Summary
Overview
Work History
Education
Skills
Websites
Certification
Languages
Research Interests
Timeline
Generic

Ayman Chalak

Balgowlah,Australia

Summary

Aspiring cybersecurity researcher with a focus on medical device security, specifically in IoT and MIDs. Through Ph.D. Research, delved into risks and vulnerabilities in medical device cybersecurity to enhance safety, privacy, and resilience in healthcare systems. Strong background in IT, networking, and cybersecurity. Dedicated and detail-oriented researcher with six years of experience as a results-driven IT network specialist and technician. Skilled in troubleshooting IT issues and managing customer service ticketing. Actively seeking a challenging position to leverage academic background and research expertise in cybersecurity and medical technology.

Overview

20
20
years of professional experience
1
1
Certification

Work History

Security Administrator

EY
04.2022 - 12.2024

• Checking CCTV system using Lenel system
• Access control Management and Monitor Event Logs
• Respond to alarms using Alarm Monitoring System
• Access management of staff, managers, directors, visitors, contractors coming on site from overseas as well as from interstates to Sydney sites
• Meet with the new starters in project rooms to take their photos and arrange their access to the site by issuing card after identifying the badge ID and cardholder number (payroll number)
• Manage the requests of access control to the lifts and speeds tile in cooperation with base building security management & manage the home floor change request too.
• Manage the security office stationary by ordering from suppliers the needed stuff.
• Manage the transfer of employees from Sydney site to interstate sites by informing the interstate workplace (HR) about it.
• Manage the transfer of employees from interstate to Sydney offices by activating or giving access to them to use Sydney site
• Create 3 different types of reports on monthly basis for the facility manager- Access denials, grants, badge events report, FCR & MCR reports and Lobby Access report
• Use the Serra view system to program the Tokens of the staff who use some facilities at EY site.
• Manage the project room reservation & access control to the users want to get access to the project room after getting an approval from EY reserve team
• Conduct meeting on weekly basis with Facility management to discuss the security operations at EY
• Manage different types of cards such as : Temporary passes ; Contractor passes ; Visitor passes ; International passes

  • Managed firewall configurations and maintained up-to-date rule sets to protect sensitive data from external threats.
  • Conducted thorough after-action reviews following major incidents or exercises to identify lessons learned and areas for improvement, strengthening the organization's overall security posture.
  • Investigated incidents and wrote reports.
  • Responded swiftly to security incidents and effectively resolved security issues.
  • Managed security policies and procedures to promote safety and security of personnel and assets.
  • Investigated and resolved security breaches to protect organization and corporate assets.
  • Conducted regular security audits and assessments to identify potential security risks and vulnerabilities.
  • Analyzed security threats and risks and developed mitigation strategies to reduce potential losses.
  • Evaluated security systems and procedures to identify areas for improvement.
  • Developed and maintained emergency response plans to promote fast and effective action during crises.

Security Controller

IAG
02.2020 - 01.2022
  • Coordinated with other departments to ensure seamless integration of security measures throughout the organization.
  • Provided ongoing employee training on safety procedures, leading to increased awareness and compliance with policies.
  • Established visitor screening processes, significantly decreasing unauthorized access to restricted areas.
  • Implemented cybersecurity measures to protect sensitive data, reducing vulnerability to cyber threats.
  • Enhanced security measures by implementing advanced surveillance systems and access controls.
  • Reduced risk of security breaches by conducting regular audits and updating protocols as needed.
  • Monitored daily activities through CCTV surveillance systems, identifying potential threats or suspicious behavior early on.
  • Facilitated open communication among team members, fostering a collaborative environment focused on problem-solving and continuous improvement in security operations.
  • Conducted thorough investigations into reported incidents, resulting in timely resolution and prevention of future occurrences.
  • Improved response time to incidents with thorough training and clear communication channels.
  • Oversaw daily monitoring and patrolled buildings, grounds, and work sites.
  • Permitted entry with escort for approved persons into secure locations.
  • Reviewed camera and system feeds and alerted proper respondents regarding discrepancies.
  • Monitored employee activities, confirming compliance with security regulations.
  • Monitored CCTV cameras and alarm systems for security breaches.
  • Responded quickly to emergency situations to assess and deflect issues.
  • Communicated with security team and building supervisors using two-way radios, mobile phones and other technological devices.
  • Patrolled internal building spaces and facility grounds to identify and deter threats to assets.
  • Updated shift logs and produced daily reports to document security activities and specific incidents.
  • Secured premises and personnel by patrolling property and monitoring surveillance equipment.
  • Enforced security policies and removed violators and unauthorized individuals from premises to maintain safe environment.
  • Wrote detailed reports of all security breaches and investigations.
  • Conducted training sessions for new security personnel to facilitate compliance with security protocols.
  • Issued access cards to authorized personnel to monitor access points.

• Operate and control closed-circuit television (CCTV) system. Systems that are used at IAG are the Security Help Desk system to monitor IAG site as well as the true vision navigator 6 to monitor IAG sites across all over Australia
• Operating the Forcefield System (Integrated security management platform) which combines access control, intrusion detection and video surveillance into a single, unified system. Plus, Control doors, alarms, user access from a single operator screen on a Windows PC.
• Supports all Challenger control panels, doors, cameras and alarm points from map display
• Device status and video verification of alarms
• Automation of tasks based on specific events and operator actions
• Monitor Event triggers and logs and monitor the alarm system
• Disable, enable and log access card as lost via the use of forcefield system
• Track user activities through event logs
• Report urgent matters such as Communications down, increase in communications room temperature and tamper at Communication cabinets, and low batteries
• Respond to fire trip in case it occurs on site
• Respond to critical calls in case staff press the duress alarm, as a controller, call the staff, check if he/ she is all right. In case, they are in trouble, inform the managers to take an action such as contacting police, and prepare the footages for the police.
• Deal with different types of alarms such as REED alarm, Multiple PIR Alarm, Duress Alarm, Holdup Alarm, Single PIR.
Gartner system (locker Management system)
• In the event of forced entry, an alarm is displayed on the network PC. For maximum security, a customizable alarm message can be sent concurrently via e-mail to the intended user
• Occupancy monitoring: When locker space is at a premium, operators can see in real-time which lockers are in use making it possible to direct people to available locker
• Locker Usage Data: All actions are logged in the software, making it possible to know who has opened which locker and when.
• Remote Locker Control: remotely unlock the locker for the user
• WEB INTERFACE Via the web interface, operators can monitor the occupancy and alarm status, add new users, make locker reservations, and view locker usage reports
Gallagher system (An access control solution)
• Set door and zone entry rules
• Monitor access points to know ‘where, when and why’ people are on your site at all times
• Proactively manage site access by integrating with existing HR systems to share information about clearances, credentials, inductions, required permits, licenses and other competencies for card holders
• Manage and control access for visitors
• respond rapidly with a reliable and effective emergency management system, including lockdowns and alerts
• Manage intruder alarms
• Manage cardholders, including their access, cards and photo identification.
• Monitor alarms and control all system aspects

ICT Analyst

BATCO Construction Company
06.2009 - 06.2011
  • Create and deliver training materials for end-users on how to use new systems or software
  • Stay up to date with the latest trends and technologies in the ICT field
  • Ensure that the company’s IT infrastructure complies with industry standards and regulations
  • Work closely with other departments to understand their technology needs
  • Implement and manage backup strategies to ensure data protection
  • Provide support to end-users with technical issues
  • Ensure that network systems run efficiently
  • Collaborated with cross-functional teams to identify opportunities for process improvement and increased efficiency.
  • Managed multiple projects simultaneously while adhering to strict deadlines and quality standards.
  • Created and managed project plans, timelines and budgets.

ICT Support Officer & Network Specialist

AMS School
05.2005 - 10.2009
  • Responsible for providing technical assistance, support, and troubleshooting to an organization's computer systems, network and software
  • Assisting employees with hardware and software issues
  • Performing regular updates, patches, and maintenance tasks on the organization's ICT systems
  • Training employees on how to use new software, systems, or tools effectively
  • Managing a help desk to log and resolve technical problems
  • Setting up new systems, software, or hardware for employees
  • Keeping records of all issues and their solutions

Education

Ph.D. - Cybersecurity Risk Assessment and Management Framework for Medically Implanted Devices (MIDs)

Western Sydney University
Sydney, NSW
01.2025

M.D. - Cyber Security

Macquarie University
Sydney, NSW
01.2020

Master of IT Management - IT Network Security

Federation University
Sydney, NSW
01.2014

Skills

  • Vulnerability assessment & Risk Management
  • Data collection and analysis, Interview participants, Ethical approvals
  • Effective communications and collaboration with team members
  • Problem solving, active listener, analytical thinking, attention to detail

Certification

  • CompTIA A+, 01/01/20, 12/31/21
  • CCNA (Certified Communication Networking Academy), 01/01/21, 12/31/23

Languages

English
French
Arabic

Research Interests

  • Examining the awareness among medical professionals regarding security vulnerabilities in AI-powered medical devices (IoT and MIDs)
  • Researching the cybersecurity challenges posed by the increasing interconnectivity of devices within the Internet of Medical Things (IoMT) and Medical Devices (MID) ecosystem
  • Incident response planning and strategies for addressing identified vulnerabilities, breaches, or cybersecurity incidents involving medical devices
  • Implications of regulatory frameworks on medical device cybersecurity, including compliance strategies and reporting requirements
  • Role of regulatory bodies in enforcing cybersecurity standards
  • Exploring advanced authentication mechanisms and access controls for medical devices
  • Examining the security risks and threats associated with online gaming and the applicability of security measures and safe gaming practices
  • Examination of the cybersecurity of drones, especially related to encryption and authentication for secure drone communication
  • Protection against drone hijacking and control takeovers
  • Detection of drone malware and overall threat detection
  • Safeguarding sensitive data collected by drones
  • Networking cybersecurity for drones
  • Security considerations for cloud and edge computing used in drone operations
  • Regulatory framework for drone security, including the application of AI for threat detection

Timeline

Security Administrator

EY
04.2022 - 12.2024

Security Controller

IAG
02.2020 - 01.2022

ICT Analyst

BATCO Construction Company
06.2009 - 06.2011

ICT Support Officer & Network Specialist

AMS School
05.2005 - 10.2009

Ph.D. - Cybersecurity Risk Assessment and Management Framework for Medically Implanted Devices (MIDs)

Western Sydney University

M.D. - Cyber Security

Macquarie University

Master of IT Management - IT Network Security

Federation University
Ayman Chalak