Dear Sir/Madam,
I am an experienced Information Security specialist, with a demonstrated history of working in the banking industry. I am currently working as an IT Security Officer at AM Bank, Lebanon. I believe that the skills and experience I have gained at this position make me an ideal candidate to provide you with the best services. Through my 7-year experience at the bank, I have developed strong security skills and the ability to integrate business processes with the required security measures and controls. I have worked on several areas in the process of building the bank’s security strategy. From writing the bank’s Information Security policies and procedures to providing security awareness sessions to employees and working on the bank’s Business Continuity Plan (BCP) and many more. As a result, I was able to gain the required expertise that would allow me to excel in my domain.
I have also advanced my educational knowledge where at first I completed my Bachelor of Science (BS) degree in Computer and Communications Engineering. After that, I managed to obtain my Master of Science (MS) degree in Computer and Communications Engineering and my Master of Business Administration (MBA) degree from the Lebanese International University (LIU). In addition, I am an ISACA Certified Information Systems Auditor (CISA) since 2017 and in 2021; I gained my Certified Information Security Manager (CISM).
I am an organized, highly motivated, and a self-supporting team player who is confident that my experience in the field and my educational level qualify me for consideration.
A summary of my main areas of expertise include:
- Writing and setting the right policies and procedures in accordance with worldwide standards that would guarantee the flow of the company’s daily operations in a secure manner.
- Performing risk assessment and gap analysis to all the organization’s processes to identify all weakness points and providing the necessary recommendations to mitigate any potential risks.
- Providing employees with security awareness sessions to cover all the areas of potential risks that they might face while performing their daily tasks.
- Performing security User Acceptance Test (UAT) to new applications and setting the required user access profiles as per the business flow and requirements of the new application.
Best Regards,
Ali AbouRida CISA, CISM