Skip to content

Instantly share code, notes, and snippets.

@om1d3
Last active January 18, 2021 07:07
Show Gist options
  • Save om1d3/fdb311f83d7bee230e8eeb5b5e307186 to your computer and use it in GitHub Desktop.
Save om1d3/fdb311f83d7bee230e8eeb5b5e307186 to your computer and use it in GitHub Desktop.
{
"meta":
{
"theme":
"elegant"
}
},
{
"basics": {
"name": "Horia Humaila",
"label": "Information Security Professional",
"picture": "",
"email": "horia.humaila@gmail.com",
"phone": "+1(647) 513-6428",
"website": "",
"summary": "\"I got a dream that is worth more than my sleep.\" \n\nPassionate about technology and it's inner-workings and constantly looking to understand the details that make it work the way it does. This and also how to break it, alter it, make it do what I want it to do. That is why I chose to be a security professional, so I can bring my contribution and sustain the information flow that fuels the big decisions, the great dreams and the bold goals. Because without trust ambition and change are just some words. \n\nMy goal is to keep developing my skills, both technical and non-technical, so I can be up to speed with the fast-paced Information Security domain. I am aiming to use these skills for delivering trust and reliability as a foundation for the business environment. \n\nhttp://horia.pro/",
"location": {
"countryCode": "CA",
"address": "Canada"
},
"profiles": [
{
"network": "LinkedIn",
"username": "humaila",
"url": "https://www.linkedin.com/in/humaila/"
}
]
},
"work": [
{
"company": "BioCatch",
"endDate": "2020-10-31",
"highlights": [],
"position": "Information Security Manager",
"startDate": "2020-01-31",
"summary": "• responsible for developing, implementing and maintaining the information security activities\n• organised, planned, and directed the data processing functions, including systems and programming, computer operations, and user communication\n• planned, coordinated and directed various phases of a project’s systems analysis and programming\n• managed and participated at the DevOps migration to Ansible automation for AWS EKS\n• leaded and supported the implementation of new applications, including testing and evaluating technology\n• reviewed, recommended and approved technology related contracts and solution/application testing\n• overseen Vendor Management program for all technology vendors",
"website": "https://www.linkedin.com/company/biocatch/"
},
{
"company": "AimBrain - acquired by BioCatch in 2020",
"endDate": "2019-12-31",
"highlights": [],
"position": "Chief Information Security Officer",
"startDate": "2017-10-31",
"summary": "• security architecture: planning, buying, and rolling out security hardware and software, and making sure IT and network infrastructure is designed with best security practices in mind \n• identity and access management: ensuring that only authorized people have access to restricted data and systems \n• cyber risk and cyber intelligence: keeping abreast of developing security threats, and helping the board understand potential security problems that might arise from acquisitions or other big business moves \n• program management: keeping ahead of security needs by implementing programs or projects that mitigate risks — regular system patches, for instance \n• security operations: real-time analysis of immediate threats, and triage when something goes wrong \n• investigations and forensics: determining what went wrong in a breach, dealing with those responsible if they're internal, and planning to avoid repeats of the same crisis \n• governance: making sure all of the above initiatives run smoothly and get the funding they need — and that corporate leadership understands their importance \n• part of the hands-on DevOps team that implemented the Terraform Infrastructure as Code for the AWS cloud \n• migrated the code repository to GitLab and deployed the CI/CD processes \n• assessed and supervised the AWS Terraform IaC regular deployment — alpha/beta — on self-managed Kubernetes cluster, then \n• AWS risk assessment and mitigation for regular deployment and supervised the migration to Terraform IaC deployments on Amazon Elastic Kubernetes Service \n\nwhile I was CISO of AimBrain the company was working towards it's ISO 27001 certification, project I was also in charge with.",
"website": "https://www.linkedin.com/company/aimbrain/"
},
{
"company": "Sagacity Solutions Ltd",
"endDate": "2017-03-31",
"highlights": [],
"position": "DevOps Engineer / SysAdmin",
"startDate": "2016-09-30",
"summary": "• AWS infrastructure - EC2, RDS, CloudFormation\n• CyberEssentials+\n• ISO27001\n• Vagrant\n• Ansible and Terraform\n• Jenkins CI\n• Kali Linux and OpenVAS",
"website": "https://www.linkedin.com/company/sagacity-solutions-limited/"
},
{
"company": "Oregan Networks",
"endDate": "2016-04-30",
"highlights": [],
"position": "DevOps and Security Engineer",
"startDate": "2015-03-31",
"summary": "responsibilities \n• DevOps for servers in production\n• server deployment and migration \n• Docker containers deployment \n• Amazon AWS instances deployment and administration \n• GitLab CI/CD pipelines \n• network security solutions deployment and configuration \n• vulnerability scanning \n• internal security audit \n\naccomplishments \n• configured the internal servers to specifications and kept the infrastructure running under considerable load within parameters with great resilience and uptime. \n\nskills used \n• system administration in Linux environment, networking configuration, container solution deployment and configuration.",
"website": "https://www.linkedin.com/company/oregan-networks/"
},
{
"company": "IBM",
"endDate": "2015-01-31",
"highlights": [],
"position": "DevSecOps",
"startDate": "2013-05-31",
"summary": "responsibilities \n• Infrastructure as Code (IaC) based deployment \n• Ansible automation \n• Git version-control management \n• security compliance scans and updates \n• security enforcing request and mitigation \n• system administrator's security support\n\naccomplishments\n• run the required compliance scans on a tight schedule and worked with the respective stake holders to fix any non-compliance found trough the scans. \n\nskills used\n• SaaS integration \n• information security \n• system administrator \n• diplomacy.",
"website": "https://www.linkedin.com/company/ibm/"
},
{
"company": "France Telecom",
"endDate": "2013-01-31",
"highlights": [],
"position": "DevOps & Security Design Engineer",
"startDate": "2012-03-31",
"summary": "responsibilities \n• project technical requirements analysis \n• was part of the team delivering the design, documentation, implementation and improvement of the subsidiary's requirements \n\naccomplishments\n• was a member of the team that analysed, designed, documented and implemented a number of small-to-medium sized projects regarding the IT infrastructure for a number of group's national companies \n\nskills used \n• technical design, technical documentation, technical architecture, unattended installation and configuration, profound OS knowledge, networking, information security, DevOps",
"website": "https://www.linkedin.com/company/orange/"
},
{
"company": "Electronic Arts",
"endDate": "2011-11-30",
"highlights": [],
"position": "Security Engineer",
"startDate": "2011-08-31",
"summary": "responsibilities \n• security engineer at the Global Business Security Operation Centre run periodical scheduled security scans and check that all the reports are compliant \n\naccomplishments \n• assured that the raised security tickets are being handled by the team within SLA\n• handled the exceptions for the web filtering software\n• kept in contact with the external security service providers and made sure that all the alarms are false-positive and accounted for \n\nskills used \n• information security, system administrator, organizational.",
"website": "https://www.linkedin.com/company/electronic-arts/"
},
{
"company": "Asseco South Eastern Europe",
"endDate": "2010-07-31",
"highlights": [],
"position": "Network Engineer",
"startDate": "2007-12-31",
"summary": "responsibilities \n• R&S design for the beneficiary's specific technical requirements\n• VoIP design\n• security design and implementation of the resulted design. \n\naccomplishments \n• worked on networking solutions from multiple vendors and provided working environments according to the specified design \n• designed solutions according to the beneficiary's needs and qualified them with the client. \n\nskills used \n• computer networking, information security, communication protocols.",
"website": "https://www.linkedin.com/company/asseco-south-eastern-europe/"
},
{
"company": "\"Politehnica\" University in Bucharest",
"endDate": "2009-05-31",
"highlights": [],
"position": "Research Assistant",
"startDate": "2008-09-30",
"summary": "Junior Researcher involved in a university research project.",
"website": ""
},
{
"company": "UltraPro Computers",
"endDate": "2007-11-30",
"highlights": [],
"position": "System Administrator",
"startDate": "2005-06-30",
"summary": "responsibilities \n• redesign and implement the technical infrastructure including the billing systems \n• designed the network security perimeter and segmentation of the infrastructure \n• deploy and maintain the organisation's accounting technical infrastructure \n• implement the monitoring system and automate the alarm system \n\naccomplishments \n• optimised the legacy billing and inventory system while increasing it's availability \n• automated the error ticketing and resolution time for the technical infrastructure \n• created a server automated deployment system that significantly decreased the deployment time and standardised the server fleet software versions and software content \n• migrating to mainly linux-based infrastructure \n• deployed an in-house versioning system \n\nskills used \n• linux-based servers configuration, customization and automated deployment \n• pulled the disorganised versioning systems into a coherent unified system \n• segmented the network according to industry standards.",
"website": ""
},
{
"company": "Firatrom Plastik",
"endDate": "2006-05-31",
"highlights": [],
"position": "System Administrator",
"startDate": "2001-03-31",
"summary": "responsibilities \n• linux servers configurations and maintenance\n• workstations automatic imaging and deployment \n• UTP-based TCP/IP network configuration and maintenance. \n\naccomplishments \n• designed from scratch and fully deploy the internal network \n• designed and implement the organisation-wide e-mail system based on qmail and dovecot \n• streamlined the workstations' configuration and deployment solution by using an automated image deployment of the pre-configured software. \n\nskills used \n• linux-based e-mail system configuration and maintenance \n• networking R&S, network segmentation and optimization.",
"website": ""
}
],
"volunteer": [],
"education": [
{
"institution": "University POLITEHNICA of Bucharest",
"area": "Complex Informatical Systems",
"studyType": "Master's Degree",
"startDate": "2005-12-31",
"endDate": "2007-12-31",
"gpa": "",
"courses": []
},
{
"institution": "Academia Cisco, UPB",
"area": "Computer Netorking",
"studyType": "",
"startDate": "2006-12-31",
"endDate": "2008-12-31",
"gpa": "",
"courses": [
" - Cisco Networking Academy – Accessing the Wan CCNA 4",
" - Cisco Networking Academy – Routing Protocols and Concepts CCNA 2",
" - Cisco Networking Academy – LAN switching and Wireless CCNA 3",
" - Cisco Networking Academy – Network Fundamentals CCNA 1"
]
},
{
"institution": "Military Technical Academy in Bucharest",
"area": "Information security",
"studyType": "Master's Degree",
"startDate": "2008-12-31",
"endDate": "2009-12-31",
"gpa": "",
"courses": [
" - Databases Security",
" - Secure Applications Programming",
" - Distributed Systems Security",
" - Antivirus and Virus Technologies",
" - Mobile Applications Security",
" - E-Commerce and E-Payment Security",
" - IT&C Security Laws and Regulations",
" - IT&C Security Systems Design",
" - Security Management in Informatics Systems",
" - Cryptography",
" - Cryptographic Keys Management",
" - Computer Networks Security",
" - IT&C Audit",
" - Embedded & Operating Systems Security",
" - Artificial Intelligence, Multi-Agent Platforms, IT&C Engineering & Re-Engineering Security",
" - Electronic Signature"
]
},
{
"institution": "University POLITEHNICA of Bucharest",
"area": "Electronics and Computers",
"studyType": "Bachelor's Degree",
"startDate": "1999-12-31",
"endDate": "2005-12-31",
"gpa": "",
"courses": []
},
{
"institution": "University POLITEHNICA of Bucharest",
"area": "Sensor Networks and security.",
"studyType": "Doctor of Philosophy (Ph.D.)",
"startDate": "2008-12-31",
"endDate": "2011-12-31",
"gpa": "",
"courses": []
},
{
"institution": "\"Dumitru Dumitrescu\" Highschool",
"area": "Major in computer programming",
"studyType": "Highschool",
"startDate": "1995-12-31",
"endDate": "1999-12-31",
"gpa": "",
"courses": []
}
],
"awards": [],
"publications": [],
"skills": [
{
"name": "Network Security",
"level": "",
"keywords": []
},
{
"name": "Security",
"level": "",
"keywords": []
},
{
"name": "Network Administration",
"level": "",
"keywords": []
},
{
"name": "Linux",
"level": "",
"keywords": []
},
{
"name": "IBM",
"level": "",
"keywords": []
},
{
"name": "Windows",
"level": "",
"keywords": []
},
{
"name": "DHCP",
"level": "",
"keywords": []
},
{
"name": "DNS",
"level": "",
"keywords": []
},
{
"name": "Windows Server",
"level": "",
"keywords": []
},
{
"name": "VPN",
"level": "",
"keywords": []
},
{
"name": "Shell Scripting",
"level": "",
"keywords": []
},
{
"name": "IP",
"level": "",
"keywords": []
},
{
"name": "Operating Systems",
"level": "",
"keywords": []
},
{
"name": "Cisco Technologies",
"level": "",
"keywords": []
},
{
"name": "CCNA",
"level": "",
"keywords": []
},
{
"name": "BGP",
"level": "",
"keywords": []
},
{
"name": "IPSec",
"level": "",
"keywords": []
},
{
"name": "VMware",
"level": "",
"keywords": []
},
{
"name": "VoIP",
"level": "",
"keywords": []
},
{
"name": "OSPF",
"level": "",
"keywords": []
},
{
"name": "Routing",
"level": "",
"keywords": []
},
{
"name": "Integration",
"level": "",
"keywords": []
},
{
"name": "Bash",
"level": "",
"keywords": []
},
{
"name": "Network Architecture",
"level": "",
"keywords": []
},
{
"name": "Network Engineering",
"level": "",
"keywords": []
},
{
"name": "MPLS",
"level": "",
"keywords": []
},
{
"name": "Unix",
"level": "",
"keywords": []
},
{
"name": "Networking",
"level": "",
"keywords": []
},
{
"name": "Juniper",
"level": "",
"keywords": []
},
{
"name": "Cisco IOS",
"level": "",
"keywords": []
},
{
"name": "MySQL",
"level": "",
"keywords": []
},
{
"name": "Routing Protocols",
"level": "",
"keywords": []
},
{
"name": "Hardware",
"level": "",
"keywords": []
},
{
"name": "Computer Security",
"level": "",
"keywords": []
},
{
"name": "Testing",
"level": "",
"keywords": []
},
{
"name": "Network Design",
"level": "",
"keywords": []
},
{
"name": "Active Directory",
"level": "",
"keywords": []
},
{
"name": "IPv6",
"level": "",
"keywords": []
},
{
"name": "TCP/IP",
"level": "",
"keywords": []
},
{
"name": "Servers",
"level": "",
"keywords": []
},
{
"name": "Switches",
"level": "",
"keywords": []
},
{
"name": "System Administration",
"level": "",
"keywords": []
},
{
"name": "C",
"level": "",
"keywords": []
},
{
"name": "Routers",
"level": "",
"keywords": []
},
{
"name": "Cisco",
"level": "",
"keywords": []
},
{
"name": "Java",
"level": "",
"keywords": []
},
{
"name": "Apache",
"level": "",
"keywords": []
},
{
"name": "Solaris",
"level": "",
"keywords": []
},
{
"name": "Firewalls",
"level": "",
"keywords": []
},
{
"name": "Virtualization",
"level": "",
"keywords": []
},
{
"name": "Programming",
"level": "",
"keywords": []
}
],
"languages": [
{
"language": "en",
"fluency": "Native Speaker"
}
],
"interests": [],
"references": [
{
"name": "Ruhan Basson",
"reference": "Ridiculously knowledgeable is the phrase that comes to mind when I think about Horia. I’ve had the pleasure of working closely with Horia at AimBrain where he was the CISO. Above all, I was impressed with his ability to skilfully address complicated security requirements of tier 1 banks for onboarding a nimble start-up. Horia would be a true asset for any company requiring a security leader which can think hyper critically to identify vulnerabilities ahead of time. "
}
]
}
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment