“It is my absolute pleasure to recommend Alim Al Razi, with whom I had the privilege of collaborating during the transformative digitization of HR operations. His innovative problem-solving prowess, paired with his astute process development acumen and persuasive deployment strategies, consistently resulted in remarkable outcomes. His exceptional people skills and mastery of stakeholder management further distinguished him as a true leader in his field. Working alongside Alim Al Razi was both inspiring and rewarding, and I have every confidence in his continued success and impact in any endeavor he undertakes.”
About
I am a seasoned IT professional with 18 years of experience in various domains and 8 years of specialized expertise in information security to safeguard organizations' infrastructure and information assets. Experienced in leading Governance, Risk & Compliance (GRC), ISMS, security operations, security assessments & audits, security solutions implementation, vulnerability assessment (VA) & penetration testing (PT), security incident response, and disaster recovery planning. Exhibits a thorough understanding of the COBIT, NIST, ISO 27001, and ITIL frameworks to produce policies that meet the highest standards. Certified in CISSP, CISM, ISO 27001 ISMS Lead Auditor, CEH, and other industry-recognized certifications. Proficient at implementing advanced security measures to protect organizational assets and data.
Activity
-
The color of blood is RED not BLACK #JulyMassacre #SaveBangladeshiStudents #StudentsAgainstOppression #FreeBangladeshiStudents #SaveBangladesh
The color of blood is RED not BLACK #JulyMassacre #SaveBangladeshiStudents #StudentsAgainstOppression #FreeBangladeshiStudents #SaveBangladesh
Posted by Alim Al Razi
-
#SaveMyCountry #SaveBangladesh #SaveBangladeshiStudents https://lnkd.in/geuDrHyd
#SaveMyCountry #SaveBangladesh #SaveBangladeshiStudents https://lnkd.in/geuDrHyd
Shared by Alim Al Razi
-
THE R3SISTANC3 hacked Bangladesh bank website and the message is…
THE R3SISTANC3 hacked Bangladesh bank website and the message is…
Shared by Alim Al Razi
Experience
Education
Licenses & Certifications
-
Situational Leadership
Ken Blanchard
Issued -
SAP Certified Technology Associate - System Administration (Oracle DB) with SAP NetWeaver 7.0
SAP
Issued -
Business Analysis
ESI
-
MCSE Exam Preparation
Jetking Bangalore
Volunteer Experience
Courses
-
SAP BASIS
-
Projects
-
Ethereum Smart Contract – Digital Locker
-
In this project, I have developed an Ethereum Smart contract app, DigitalLocker, intended to store digital assets securely on the blockchain network, where users can add assets, change their ownership, and view asset details. The app has four functions, two function modifiers, and two events. I have used Solidity programming language to build the app and Truffle & Ganache to test the app's functionalities.
-
ISO 27001:2022 Implementation Support and Conduct VA/PT
-
I completed this project as part of the MS Cybersecurity degree requirements at the New York Institute of Technology (NYIT), Vancouver. The objectives of the project are:
1. ISMS Control GAP Analysis: GAP analysis is a primary and critical step for organizations aiming to achieve ISO/IEC 27001:2022 certification. This analysis involves a comprehensive review of the existing controls to identify discrepancies between current practices and the total ninety-three controls set out by the ISO…I completed this project as part of the MS Cybersecurity degree requirements at the New York Institute of Technology (NYIT), Vancouver. The objectives of the project are:
1. ISMS Control GAP Analysis: GAP analysis is a primary and critical step for organizations aiming to achieve ISO/IEC 27001:2022 certification. This analysis involves a comprehensive review of the existing controls to identify discrepancies between current practices and the total ninety-three controls set out by the ISO 27001:2022.
1. Developing ISMS Policies, Guidelines, and Procedures by adhering to information security best practices and ISO 27001:2022. Policies have been developed to cover the applicable controls identified during the GAP analysis.
2. Support in Testing the Implementation of the Controls to mitigate the risks.
3. Conduct VA and PT to strengthen the security of web applications: I used "Nessus Essentials" to conduct the vulnerability assessment on the critical web applications, and after that, I performed a detailed analysis of the identified vulnerabilities for possible exploitation. Later, I used tools such as Metasploit, Burpsuite, Zed Attack Proxy(ZAP), Hydra, Jenkins CLI, etc., to perform penetration testing and exploit some vulnerabilities to gain unauthorized access to the client applications. Finally, I suggested a mitigation solution to fix those vulnerabilities and harden the applications.Other creators -
SAP GRC - Access Control
-
GRC-AC solution automates the process of detecting, remediating, and ultimately preventing access risk violations. It enables real-time visibility into current risk position – so we can confidently manage and reduce unauthorized access, fraud, and the cost of compliance across our enterprise.
Key business benefits:
# Automatically detect and remediate access risk violations across SAP and non-SAP systems
# Embed compliance checks and mandatory risk mitigation into business…GRC-AC solution automates the process of detecting, remediating, and ultimately preventing access risk violations. It enables real-time visibility into current risk position – so we can confidently manage and reduce unauthorized access, fraud, and the cost of compliance across our enterprise.
Key business benefits:
# Automatically detect and remediate access risk violations across SAP and non-SAP systems
# Embed compliance checks and mandatory risk mitigation into business processes
# Empower users with self-service, workflow-driven access requests, and approvals
# Automate reviews of user access, role authorizations, risk violations, and control assignments
# Better manage super-user access controls with a centralized, closed-loop process
# Create a comprehensive audit trail of user and role management activitiesOther creators -
SAP GRC - Access Control
-
GRC-AC solution automates the process of detecting, remediating, and ultimately preventing access risk violations. It enables real-time visibility into current risk position – so we can confidently manage and reduce unauthorized access, fraud, and the cost of compliance across our enterprise.
Key business benefits:
# Automatically detect and remediate access risk violations across SAP and non-SAP systems
# Embed compliance checks and mandatory risk mitigation into business…GRC-AC solution automates the process of detecting, remediating, and ultimately preventing access risk violations. It enables real-time visibility into current risk position – so we can confidently manage and reduce unauthorized access, fraud, and the cost of compliance across our enterprise.
Key business benefits:
# Automatically detect and remediate access risk violations across SAP and non-SAP systems
# Embed compliance checks and mandatory risk mitigation into business processes
# Empower users with self-service, workflow-driven access requests, and approvals
# Automate reviews of user access, role authorizations, risk violations, and control assignments
# Better manage super-user access controls with a centralized, closed-loop process
# Create a comprehensive audit trail of user and role management activitiesOther creators -
SAP GRC - Access Control
-
GRC-AC solution automates the process of detecting, remediating, and ultimately preventing access risk violations. It enables real-time visibility into current risk position – so we can confidently manage and reduce unauthorized access, fraud, and the cost of compliance across our enterprise.
Key business benefits:
# Automatically detect and remediate access risk violations across SAP and non-SAP systems
# Embed compliance checks and mandatory risk mitigation into business…GRC-AC solution automates the process of detecting, remediating, and ultimately preventing access risk violations. It enables real-time visibility into current risk position – so we can confidently manage and reduce unauthorized access, fraud, and the cost of compliance across our enterprise.
Key business benefits:
# Automatically detect and remediate access risk violations across SAP and non-SAP systems
# Embed compliance checks and mandatory risk mitigation into business processes
# Empower users with self-service, workflow-driven access requests, and approvals
# Automate reviews of user access, role authorizations, risk violations, and control assignments
# Better manage super-user access controls with a centralized, closed-loop process
# Create a comprehensive audit trail of user and role management activitiesOther creators -
SAP GRC - Access Control
-
GRC-AC solution automates the process of detecting, remediating, and ultimately preventing access risk violations. It enables real-time visibility into current risk position – so we can confidently manage and reduce unauthorized access, fraud, and the cost of compliance across our enterprise.
Key business benefits:
# Automatically detect and remediate access risk violations across SAP and non-SAP systems
# Embed compliance checks and mandatory risk mitigation into business…GRC-AC solution automates the process of detecting, remediating, and ultimately preventing access risk violations. It enables real-time visibility into current risk position – so we can confidently manage and reduce unauthorized access, fraud, and the cost of compliance across our enterprise.
Key business benefits:
# Automatically detect and remediate access risk violations across SAP and non-SAP systems
# Embed compliance checks and mandatory risk mitigation into business processes
# Empower users with self-service, workflow-driven access requests, and approvals
# Automate reviews of user access, role authorizations, risk violations, and control assignments
# Better manage super-user access controls with a centralized, closed-loop process
# Create a comprehensive audit trail of user and role management activitiesOther creators -
SAP GRC Access Control
-
I was the Technical Lead of this Project and successfully complete the project.
Governance, Risk, and Compliance Access Control enables companies to confidently control access and prevent fraud throughout the enterprise by intelligently managing employee authorizations across mixed IT environments, allowing authorized exceptions, and accelerating resolution of any violations, all while reducing costs. This project would be instrumental for
• Reducing access risk across the…I was the Technical Lead of this Project and successfully complete the project.
Governance, Risk, and Compliance Access Control enables companies to confidently control access and prevent fraud throughout the enterprise by intelligently managing employee authorizations across mixed IT environments, allowing authorized exceptions, and accelerating resolution of any violations, all while reducing costs. This project would be instrumental for
• Reducing access risk across the enterprise
• Streamlining compliance processes
• Obtaining real-time oversight
After implementation of SAP GRC various in-house customization requirements will no longer be necessary. Based on current trend this will save approx USD 180K over five years. The present value of this savings is approx USD 123K .Other creatorsSee project
Honors & Awards
-
CSO's Award for AI Maturity Project
Robi Axiata Limited
-
CSO's Award for LEAP Project
Robi Axiata Limited
-
CEO's Award (Merger Hero) for Robi - airtel merger
Robi Axiata Limited
-
CEO Award for Best RADP project 2015
Robi Axiata Limited
-
Appreciation for Internal Trainer
Robi Axiata Limited
-
CEO's Appreciation for SAP GRC Project
Robi Axiata Limited
-
CTO's Award for SAP Version Upgrade Project Manager
Robi Axiata Limited
-
SAP Migration Project Leader
Robi Axiata Limited
-
Member of Robi Accelerated Development Program
Robi Axiata Limited
Languages
-
Bengali
Native or bilingual proficiency
-
English
Full professional proficiency
-
Hindi
Limited working proficiency
Organizations
-
SAP Forum BD
CEO
- Present
Recommendations received
12 people have recommended Alim Al
Join now to viewMore activity by Alim Al
-
#SaveBangladeshiStudents https://lnkd.in/gQFyi6jv
#SaveBangladeshiStudents https://lnkd.in/gQFyi6jv
Shared by Alim Al Razi
-
#SaveBangladeshiStudents https://lnkd.in/gshme5zS
#SaveBangladeshiStudents https://lnkd.in/gshme5zS
Shared by Alim Al Razi
-
#SaveBangladeshiStudents https://lnkd.in/gs_Fnnkc
#SaveBangladeshiStudents https://lnkd.in/gs_Fnnkc
Shared by Alim Al Razi
-
THE R3SISTANC3 hacked the Bangladesh Police site and the message is clear. https://www.police.gov.bd/ #SaveBangladeshiStudents
THE R3SISTANC3 hacked the Bangladesh Police site and the message is clear. https://www.police.gov.bd/ #SaveBangladeshiStudents
Shared by Alim Al Razi
-
https://lnkd.in/g3g2faEf #SaveBangladeshiStudents
https://lnkd.in/g3g2faEf #SaveBangladeshiStudents
Shared by Alim Al Razi
-
New Credential Alert! I’m happy to share that I’ve obtained a new certification: AWS Certified Cloud Practitioner, View my verified achievement from…
New Credential Alert! I’m happy to share that I’ve obtained a new certification: AWS Certified Cloud Practitioner, View my verified achievement from…
Liked by Alim Al Razi
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Alim Al Razi
19 others named Alim Al Razi are on LinkedIn
See others named Alim Al Razi