Dhia Hachicha

Dhia Hachicha

ولاية تونس تونس
٢٣ ألف متابع أكثر من 500 زميل

نبذة عني

As a CyberRisk Director at Deloitte, I colead the practice for the Francophone Africa…

مقالات Dhia

النشاط

انضم الآن لعرض كل النشاط

الخبرة

  • رسم بياني Deloitte

    Deloitte

    Tunis, Tunisia

  • -

    Tunisia

  • -

    Tunisia

  • -

    Tunis, Casablanca, Alger

  • -

    Tunis / Casablanca / Alger

  • -

    World Wide (Tunis Based)

  • -

    Tunisia

  • -

    Tunisia

  • -

    Tunisia

  • -

    Tunisia

التعليم

  • رسم بياني SUP'COM

    SUP'COM

    -

  • -

  • -

التراخيص والشهادات

  • رسم بياني ISO/IEC 27032 Lead CyberSecurity Manager

    ISO/IEC 27032 Lead CyberSecurity Manager

    PECB

    تم الإصدار في ⁦
  • رسم بياني ISO/IEC 27001 Lead Auditor

    ISO/IEC 27001 Lead Auditor

    PECB

    تم الإصدار في ⁦
  • رسم بياني ISO/IEC 27001 Lead Implementer

    ISO/IEC 27001 Lead Implementer

    PECB

    تم الإصدار في ⁦
  • رسم بياني ISO/IEC 27005 Risk Manager

    ISO/IEC 27005 Risk Manager

    PECB

    تم الإصدار في ⁦
  • رسم بياني ITIL® V3 Foundation

    ITIL® V3 Foundation

    EXIN

    تم الإصدار في ⁦
    معرف الشهادة EXIN097303
  • StoneGate SSL VPN Engineer - SGSE

    Stonesoft, A McAfee Group Company

    تم الإصدار في ⁦
    معرف الشهادة SGSE00140
  • StoneGate IPS Engineer - SGIE

    Stonesoft, A McAfee Group Company

    تم الإصدار في ⁦
    معرف الشهادة SGIE00250
  • StoneGate Firewall Architect - SGFA

    Stonesoft, A McAfee Group Company

    تم الإصدار في ⁦
    معرف الشهادة SGFA00569
  • StoneGate Firewall Engineer - SGFE

    Stonesoft, A McAfee Group Company

    تم الإصدار في ⁦
    معرف الشهادة SGFE00617
  • رسم بياني ITIL Foundation

    ITIL Foundation

    EXIN

    تم الإصدار في ⁦
    معرف الشهادة 624231
  • رسم بياني Project Management Professional (PMP)

    Project Management Professional (PMP)

    Project Management Institute

    تم الإصدار في ⁦ تنتهي في ⁦
    معرف الشهادة 3986239
  • رسم بياني ISO/IEC 22301 Senior Lead Implementer

    ISO/IEC 22301 Senior Lead Implementer

    PECB

    تم الإصدار في ⁦ تنتهي في ⁦
    معرف الشهادة BCSLI1005366-2024-11
  • رسم بياني Certified Information Systems Security Professional - CISSP

    Certified Information Systems Security Professional - CISSP

    (ISC)²

    تم الإصدار في ⁦ تنتهي في ⁦
    معرف الشهادة 346782
  • رسم بياني Risk Manager ISMS - norme ISO/CEI 27005

    Risk Manager ISMS - norme ISO/CEI 27005

    LSTI

    تم الإصدار في ⁦ تنتهي في ⁦
    معرف الشهادة 1924
  • رسم بياني ISMS Lead Implementer ISO/CEI 27001 : 2005

    ISMS Lead Implementer ISO/CEI 27001 : 2005

    LSTI

    تم الإصدار في ⁦ تنتهي في ⁦
    معرف الشهادة 1923
  • رسم بياني Cisco Certified Network Associate - CCNA

    Cisco Certified Network Associate - CCNA

    Cisco

    تم الإصدار في ⁦ تنتهي في ⁦
    معرف الشهادة 395724169422FRXJ

الدورات التعليمية

  • CISSP Educations

    ANSI Tunisia

  • Hacking & Security Expert

    SysDream

  • Hacking & Security Foundations

    SysDream

  • ISMS Lead Implementation ISO 27001:2005

    Resys / LSTI

  • IT Service Management Foundation (ITIL)

    EXIN

  • ITIL Foundation V3

    EXIN / ADVANCIA

  • Interconnecting Cisco Network Devices

    CISCO

  • Risk Manager ISMS ISO/CEI 27005

    Resys / LSTI

  • Siemens Networks Foundations (Mobile Networks, WIMAX, GSM, GPRS, EDGE, UMTS)

    Siemens

  • StoneGate Advanced Implementation and Beyond

    Stonesoft

  • StoneGate FW&VPN Fundamentals and Implementation

    Stonesoft

  • StoneGate IPS Fundamentals and Implementation

    Stonesoft

  • StoneGate SSL VPN Fundamentals and Implementation

    Stonesoft

  • Vista Foundation CI 4.x Deployment, Operation & Troubleshooting

    InfoVista

  • Voice over IP : Implementation and Security

    SysDream

المشروعات

  • Implementation and certification of an Information Security Management System (ISMS) within a telecom operator

    ⁩ - الحالي

    Project Manager & Senior Consultant : Implementation and certification of an Information Security
    Management System (ISMS) within a telecom operator – Tunisia (5 months, team of 4 consultants):
    - Compliance to ISO 27001: 2013 for the clients Call Centre
    - ISO 27002: 2013 gap analysis
    - Establishment of the ISMS policies and governance procedures
    - Risk analysis and treatment
    - Security awareness training of the call center staff
    - Definition of the ISMS maintenance and…

    Project Manager & Senior Consultant : Implementation and certification of an Information Security
    Management System (ISMS) within a telecom operator – Tunisia (5 months, team of 4 consultants):
    - Compliance to ISO 27001: 2013 for the clients Call Centre
    - ISO 27002: 2013 gap analysis
    - Establishment of the ISMS policies and governance procedures
    - Risk analysis and treatment
    - Security awareness training of the call center staff
    - Definition of the ISMS maintenance and internal audit procedures
    - Support in the ISO 27001: 2013 certification

  • Presales tasks in the development of the IS security business

    Information Security Management System Implementation, Data Classification and Data Loss Prevention, Security Risk Management, Security Awareness, ISMS Implementation....

  • ITIL V3 Foundation Training

    Prepare and animate an ITIL V3 Foundation as part of prfessionnal training activities

  • Security Program Implementation

    Develop, implement, and execute effective international security programs to support the implementation of appropriate IT controls to protect companies information.

  • Information Security Documentation

    Write and maintain Policies, Baselines and Procedures.

  • Security Internal Training and Awareness

    Implement and animate information security awareness program (in French and English).

  • IT Capability upgrade within a Fund Management Organization

    -

    Senior information security and infrastructure expert : IT Capability upgrade within a Fund Management Organization – Libya (5 months, team of 6 consultants):
    - Architecture mapping and Business Needs Analysis
    - Best practices and vendor comparison
    - Gap Analysis and Quick Wins identification
    - Architecture Design and Implementation Roadmap
    - RFP Writing and Vendor Evaluation

  • IT Service Catalog and enhancement of IT support functions for a bank

    -

    Senior IT Governance expert : IT Service Catalog and enhancement of IT support functions for a bank – Tunisia (4 months, team of 6 consultants):
    - Service catalog elaboration
    - SLA negotiation with Business
    - Review of support processes (incident, change…)
    - IT services enhancement roadmap for 3 years

  • Design and implementation of passwords and sessions management solution

    -

    Project Manager : Design and implementation of passwords and sessions management solution "Total Quest Password Manager" within a telecom operator – Tunisia (3 months, team of 3 consultants):
    - Design and deployment of the solution
    - Operational documentation and training animation
    - Assistance in the go live of the product

  • Strategic study on network security infrastructure and telephony

    -

    Senior consultant in the project of developing a strategic study on network security infrastructure and telephony for a Bank – Tunisia (5 months, team of 6 consultants):
    - Assessment of the business needs and the actual network infrastructure
    - Animation of network workshops
    - Setting of the orientations in term of network and telephony evolution
    - Design of the future network and telephony architecture
    - Definition of capacity plan and projects roadmap

  • Access Controls Implementation

    -

    Implement Access Controls and provide the needed support for technical issues

  • Antirus Solution Implementation and Managment

    -

    Develop and enforce Antiviral Policy.
    Define and conduct the Antivirus migration plan for the entire infrastructure.

  • Business Continuity Plan Implemtation

    -

    Participate in implementing and maintaining a corporate Business Continuity Plan.

  • Implement secure interconnections with customer and partners

    -

    Implement secure GPRS interconnection between internet and core networks using IPSec and SSL VPNs

  • Incident Response Participation

    -

    Participate in Incident Response program by writing procedures and implementing technical security monitoring tools

  • Information Security Risk Analysis

    -

    Risk Analysis on new Business projects and before any new purshasing.
    Define and implement countermeasures to mitigate security risks to an acceptable level

  • Internal Security Audits

    -

    Conduct Information Security Internal Audits

  • Network Security Architecture Definition

    -

    Define Network Security Architecture for core, access and edge networks

  • Network Security Tools and Systems administration

    -

    Administrate Firewalls, Proxies, Antivirus, AntiSpam, IDS/IPS, SIM, Vulnerability Management system :
    • Operating Systems: Windows 2000/2003/2008, Linux (RedHat)…
    • Firewalling: Cisco PIX\ASA\FWSM, Juniper Netscreen, StoneGate, ForeFront TMG, BeeWare …
    • IDSs/IPSs: IBM ISS, Cisco IPS 5000, Stonesoft IPS-20A.
    SSL-VPNs: Stonegate SSL-VPN 2200, Cisco ASA 5510, Juniper SA2500.
    • Antivirus and Antispam: Trend Micro Virus Wall, Trend Micro IGSA, McAfee SIG-3000, Microsoft Antigen…

    Administrate Firewalls, Proxies, Antivirus, AntiSpam, IDS/IPS, SIM, Vulnerability Management system :
    • Operating Systems: Windows 2000/2003/2008, Linux (RedHat)…
    • Firewalling: Cisco PIX\ASA\FWSM, Juniper Netscreen, StoneGate, ForeFront TMG, BeeWare …
    • IDSs/IPSs: IBM ISS, Cisco IPS 5000, Stonesoft IPS-20A.
    SSL-VPNs: Stonegate SSL-VPN 2200, Cisco ASA 5510, Juniper SA2500.
    • Antivirus and Antispam: Trend Micro Virus Wall, Trend Micro IGSA, McAfee SIG-3000, Microsoft Antigen, Symantec EndPoint Protection.
    • SIMs: NetForensics, OSSIM.
    • Vulnerability Management Systems: Qualys QualysGuard, McAfee FoundStone.

  • Patch Management

    -

    Define and implement processes and procedures for Patch Management Solution.

  • Penetration testing

    -

    Penetration testing of critical business web sites and proposal of remediation action plans.

  • Review of company's firewalling infrastructure.

    -

  • Security Incident Response

    -

    Develop and maintain security incident management processes

  • Security Information Management system (SIM) Implementation

    -

    Test, validate and integrate Security Information Management system (SIM) (NetForensics, OSSIM)

  • Security KPI/Dashboard Development

    -

    Generate and present security Dashboard to senior management

  • Security operational procedures Development

    -

  • Vulnerability Management System Implementation

    -

    Test, validate and integrate Vulnerability Management System (Qualys QualysGuard, McAfee FoundStone)

  • Wireless Network Security

    -

    Implement and maintain the internal and guest secure Wireless Networks

اللغات

  • English

    إجادة كاملة

  • French

    إجادة اللغة الأم أو إجادة لغتين إجادة تامة

  • Arabic

    إجادة اللغة الأم أو إجادة لغتين إجادة تامة

التوصيات المستلمة

المزيد من أنشطة Dhia

عرض ملف Dhia الشخصي الكامل

  • مشاهدة الأشخاص المشتركين الذين تعرفهم
  • تقديم تعارف
  • تواصل مع Dhia مباشرة
انضم لعرض الملف الشخصي الكامل

ملفات شخصية أخرى مشابهة

اكتسب مهارات جديدة من خلال هذه المواد الدراسية