Muhammad Rehan Khan
Skills
Project Management, IT Security Best Practices, IT Risk Management, IT Governance, IT Management, Information Security Audit, Linux, Leadership, ISO270001, ISO20000, Change Management, IT Security Policies and Procedures, IT/ Information Security Program Manager, IT Service Management, IT/ Information Security Incident Manager, IT Security Operations, IT/ Information Security Assessments, Firewalls, Intrusion Detection, Vulnerability Management
About
As a Certified Ethical Hacker (CEH) and Certified Information Security Manager (CISM), I am a highly skilled Senior Information Security Professional with a proven track record of designing and regulating critical security programs. I have extensive experience in operational supervision of information security system assessment, unauthorized access, compliance testing, change management, emergency disaster recovery, safeguarding organization assets and a wide range of vulnerabilities and threats.
My expertise includes proficiency in monitoring operating systems and liaising with IT professionals to develop strategies to implement vulnerability assessment and penetration testing activities and network/security policies. Additionally, I have successfully secured network systems, ensured confidential communication, and implemented internal control measures that led to a reduction in incidents. I am experienced in training business-division employees on security best practices.
My strengths include directing risk management initiatives while establishing, implementing, and enhancing key information security objectives. I am known for cross-functional collaboration with diverse teams and communicating with stakeholders at all levels of a corporation. I am highly adept in direct and remote analysis with critical thinking and can develop request for proposal (RFP) with ease.
I am able to thrive in fast-paced and challenging environments where accuracy and efficiency matter. I am open to new opportunities that align with my career goals and expertise in information security management.