Dr. Haitham is an experienced and highly motivated Information Security professional with a results-driven, strategic mindset. He has extensive expertise in developing, implementing, and managing comprehensive security strategies that protect digital assets, networks, and data. With a proven track record of aligning cybersecurity initiatives with business objectives and regulatory frameworks, Dr. Haitham ensures compliance with industry standards and proactively manages risks. Currently seeking a challenging role in Information Security Management or an executive-level position as a Cybersecurity Consultant, Dr. Haitham aims to provide visionary leadership and drive organizational resilience against the ever-evolving landscape of cyber threats.
Advisory & Technology Due Diligence
- Provide strategic advisory and due diligence for the evaluation and implementation of emerging technologies, ensuring alignment with organizational objectives and risk posture.
- Oversee security and hosting requirements, ensuring full adherence to local and international data sovereignty laws and compliance standards.
- Collaborate with internal stakeholders and third-party providers to validate architecture, hosting models, and data residency practices against legal and regulatory requirements.
· Scrum Alliance Certified Agile Leadership
· Computer Forensics Examiner. (CCFE)
· Certified Data Recovery Professional. (CDRP).
· Certified Information Security Manager (CISM) Course
· ISO27001 Certified ISMS Lead Auditor
· ISO 31000 Certified Lead Risk Manager
·ISO 22301 Lead Business Continuity Manager
Accomplishments, Research & Publication
For updated Publications and Projects Please, visit my Research Gate Account https://www.researchgate.net/profile/Haitham_Al_Hajri
1. Covid-19 Impacts On Organization Infrastructure Via Exploiting Society Digital Illiteracy: The Rise Of Electronics
November 2020 - Authors : Haitham Hilal al Hajri Badar Mohammed Al Mughairi Dr. Asif Mahbub Karim Mohammad Shahadat Hossain
2. Ransomware a Concealed Weapon of Cyber Extortion: The Beginning Unfolded
July 2019 - Authors: Haitham Hilal al Hajri Badar Mohammed Al Mughairi Dr. Asif Mahbub Karim
3. The Innovation of Internet Industries Transformed to Fourth 4 th Industrial Revolution: Threats and Challenges of the Cyber-Enabled Industries : )International Journal of Engineering and Technology)
June 2019 –Authors : Haitham Hilal al Hajri
4. An Innovative Cyber Security based Approach for National Infrastructure Resiliency for Sultanate of Oman
March 2019 – Authors :Badar Mohammed Al Mughairi Haitham Hilal al Hajri Dr. Asif Mahbub Karim Mohammad Imtiaz Hossain
5. Crypto Jacking a Technique to Leverage Technology to Mine Crypto Currency
March 2019 - Authors: Haitham Hilal al Hajri Mohammad Imtiaz Hossain Dr. Asif Mahbub Karim Badar Mohammed Al Mughairi
6. iPhone Forensics Methodology & Tools
January 2008 Authors : Haitham Hilal al Hajri Krishnun Sansurooah
7. Taxonomy of iPhone Activation and SIM Unlocking Methods
January 2007 Authors :Marwan Al-Zarouni Haitham Hilal al Hajri
8. The Effectiveness of Investigative Tools for Secure Digital (SD) Memory Card Forensics
January 2007 Authors :Haitham Hilal al Hajri Patricia A H Williams
9. A Proof-of-Concept Project for Utilizing U3 Technology in Incident Response
2008 : Authors :Marwan Al-Zarouni Haitham Hilal al Hajri
2025 - CISO of the Year award at the Dlive Awards 2025
2024 - Cyber Security Research & Education Leadership Award Muscat Daily Cyber Security & Cloud Conference,
2024 - CISO of the Year award at the Business Today CXO Awards 2024.