason sensors, including best practices for deployment and configuration. Sensor management: This module covers the process of managing Cybereason sensors, including how to monitor sensor health, troubleshoot issues, and perform upgrades. Advanced sensor management: This module covers advanced topics related to sensor management, including sensor tuning, sensor profiles, and sensor deployment in complex enterprise environments.
  • Cybereason's Sensor Grouping (CR1105)
    Cybereason
    2022
    Cybereason's Sensor Grouping (CR1105) is a training course that focuses on teaching security professionals how to group and manage Cybereason sensors in complex enterprise environments. The course is designed to provide hands-on training on how to group sensors to optimize performance, manage sensors in large-scale environments, and troubleshoot issues related to sensor grouping. The course covers a range of topics, including: Introduction to sensor grouping: This module covers the basics of sensor grouping, including the benefits of grouping sensors and best practices for sensor grouping. Sensor grouping strategies: This module covers the different strategies for grouping sensors, including geographic grouping, functional grouping, and organizational grouping. Sensor group management: This module covers the process of managing sensor groups, including how to create, edit, and delete sensor groups. Advanced sensor grouping: This module covers advanced topics related to sensor grouping, including sensor group policies, sensor group health monitoring, and sensor group troubleshooting.
  • Cybereason : Hunting with the Attack Tree (CR1037)
    Cybereason
    2022
    Cybereason's Hunting with the Attack Tree (CR1037) is a training course that focuses on teaching security professionals how to use the attack tree methodology to perform effective threat hunting. The course is designed to provide hands-on training on how to use the Cybereason platform to create and analyze attack trees, identify potential threats, and respond to real-world cyber attacks. The course covers a range of topics, including: Introduction to the attack tree methodology: This module covers the basics of the attack tree methodology, including its components, structure, and functionality. Creating and analyzing attack trees: This module covers how to create and analyze attack trees using the Cybereason platform, including best practices for creating effective attack trees and analyzing them for potential threats. Threat hunting with the attack tree: This module covers how to use the attack tree methodology to perform effective threat hunting, including how to identify and investigate potential threats using the Cybereason platform. Incident response with the attack tree: This module covers how to use the attack tree methodology to respond to real-world cyberattacks, including how to contain and remediate threats using the Cybereason platform.