Rami Almalki

Rami Almalki Email and Phone Number

Cybersecurity Specialist | Security Analyst by SDA| CEH v11
Rami Almalki's Location
Dammam, Eastern, Saudi Arabia, Saudi Arabia
About Rami Almalki

A Cyber security and digital forensics graduate possessing a strong background in information security, network security, and digital forensic field. I have led and participated in various projects such as social engineering, Ad Fraud detection, and ITS security. I have completed my graduation project by collaborating with Joushen to create PhishUs, a phishing simulation platform. I’m an ambitious hard-working person who is looking for a highly professional and innovative environment.

Rami Almalki's Current Company Details

Cybersecurity Specialist | Security Analyst by SDA| CEH v11
Rami Almalki Work Experience Details
  • Sahara Net
    Soc Engineer
    Sahara Net May 2024 - Aug 2024
    Dammam, Eastern, Saudi Arabia
  • Chubb
    Incident Responder
    Chubb Nov 2022 - Nov 2023
    Al Khobar, Eastern, Saudi Arabia
  • Joushen | Cybersecurity
    Summer Intern
    Joushen | Cybersecurity Jun 2021 - Aug 2021
    Dammam, Eastern, Saudi Arabia

Rami Almalki Education Details

Frequently Asked Questions about Rami Almalki

What is Rami Almalki's role at the current company?

Rami Almalki's current role is Cybersecurity Specialist | Security Analyst by SDA| CEH v11.

What schools did Rami Almalki attend?

Rami Almalki attended Imam Abdulrahman Bin Faisal University.

Not the Rami Almalki you were looking for?

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Download 750 million emails and 100 million phone numbers

Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.