- Auchan RetailCyber Security Expert Technical L3RETAIL (SMALL BUSINESS)January 2019 - Today (5 years and 9 months)Lille, France• With extensive experience in XDR/EDR management and advanced detection techniques, I am able to provide confident and effective protection of digital assets.• My expertise in ASM (Attack Surface Management) enables me to identify internet-exposed vulnerabilities proficiently.• Collaborating with different departments within an organization, I strive to minimize risk and enhance security.• As a security professional, I am committed to building security into the development stages of projects, systems, networks, clouds, and data centers.• I am dedicated to researching and implementing the best ways to secure an organization's IT infrastructure.• My constant monitoring of attacks and intrusions ensures a timely response to potential threats.• My focus is on identifying vulnerabilities and risks in systems and networks to mitigate potential security breaches.• As a security specialist, I am always seeking the most effective methods to secure an organization's IT infrastructure.• I am dedicated to building security into the development stages of projects, systems, networks, and data centers to minimize potential risks and vulnerabilities.
- RevoliceSenior IT ConsultantMarch 2016 - January 2019 (2 years and 10 months)Lille, FranceAuchan - DSI - Département Cybersécurité• Responsible for Anti-Virus Project (Stores, Drives, Auchan Centrale d'achat, Croix, and Logistique)• Responsible for PortailPKI application• Responsible for IPS/IDS application• Seeking to build security during the development stages of projects, systems, networks and data centers• Looking for vulnerabilities and risks in systems and networks• Finding the best way to secure the IT infrastructure of an organization• Building security into network infrastructures• Constantly monitoring attacks and intrusions• Develop unique, effective security strategies for systems, networks, data centers, and hardware's• Implement/built-in security systems for software, hardware, and components• Research best ways to secure company-wide IT infrastructure• Monitor software for external intrusions, attacks, and hacks• Work with different departments in the organization to reduce the risk• Providing secure access to the network for remote users• Evaluate company information technology needs and system functionality• Develop, implement and continuously improve IT solutions to meet identified needs• Providing secure access to the network for remote users• Designs and implements robust solutions, programs, and policies for addressing relevant security risks
- SOFT SOLUTIONSIT ManagerSeptember 2014 - March 2016 (1 year and 6 months)Oversee all aspects of IT department operations including IT infrastructure, Communication (LAN, WAN, email, etc.), database, backup recovery, regulatory compliance Manage the day-to-day operations of the IT group including downtime, reporting service levels, defining and tracking IT operational metrics and provide status to management Negotiate with vendors, outsources, and contractors to secure network products and services. Manage and ensure optimal operation of all network hardware and equipment, including routers, switches, hubs, UPSs, and so on. Oversee the administration of user accounts, permissions, and access rights in AD Manage and ensure effectiveness of security solutions, including firewalls, anti-virus solutions, and intrusion detection systems. Prepare overall status and activity metrics that documents and tracks delivery of IT services, planned and unplanned system outages, and other key IT performance metrics Maintains overall security of networks, systems, and data Ensures high availability of critical business systems. Owns and maintains strict controls on data/system backups and recoverability Develop and manage relationships with vendors in support of staff augmentation and systems support Manage overall capacity utilization of Server/hardware environment ensuring it is optimized to meet business requirements
- B ATabieaA+
- MCSATabieaMCSA
- CCNATabieaCCNA
- CWNATabieaCWNA
- Security +TabieaSecurity +
- AZ-500T00-AMicrosoft2020AZ-500T00-A is the course code for the "Microsoft Azure Security Technologies" training course. It is designed for IT professionals who want to learn how to secure their cloud infrastructure and applications in Microsoft Azure. The course covers a wide range of security topics, including identity and access management, network security, platform protection, data and application protection, and security management. It also includes hands-on labs and exercises that allow students to apply their knowledge in a practical setting. The course is divided into modules, each of which focuses on a specific area of Azure security. The modules include: Security management: This module covers Azure Security Center, Azure Policy, and Azure Monitor. Identity and access management: This module covers Azure Active Directory, role-based access control, and multi-factor authentication. Platform protection: This module covers Azure Firewall, Azure DDoS Protection, and Azure Application Gateway. Data and application protection: This module covers Azure Key Vault, Azure Information Protection, and Azure Storage security. Network security: This module covers Azure Virtual Network, Azure ExpressRoute, and Azure VPN Gateway.
- Cybereason : Introduction to Malops (CR1005)Cybereason2022Cybereason's Introduction to Malops (CR1005) is a training course that focuses on teaching security professionals how to use the Cybereason Malops platform to detect, investigate, and remediate advanced cyber threats. The course is designed to provide hands-on training on how to use the Cybereason platform to detect and respond to real-world cyber attacks. The course covers a range of topics, including: Introduction to the Cybereason Malops platform: This module covers the basics of the Cybereason Malops platform, including its features, architecture, and functionality. Threat hunting: This module covers the basics of threat hunting, including how to identify and investigate potential threats, and how to use the Cybereason platform to perform effective threat hunting. Incident investigation: This module covers the basics of incident investigation, including how to collect and analyze data, how to reconstruct the attack, and how to use the Cybereason platform to investigate incidents. Threat remediation: This module covers the basics of threat remediation, including how to contain and eliminate threats, and how to use the Cybereason platform to remediate threats.
- Cybereason's Sensor Management (AD1010)Cybereason2022Cybereason's Sensor Management (AD1010) is a training course that focuses on teaching security professionals how to manage and deploy Cybereason sensors to detect and respond to advanced cyber threats. The course is designed to provide hands-on training on how to deploy and manage Cybereason sensors in complex enterprise environments. The course covers a range of topics, including: Introduction to Cybereason sensors: This module covers the basics of Cybereason sensors, including their architecture, functionality, and deployment options. Sensor deployment: This module covers the process of deploying Cybereason sensors, including best practices for deployment and configuration. Sensor management: This module covers the process of managing Cybereason sensors, including how to monitor sensor health, troubleshoot issues, and perform upgrades. Advanced sensor management: This module covers advanced topics related to sensor management, including sensor tuning, sensor profiles, and sensor deployment in complex enterprise environments.
- Cybereason's Sensor Grouping (CR1105)Cybereason2022Cybereason's Sensor Grouping (CR1105) is a training course that focuses on teaching security professionals how to group and manage Cybereason sensors in complex enterprise environments. The course is designed to provide hands-on training on how to group sensors to optimize performance, manage sensors in large-scale environments, and troubleshoot issues related to sensor grouping. The course covers a range of topics, including: Introduction to sensor grouping: This module covers the basics of sensor grouping, including the benefits of grouping sensors and best practices for sensor grouping. Sensor grouping strategies: This module covers the different strategies for grouping sensors, including geographic grouping, functional grouping, and organizational grouping. Sensor group management: This module covers the process of managing sensor groups, including how to create, edit, and delete sensor groups. Advanced sensor grouping: This module covers advanced topics related to sensor grouping, including sensor group policies, sensor group health monitoring, and sensor group troubleshooting.
- Cybereason : Hunting with the Attack Tree (CR1037)Cybereason2022Cybereason's Hunting with the Attack Tree (CR1037) is a training course that focuses on teaching security professionals how to use the attack tree methodology to perform effective threat hunting. The course is designed to provide hands-on training on how to use the Cybereason platform to create and analyze attack trees, identify potential threats, and respond to real-world cyber attacks. The course covers a range of topics, including: Introduction to the attack tree methodology: This module covers the basics of the attack tree methodology, including its components, structure, and functionality. Creating and analyzing attack trees: This module covers how to create and analyze attack trees using the Cybereason platform, including best practices for creating effective attack trees and analyzing them for potential threats. Threat hunting with the attack tree: This module covers how to use the attack tree methodology to perform effective threat hunting, including how to identify and investigate potential threats using the Cybereason platform. Incident response with the attack tree: This module covers how to use the attack tree methodology to respond to real-world cyberattacks, including how to contain and remediate threats using the Cybereason platform.