Computer Information graduate from Tanta University with CCNA, MCSA, and Network Security certifications. Passionate about enterprise networking, SOC operations, and building secure, resilient IT environments.
🎯 ABOUT ME🎯 نبذة عني
|
"I Am the First Line of Defense — I Detect Threats Before They Cost You"
I don't just monitor events — I transform chaotic data into actionable security intelligence.
I combine analytical speed with technical depth to identify real threats from thousands of alerts,
while maintaining operational continuity and protecting organizational assets around the clock.
"أنا خط الدفاع الأول — أكتشف التهديدات قبل أن تُكلّف"
لا أكتفي بمراقبة الأحداث — أحوّل البيانات الفوضوية إلى استخبارات أمنية قابلة للتنفيذ.
أجمع بين السرعة التحليلية والعمق التقني لتحديد التهديدات الحقيقية من آلاف التنبيهات،
مع الحفاظ على استمرارية العمليات وحماية أصول المؤسسة على مدار الساعة.
A fully designed enterprise network simulation for a hospital environment built in Cisco Packet Tracer. The topology covers multi-department segmentation using VLANs, inter-VLAN routing, DHCP, DNS, and access control policies to ensure secure and reliable communication across hospital departments.
Continuous monitoring of security events using SIEM platforms. Triaging alerts, filtering false positives, and escalating confirmed incidents with full documentation.
SplunkSIEMLog Analysis
🔍
Threat Detection & Hunting
Proactive identification of hidden threats using IOCs, attack patterns, and MITRE ATT&CK framework to detect adversaries before damage occurs.
MITRE ATT&CKIOCsThreat Intel
⚡
Incident Response & Handling
End-to-end incident handling covering containment, eradication, and recovery. Detailed post-incident reports with root cause analysis and remediation steps.
DFIRPlaybooksReporting
🔒
Vulnerability Assessment
Scanning and evaluating systems for security weaknesses, misconfigurations, and exploitable vulnerabilities with prioritized remediation recommendations.
Vulnerability MgmtRisk Assessment
🌐
Network Security Design
Designing and implementing secure network architectures with firewalls, IDS/IPS, ACLs, VLANs, and VPNs to protect enterprise infrastructure.
FirewallsIDS/IPSVPNACLs
📊
Security Reporting & Documentation
Creating clear technical and executive security reports, incident summaries, and risk assessments tailored to both technical teams and management stakeholders.
Technical ReportsExecutive Briefs
Let's Connect
Open to Opportunities
Actively seeking entry-level SOC or Network Security roles. Ready to contribute to enterprise IT environments and grow within a motivated team.