Fadi Khouri CISA, CISM, CRISC, CRA, CTFL fadi@fadikhouri.com 6 4 7 - 9 4 7 - 6 9 6 9 , 6 4 7 - 4 6 2 -0 2 0 2 www.fadikhouri.com CORE KNOWLEDGE AREAS TARGET: IT AUDITING CONSULTANT IT Audit process (Planning, Studying, Testing, and Evaluating Controls) Skilled and meticulous IT Auditor offers 14+ years of Information Security experience in the IT sector, with 12+ years in an IT Banking Systems & Applications auditing role in the banking field. Expertise spans risk- Information Processing Facilities based assessments, application assessments and access System Development Life Cycle SDLC controls. Sharp and detail-oriented critical thinker with Enterprise Architecture Business continuity planning (BCP) and Disaster Recovery Arrangements. Risk-Based Assessments working in some of Kuwait’s largest banks with a Master’s Risk Identification, Assessment and Evaluation. degree in Communications and Computer Engineering, Software Testing offering proficiency in cutting-edge practices to protect Project Management Logical Access Controls data integrity and network security. Strong leader, skilled Implementation Reviews Staff Development & Training the problem-solving skills necessary to identify and mitigate potential risks. Blends experience gained at inspiring teams to achieve critical objectives. P RO F ES S IO NAL E XP ER I EN C E Independent Consultant (IT Audit and Security) July-2012 – present Toronto, Canada IT Audits, IT security consulting services, IT policy and procedure, business continuity and disaster recovery planning, IT Risk Assessments, Application testing, Vulnerability Assessments and Penetration Testing, profit and not-for-profit clients. KEY TASKS Perform information systems audit of application Software and Network Infrastructure. Evaluate the design and effectiveness of an organization's computer systems, which includes data systems, computer networks, and security solutions. Training, supervision and mentoring and provide information security awareness trainings. Review of project implementation related documents such as RFP, Contracts, and SLAs. Perform Software testing to ensure that it meets the requirements that guided its design and development, responds correctly to all kinds of inputs, performs its functions within an acceptable time, free of any defects, free from security bugs, and achieves the general result its stakeholders desire. Perform Vulnerability Assessment to help identifying and quantifying vulnerabilities in the organization environment as well as providing the appropriate mitigation procedures required to either eliminate those weaknesses or reduce them to an acceptable level of risk. Perform Penetration Testing (white box and/or black box) by simulating the actions of an external/internal attacker with the aim to breach the security of the organization to exploit critical systems and gain access to sensitive data using tools and techniques. In some cases and with the approval of the Organization management, the scope might include social engineering attacks or physical security tests. Page 2 Senior IT Auditor (Heading the IT Audit Team) July-2010 – July 2012 Industrial Bank of Kuwait – Kuwait, Kuwait Recruited by the Industrial Bank of Kuwait to lead the Internal IT Audit team of the bank, focusing on revamping the IT auditing processes to bring them in line with industry standards and/or best practices, as well as to train and mentor a staff of junior and senior auditors. KEY CONTRIBUTIONS Transformed the IT auditing process, drafting a comprehensive and standardized audit plan spanning risk-based and application assessments, as well as provisioning for the conversion of a manual printout process to an electronic one, resulting in an increased focus on the security of the application. Brought about an annual audit across all applications, implementing a risk rating for each of the 20 applications to gain better insight into the individual components of IT operations. Liaises with IT Management and Business Users to identify and implement resolutions to recognized risks, effectively ensuring that all processes align with the approved audit plan. Conceptualized and created the tools and templates needed to clearly audit web applications and client server applications, allowing for consistency and transparency in all processes. Conducts post-implementation and application control reviews, as well as fraud investigations, coordinating with the external audit teams to mitigate risks. Performs in-depth research on the security and functionality of validation controls on the server and browser side, referring emerging issues to the vendors. Senior IT Auditor Auditor Assistant Auditor 2007-2010 2004-2006 2002-2003 National Bank of Kuwait (NBK) – Kuwait, Kuwait Initially brought on board as the Assistant Auditor at this leading Kuwaiti bank, earning a promotion to Senior IT Auditor tasked with carrying out extensive IT audits across post-implementation and application controls reviews, employing ISACA and IIA standards to successfully improve the online banking security. Penetrated and bypassed the core banking system platform, discovering security gaps on the vendor side through a detailed assessment of the security infrastructure and its associated risk exposures, resulting in increased validation enforcement controls. ACCOMPLISHMENT Recipient of the NBK Best Employee of the Quarter Award, 2004. Expertly navigated the evaluation of the bank’s business continuity and disaster recovery plans, performing in-depth testing and tracking of disaster recovery processes to identify gaps, culminating in several recommendations including the migration of the disaster recovery area to a more secure location. Drafted functional and user requirements, data mapping and conversion methodologies, and User Acceptance Tests (UAT) documentation, incorporating industry research into provide staff with a thorough understanding of industry best practices. Assisted in auditing NBK overseas branches covering application level security and controls, with special emphasis on web applications and critical applications. Played a key role in the preparation of a risk-based IT audit plan identifying significant risks across the business and IT, while incorporating the requirements and expectations of key stakeholders. Additional professional experience includes a year as IT Programmer for the Commercial Bank of Kuwait (2001); a year as an Electrical Engineer with the Lebanese Army (2000); and 3 years at the Computer Lab Supervisor at the University of Balamand (1996-1999). Page 2 ED U CA TI ON & C E RT I FI C AT IO NS Certified Information Security Manager (CISM) ISACA, USA 2014 Certification in Risk Management Assurance (CRA) IIA, USA 2013 ISTQB-ISEB Certified Tester Foundation (CTFL) The International Software Testing Qualifications Board (ISTQB) 2012 Certified in Risk and Information Systems Control (CRISC) ISACA, USA 2011 Certified Information Systems Auditor (CISA) ISACA, USA 2011 Advanced IT Audit using ACL Institute Banking Studies, Kuwait 2009 Network Security Institute Banking Studies, Kuwait 2006 Oracle Development Institute Banking Studies, Kuwait 2002 Master of Communications and Computer Engineering University Of Balamand, Lebanon 2000 Bachelor of Science in Electrical Engineering University Of Balamand, Lebanon 1998 TE C HN I CAL S KIL L S P RO F IL E Ethical Hacking | Web Application | Programming (e.g. Visual Studio.NET, Java, Java Script, PHP, Oracle, SQL, DB2, VOS, HTML, XML) | Electrical Related Programs (e.g. Matlab and PSPICE)