Menu

Oualid BEN OUOEZDOU

DJERBA

En résumé

- < < https://sa.linkedin.com/pub/oualid-ben-ouezdou/2b/888/29b > > -
* Identity and Access Management Consultant with broad experience in designing, developing and deploying highly available and scalable enterprise solutions involving Directory Services, Provisioning, Federation, Access Management and Enterprise Single-Sign On.
* Demonstrated ability in architecting solutions that leverage product strengths and overcome any product limitations using "out-of-the-box" thinking
* Exposure to a wide spectrum of leading enterprise product suites in identity and information security domain.
* In-depth knowledge of various identity product internals
* Good communication, training and presentation skills
* Self-motivated and methodical team player with desire to learn in a fast-paced environment

Specialties:
- WSO2 Identity server
- Public Key Infrastructure : PKI (Microsoft, Opentrust, EJBCA, ...)
- E-SSO (Oracle/Passlogix, Avencis, Evidian, ...)
- Web SSO
- Fingerprint authentication (enrollment, matching, vendor/device evaluation, ...)
- Smart card authentication
- Knowledge Base Authentication : KBA
- Oracle Identity and Access Management suite(s)
- ForgeRock Identity and Access Management suite
- IBM Identity and Access Management suite
- Sun Identity and Access Management
- Identity Migration projects
- Microsoft Active Directory / ADAM
- Identity & Security Protocols and Standards: LDAP, SAML,OpenID, SASL, SPML, SSL

Mes compétences :
Identity and Access Management
Gestion de projet
Système d'information
Biométrie
Public Key Infrastructure
SSO
OWASP
Certified Biometrics Security Engineer
Penetration test
CISSP training
WSO2

Entreprises

  • Al-Elm Information Security‏ - KSA - Senior Security Architect

    2011 - maintenant IAM Architect :
    Participate to develop a governmental Services Delivery Platform (SDP):
    - Request for Proposal (RFP) elaboration.
    - Business requirements definition.
    - Design the architecture of the IAM framework including (but not limited to) :
     Provisioning
     Authentication
     Authorization
     Web Single Sign-On (SSO)
     Public Key Infrastructure (PKI)
     Federation
     Knowledge Base Authentication (KBA)
    - Evaluating then Selecting technology, solution and vendor.
    - Participate to all Agile lifecycle steps (meeting, BRS, SRS, HLD, LLD…).
    - Lead the architecture design of IAM items in all public and governmental projects.
    - …
    Lead and Participate to the all projects/opportunities related to :
    - Smart card
    - Biometric
    - PKI
    - …
    Lead the WSO2 part in the projects :
    - Products selection
    - Architecture
    - Vendor handling
    - Trainings
    - …
    Lead Demos and POC (Proof Of Concept ) related to :
    - Smart card
    - Biometric
    - PKI
    - …
    Lead the Security Software Development Life Cycle S-SDLC :
    - Elaborate process
    - Identify gaps
    - Propose/conduct trainings
    - …
    Lead the Security testing & penetration testing activity :
    - Security sessions
    - Analyze reports & defects
    - Team lead
    - …
  • SFR - Security Architect

    2010 - 2011 Managing project of encryption of data in oracle database using Oracle TDE, Vault. Manage the meetings to select the final architecture
  • Atheos - Orange Business Services - Security Architect

    2008 - 2010 Sodexo - Team lead : : Migrating antivirus solution from Symantec to Trend Micro.
    Groupe la poste - SSO architect : Integration and configuration of a SSO solution (Avencis SSOX) for privileged users. Implementation of the technical architecture.Implementation of Signe Sign-On solution
    SNCF - IAM architect : Answering a call for tenders about SSO (Passlogix v-GO).
    Carrefour - IAM architect : Integration and configuration of a SSO solution (Passlogix v-GO),
    Integration and configuration of a management solution for smart cards (Open Trust SCM). Final architecture validation. Implementation of Signe Sign-On solution :SSO (Single Sign-On) ,SSPR (Self-service password reset), PM (provisioning manager) .Configuration of authentication method :SAML ,Kerberos …
    Kinfisher - ITIM admin : ITIM Administration for users applicative accounts from « Castorama » and « Brico-Dépôt » in France, Italy, Poland and Russia. Level 3 Support.
    Areva - SOC : Firewalls Configuration and installation
  • Gemalto - Ingénieur Sécurité

    Meudon 2007 - 2007
  • Altasys - Ingénieur Sécurité

    2007 - 2008

Formations

  • OWASP (Belfast)

    Belfast 2017 - 2017 How to understand what you are building, how to identify threats using the STRIDE method and how to address each threat. Comprehensive training material and hands-on workshops with real live use cases will guide you through all aspects of threat modeling.
    This course is all about getting you started with threat modeling as soon – and as effective – as possible. Therefore, we make it extra convenie
  • Firebrand (London)

    London 2016 - 2016 Led by an (ISC)² authorized instructor, the Official (ISC)² CBK Training Seminar for the ISSAP provides a comprehensive review of information security concepts and industry best practices, covering the 6 domains of the ISSAP CBK:

    Access Control Systems and Methodology
    Communications and Network Security
    Cryptography
    Security Architecture Analysis
    Technology Related Business Continuity Planning (B
  • Biocertification (Chicago)

    Chicago 2015 - 2015 Introduction to authentication and authorization
    Fundamentals of biometric technologies
    Analysis of system performance
    In-depth discussion of commercially available technologies like fingerprint recognition, face recognition, iris recognition, hand geometry, vascular pattern recognition, voice recognition, dynamic signature verification and multi-biometric systems
    Privacy concerns
    Risk analysis of
  • WSO2 (Riyadh)

    Riyadh 2015 - 2015 ntroduction to WSO2 Identity Server
    ● Introduction to the WSO2 Identity Server
    ● Evolution of Identity
    ● Digital Transformation
    ● Authentication, Provisioning, Authorization, Analytics and Audit
    ● Lab: Getting Started with WSO2 Identity Server
    ● Lab: Setting Up Analytics
    User Management and Identity Management
    ● User Management Features
    ● User Management Architecture
    ● Lab: Adding a User
    ● Demo: U
  • Firebrand (Dubai)

    Dubai 2014 - 2014 Get CISSP trained in just six days on this accelerated course. The CISSP is globally recognised as the gold standard IT security certification – learn the skills you need to achieve it at twice the speed with Firebrand.

    Developed by (ISC)2, the world’s leading cyber security membership association, the CISSP is key for professionals aiming for senior roles in information security. With Firebrand,
  • Des Carte

    Paris 2013 - 2013

Réseau

Annuaire des membres :