Omer Abdelgaffar Elhaj

Omer Abdelgaffar Elhaj Email and Phone Number

Abu Dhabi, United Arab Emirates
Omer Abdelgaffar Elhaj's Location
Abu Dhabi Emirate, United Arab Emirates, United Arab Emirates
About Omer Abdelgaffar Elhaj

Experienced and highly skilled Information Security Consultant with a proven track record of delivering comprehensive solutions to protect critical assets and mitigate risks. Adept at assessing complex environments, identifying vulnerabilities, and implementing robust security measures to safeguard sensitive information. Strong expertise in developing and executing security strategies, policies and procedures aligned with industry best practices and regulatory requirements. Proficient in conducting thorough risk assessments, penetration testing, and vulnerability management. Excellent communicator and collaborator, able to effectively liaise with stakeholders at all levels to drive security awareness and promote a culture of compliance. Committed to staying abreast of emerging threats and technologies to provide cutting-edge security solutions. Dedicated to ensure the confidentiality, integrity, and availability of data for clients across various industries.

Omer Abdelgaffar Elhaj's Current Company Details
Emirates Classification Society (TASNEEF)

Emirates Classification Society (Tasneef)

View
Lead IT and IS Auditor
Abu Dhabi, United Arab Emirates
Website:
tasneef.ae
Employees:
82
Omer Abdelgaffar Elhaj Work Experience Details
  • Emirates Classification Society (Tasneef)
    Lead It And Is Auditor
    Emirates Classification Society (Tasneef)
    Abu Dhabi, United Arab Emirates
  • Protiviti Middle East Member Firm
    Senior Consultant - It Audit
    Protiviti Middle East Member Firm Jan 2024 - Present
    Abu Dhabi Emirate, United Arab Emirates
    • Conduct thorough reviews and assessments of clients' IT infrastructure, systems, and processes to identify vulnerabilities, weaknesses, and areas of improvement.• Evaluate the effectiveness of IT controls and procedures to ensure compliance with relevant regulations, standards, and best practices.• Develop and implement audit plans, methodologies, and procedures tailored to the specific needs and objectives of each client engagement.• Prepare detailed audit reports outlining… Show more • Conduct thorough reviews and assessments of clients' IT infrastructure, systems, and processes to identify vulnerabilities, weaknesses, and areas of improvement.• Evaluate the effectiveness of IT controls and procedures to ensure compliance with relevant regulations, standards, and best practices.• Develop and implement audit plans, methodologies, and procedures tailored to the specific needs and objectives of each client engagement.• Prepare detailed audit reports outlining findings, recommendations, and actionable insights for stakeholders at all levels of the organization.• Work closely with client teams to provide guidance, support, and expertise on IT risk management, compliance, and governance.• Stay abreast of emerging technologies, industry trends, and regulatory changes to continuously enhance audit methodologies and practices.• Collaborate with cross-functional teams within the organization to leverage expertise and resources for delivering high-quality audit services.• Communicate effectively with clients, management, and team members to ensure clear understanding of audit objectives, timelines, and deliverables. Show less
  • United Capital Bank
    Senior Information Security Consultant
    United Capital Bank Apr 2022 - Dec 2023
    Khartoum, Sudan
    1. Security Governance and Policies:• Spearhead the efforts to develop and implement effective security governance frameworks.• Develop and review security policies and procedures to ensure alignment with industry best practices.2. Risk Management:• Conduct risk assessments and assist UCB in developing risk mitigation strategies.• Collaborate with business units to integrate risk management into their overall business strategy.3. Security Architecture and… Show more 1. Security Governance and Policies:• Spearhead the efforts to develop and implement effective security governance frameworks.• Develop and review security policies and procedures to ensure alignment with industry best practices.2. Risk Management:• Conduct risk assessments and assist UCB in developing risk mitigation strategies.• Collaborate with business units to integrate risk management into their overall business strategy.3. Security Architecture and Design:• Design and implement robust security architectures for networks, systems, and applications.• Provide guidance on the integration of security controls into existing infrastructure and new projects.4. Incident Response and Management:• Lead the development and testing of the incident response plans.• Provide expert guidance during security incidents, including forensic analysis and remediation strategies.5. Security Assessments:• Analyse and evaluate security controls to identify weaknesses and recommend remediation measures.• Conduct comprehensive security assessments, including penetration testing, vulnerability assessments, and threat modelling.6. Security Compliance and Standards:• Ensure UCB compliance with industry standards, regulations, and best practices.• Stay abreast of changes in the regulatory landscape and provide guidance on compliance requirements.7. Security Awareness and Training:• Develop and deliver customized security awareness and training programs for relevant stakeholders at different levels.• Advise on building a strong security culture within UCB. Show less
  • Mtn Sudan
    Enterprise Security Architecture, Strategy & Consulting Manager
    Mtn Sudan Dec 2021 - Apr 2022
    Khartoum, Sudan
    • Own the enterprise cybersecurity technology roadmap and identify requirements and initiatives required to meet security and risk management objectives• Lead a staff of information security professionals, hire and train new staff, provide leadership and coaching, including technical and personal development for team members• Ensure alignment between enterprise security architecture design patterns and overall business strategy• Partner with other business units and other… Show more • Own the enterprise cybersecurity technology roadmap and identify requirements and initiatives required to meet security and risk management objectives• Lead a staff of information security professionals, hire and train new staff, provide leadership and coaching, including technical and personal development for team members• Ensure alignment between enterprise security architecture design patterns and overall business strategy• Partner with other business units and other stakeholders to assess, implement, integrate and optimize security technologies• Act as management sponsor for Enterprise Security Architecture Review Board and participate in technology strategy development initiatives• Engage and empower Technology Organization personnel and other business units to understand and apply information security concepts to mitigate corporate risk• Establish an annual budget and monitor actuals against the budget. Meet expense and capital spend targets• Coordinate security activities throughout the CI/CD (Continuous Integration/Continuous Delivery) pipeline• Provide assistance in maintaining security architecture documentation and diagrams• Identify security design gaps in existing and proposed architectures and recommend changes or enhancements• Partner with the Technology leadership team, and other teams and individuals across the company to advance security standards and guidelines• Define and manage system hardening standards (configuration management) across all technology domains and ensure compliance checking is built into processes.• Be responsible for maintaining the information security of MTN physical or information assets that they access, use, or manage as per the company policies.• Other Information Security-related tasks as assigned Show less
  • White Nile Sugar Co. Ltd
    Ict Audit Manager
    White Nile Sugar Co. Ltd Jan 2018 - Dec 2021
    Khartoum, Sudan
    1. Audit Strategy and Planning:• Develop and execute comprehensive ICT audit strategies aligned with WNSC’s objectives and regulatory mandates.• Collaborate with senior management to integrate ICT audit initiatives seamlessly into broader business goals.2. Audit Execution:• Lead and manage ICT audits, encompassing risk assessments, testing, and evaluation of ICT controls.• Conduct comprehensive and meticulous reviews of ICT systems, applications, and infrastructure to… Show more 1. Audit Strategy and Planning:• Develop and execute comprehensive ICT audit strategies aligned with WNSC’s objectives and regulatory mandates.• Collaborate with senior management to integrate ICT audit initiatives seamlessly into broader business goals.2. Audit Execution:• Lead and manage ICT audits, encompassing risk assessments, testing, and evaluation of ICT controls.• Conduct comprehensive and meticulous reviews of ICT systems, applications, and infrastructure to pinpoint vulnerabilities and areas for improvement.3. ICT Governance and Compliance:• Ensure strict compliance with pertinent ICT laws, regulations, and industry benchmarks.• Establish and enforce robust ICT governance frameworks, policies, and procedures.4. Collaboration with IT Teams:• Collaborate with IT teams to comprehend technology initiatives and assess associated risks.• Provide guidance on implementing effective ICT controls during the development and deployment of technology solutions.5. Audit Reporting and Communication:• Prepare and deliver audit findings, recommendations, and reports to senior management and audit committees.• Convey intricate ICT audit concepts to non-technical stakeholders in a clear and concise manner.6. Team Leadership:• Lead and mentor a team of ICT auditors, fostering a culture of collaboration, excellence, and continuous improvement.• Provide guidance and support to team members, promoting professional development and knowledge sharing.7. Vendor and Third-Party Audits:• Assess and oversee the security posture of third-party vendors and ICT service providers.• Ensure adherence to security policies and standards for external ICT connections.8. Continuous Improvement:• Identify opportunities for process enhancements and automation within the ICT audit function.• Stay abreast of emerging technologies and industry trends to elevate audit methodologies. Show less
  • Sudanese Postal Services (Sudapost)
    It Manager
    Sudanese Postal Services (Sudapost) Sep 2016 - Jan 2018
    Khartoum Sudan
    1. IT Strategy Development:• Develop and align IT strategies with overall business goals and objectives.• Collaborate with executive leadership to ensure technology initiatives support the organization's growth and competitiveness.2. Technology Infrastructure Management:• Oversee the design, implementation, and maintenance of the organization's technology infrastructure, including networks, servers, and hardware.• Ensure the reliability, availability, and security of IT… Show more 1. IT Strategy Development:• Develop and align IT strategies with overall business goals and objectives.• Collaborate with executive leadership to ensure technology initiatives support the organization's growth and competitiveness.2. Technology Infrastructure Management:• Oversee the design, implementation, and maintenance of the organization's technology infrastructure, including networks, servers, and hardware.• Ensure the reliability, availability, and security of IT systems.3. Team Leadership:• Lead and manage IT teams, including network administrators, system administrators, and support staff.• Foster a collaborative and productive work environment, promoting professional development and knowledge-sharing.4. Project Management:• Manage IT projects from conception to completion, ensuring they are delivered on time and within budget.• Collaborate with cross-functional teams to define project requirements and expectations.5. Budgeting and Resource Allocation:• Develop and manage the IT budget, allocating resources effectively to support ongoing operations and strategic initiatives.• Evaluate and recommend technology investments that align with business priorities.6. Vendor Management:• Manage relationships with IT vendors and service providers.• Negotiate contracts, evaluate vendor performance, and ensure compliance with service-level agreements.7. IT Security:• Implement and enforce security policies and procedures to safeguard the organization's data and systems.• Stay abreast of cybersecurity threats and ensure the organization's readiness to respond to security incidents.8. End-User Support:• Oversee the IT helpdesk and support services to ensure timely resolution of technical issues for end-users.• Implement user training programs to enhance technology proficiency. Show less
  • Sudanese Postal Services (Sudapost)
    Sr. Cybersecurity Officer
    Sudanese Postal Services (Sudapost) Aug 2012 - Sep 2016
    Khartoum Sudan
    1. Cybersecurity Strategy and Planning:• Develop and execute a forward-looking cybersecurity strategy aligned with organizational goals and industry standards.• Collaborate with executive leadership to integrate cybersecurity initiatives into overall business objectives.2. Security Architecture and Design:• Lead the design and implementation of robust security architectures for SudaPost’s networks, systems, and applications.• Conduct regular security assessments to identify… Show more 1. Cybersecurity Strategy and Planning:• Develop and execute a forward-looking cybersecurity strategy aligned with organizational goals and industry standards.• Collaborate with executive leadership to integrate cybersecurity initiatives into overall business objectives.2. Security Architecture and Design:• Lead the design and implementation of robust security architectures for SudaPost’s networks, systems, and applications.• Conduct regular security assessments to identify vulnerabilities and recommend improvements.3. Security Operations:• Oversee and lead security operations, ensuring the effective deployment and management of security tools and technologies.• Monitor security alerts and incidents, coordinating timely responses and resolution efforts.4. Incident Response and Management:• Develop and maintain incident response plans, coordinating with relevant stakeholders during security incidents.• Lead incident response efforts, ensuring the timely detection, investigation, and resolution of security incidents.5. Risk Management:• Conduct comprehensive risk assessments and vulnerability assessments.• Develop and implement risk mitigation strategies, considering business impact and regulatory compliance.6. Security Compliance:• Ensure compliance with relevant cybersecurity laws, regulations, and industry standards.• Stay informed about changes in the regulatory landscape and update security strategies accordingly.7. Security Awareness and Training:• Develop and deliver advanced cybersecurity training programs for employees.• Foster a culture of continuous security awareness and compliance throughout the organization.8. Security Governance:• Develop and enforce cybersecurity policies, standards, and procedures.9. Collaboration and Vendor Management:• Collaborate with cross-functional teams, IT, and business units to ensure a holistic approach to cybersecurity.• Manage relationships with external cybersecurity vendors and service providers. Show less
  • Sudanese Postal Services (Sudapost)
    Network Security Engineer
    Sudanese Postal Services (Sudapost) Sep 2009 - Aug 2012
    Khartoum Sudan
    1. Network Security Strategy:• Develop and execute a comprehensive network security strategy aligned with organizational goals and industry best practices.• Collaborate with IT and business teams to integrate security into network architecture and operations.2. Firewall and IDS/IPS Management:• Design, implement, and manage firewall configurations to protect the network perimeter.• Deploy and maintain Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS)… Show more 1. Network Security Strategy:• Develop and execute a comprehensive network security strategy aligned with organizational goals and industry best practices.• Collaborate with IT and business teams to integrate security into network architecture and operations.2. Firewall and IDS/IPS Management:• Design, implement, and manage firewall configurations to protect the network perimeter.• Deploy and maintain Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) to detect and prevent malicious activities.3. VPN Management:• Configure and manage Virtual Private Networks (VPNs) to ensure secure remote access.• Monitor VPN connections for anomalies and potential security threats.4. Network Monitoring and Analysis:• Implement network monitoring tools to detect and respond to security incidents.• Conduct regular analysis of network traffic patterns and behaviour to identify potential security risks.5. Access Control:• Implement and manage access control measures, ensuring that only authorized individuals have access to sensitive network resources.• Conduct periodic access reviews and adjustments as needed.6. Incident Response and Investigation:• Develop and lead network-centric incident response plans and procedures.• Coordinate and oversee the investigation and resolution of network security incidents.7. Security Awareness and Training:• Collaborate with the security awareness team to educate network users on security best practices.• Foster a culture of security awareness within the organization.8. Vendor and Third-Party Security:• Assess and manage the security posture of third-party network services and vendors.• Ensure compliance with security policies and standards for external network connections. Show less

Omer Abdelgaffar Elhaj Education Details

Frequently Asked Questions about Omer Abdelgaffar Elhaj

What company does Omer Abdelgaffar Elhaj work for?

Omer Abdelgaffar Elhaj works for Emirates Classification Society (Tasneef)

What is Omer Abdelgaffar Elhaj's role at the current company?

Omer Abdelgaffar Elhaj's current role is Lead IT and IS Auditor.

What schools did Omer Abdelgaffar Elhaj attend?

Omer Abdelgaffar Elhaj attended University Of Khartoum, Sudan University Of Science And Technology.

Who are Omer Abdelgaffar Elhaj's colleagues?

Omer Abdelgaffar Elhaj's colleagues are Suod Alhammadi, Mohamed Halim, Fatma Dalhoumi, Tatiq Alhammadi, Ebrahim Abdullah, Shyam Missir Mohun (Fcca), Dr Abdelkader El Alami.

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Aero Online

Your AI prospecting assistant

Download 750 million emails and 100 million phone numbers

Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.