Cybersecurity fresh graduate from University of Hafr Al-Batin.
I monitor, hunt, and respond — from SOC dashboards to MITRE ATT&CK
chains, log pipelines and honeypots.
I'm a cybersecurity fresh graduate with hands-on experience in security monitoring, network defense, and information security auditing.
My recent chapter includes a Cybersecurity Specialist co-op at King Fahad Medical City (KFMC), where I worked across SOC operations — real-time threat detection, log analysis, incident response, and endpoint protection across hospital infrastructure.
Outside the co-op, I build lab environments: a honeypot + SIEM pipeline for my capstone, offensive security exercises on TryHackMe and HackTheBox, and certifications from Cisco, SDAIA, and Tuwaiq Academy.
I'm aiming for SOC Analyst, Threat Hunter, or Security Audit roles — with a particular interest in the intersection of detection engineering and the Saudi regulatory landscape (NCA ECC, SAMA).
Monitored and analyzed cybersecurity systems and network protection, supporting real-time threat detection across hospital infrastructure.
Participated in incident response operations and log analysis, supported IT teams in managing security systems and endpoint protection.
College of Computer Science & Engineering — coursework across network security, cryptography, secure systems, digital forensics, and governance/compliance. Capstone: Honeypot + SIEM Threat Detection Platform.
Designed and deployed a Cowrie / T-Pot honeypot integrated with an ELK / Wazuh SIEM to capture and analyze real-world attacker behavior in a controlled environment. Built log collection pipelines, wrote threat detection rules, and created dashboards — mapping observed TTPs to MITRE ATT&CK and generating SOC-style incident reports.
Contributed to security monitoring and incident response operations during the KFMC internship — supported log review, alert triage, and network protection workflows inside a live healthcare SOC environment.
Hands-on vulnerability assessment and exploitation — web app testing, network recon, and privilege escalation chains — using Kali Linux, Metasploit, Nmap, Burp Suite, and Wireshark. Ongoing practice on TryHackMe and HackTheBox.