Download PDF

Summary

A life long independent learner, with leadership skills and variety of technology professions intertwined with an out of the box view of network relation structuring and big data security.

Education

Aug 2012July 2017

Bachelors of Science  in Computing Security

Rochester Institute of Technology

Minoring in Networking Administration

Aug 2009Jun 2012

Highschool Diploma

Institute of Applied Technology

Information Computing Security Cluster

Skills

NETWORK FORENSICS

Online tracking, search engine privacy, and network monitoring. Identification, recovery and prevention.

COMPUTING SYSTEMS AND ASSEMBLY LANGUAGE

Lowest level at the programming and execution over a computing system one the CPU level where the coding is converted from assembly code to registries then I/O bits.

PROTOCOL CREATION

Ability to understand the standardized protocols and configuration of new job specific protocols. 

AUTHENTICATION AND PRIVILEGE CONTROL

UNIX access control list and Radius authentication, the usage of kerbros and a level of privilege seperation.

CORPORATE SOCIAL RESPONSIBILITY AND ETHICS

Run through multiple social responsibility expectations and the practicality of such corporate volunteerly actions, then forming long term profit over the outcome.

WINDOWS FORENSICS

Familiarity with a number of tools used for forensics, some of which Shellbag, Process hacker, Inception, RAM capture, and prefetch.

RISK MANAGEMENT

Asses and Report risk at all 3 tiers of Risk Management organizational, Information, and managerial.

POLICY AND AUDITING

Engaged in policy creation, protocol deployment and revision.

INFORMATIVE WRITTING

Write articles, thesis and documentation, in Technological, scientific and economical subsections.

BACKUP SYSTEMS

Different steps of baclup and redundancy  to ensure availability of backup and efficient retrieval in case of crysis, and long lasting distibuted data storage.

DATA NETWORK SCANNING

Mapping networks and data bases over entire networks infrastructure through various tools and creating topologies.

CRYPTOGRAPHY

Understanding of the origions of cryptography both transpostional and substitutional all through the increasing difficulty as well as hashing methodolgy.

COMPUTER SCIENCE

Educated in Computer manufacturing and dismantling, as well as troubleshooting and upgrading based on requirements.

LEADERSHIP

Ability to lead and control a team into achieving a goal and preventing discouragement.

MICROSOFT OFFICE

iC3 certified in the office applications from various versions ranging from 2003 up to office 365, on both Macintosh and Windows OS's

PROGRAMMING

Capable of programming in various programing languages (VB/Excel, Visual Basics, PHP, Java, Python, C, C++, Matlab, Pearl, Shell Scripting, and Assembly Language).

NETWORK ADMINISTRATION

Setup for small businesses/homes , medium businesses and enterprises, wireless control and cable structuring.

PENETRATION TESTING

Intrusion and phishing testing for vulnerabilities and worm holes for web based services.

DATABASE SERVER INFRUSTRUCTURING

Structuring an organized, relative web/program based database systems capable of withstanding a basic level of intrusion.

WEB DEVELOPMENT

Developing a well designed interactive, server connected website with a secure preferences.

GRAPHICAL DESIGNING

Video, photo and audio editing using the available Adobe and iWORK/iLIFE softwares.

Work History

Aug 2009Present

interim CIO

KAFE - KHALIL ALFARDAN EXCHANGE

Heading a team of managing board in technological improvements and decision making for system upgrades and data control.

Jun 2015Sep 2015

NOC Trainee

Dubai Silicon Oasis Authority

Network Operation Team, penetration testing, network monitoring and database mapping.

Dec 2011Jan 2012

Volunteer

UAE ARMED FORCES

Training in discipline, stress handling and leading groups of personnel into working together and punctuality.

KEY SKILLS

  • Team Planning
novice ■■■■■■■□□□ expert
  • Microsoft Word, Excel, Access, Powerpoint, Publisher, etc.
novice ■■■■■■■■□□ expert
  • Cisco Certified Network Associate
novice ■■■■■■□□□□ expert
  • Windows & Mac
novice ■■■■■■■■■■ expert
  • UNIX & Debian
novice ■■■■□□□□□□ expert
  • PC Hardware
novice ■■■■■■□□□□ expert
  • Troubleshooting software, hardware and Networks
novice ■■■■■■■■□□ expert
  • Cinema 4D Graphic designing
novice ■■■■□□□□□□ expert
  • Secure Webdesign and development
novice ■■■■■■■□□□ expert
  • Mobile App development
novice ■■■□□□□□□□ expert
  • Cloud and Fog computing
novice ■■■□□□□□□□ expert
  • Parallel/Cluster Coputing & Programming 
novice ■■■□□□□□□□ expert
  • Risk Assesment
novice ■■■■□□□□□□ expert
  • Cryptography and covert channel communication
novice ■■■■□□□□□□ expert
  • Network and Computing Forensic tools
novice ■■■■■□□□□□ expert
  • Hands on IoT experience
novice ■■■■□□□□□□ expert

Languages

  • Arabic - (native language)
novice ■■■■■■■■■■ expert
  • English
novice ■■■■■■■□□□ expert
  • Urdu (oral)
novice ■■■□□□□□□□ expert

Projects

Projects I have worked on.

Programming Languages

  1. C
  2. C++
  3. Python
  4. Java
  5. PHP
  6. CSS
  7. AJAX
  8. JSON
  9. Javascript
  10. perl
  11. bash scripting
  12. Assmebly
  13. HTML
  14. XML
  15. JQuery
  16. Visual Basics
  17. Java (apk library)
  18. SQL
  19. Matlab
  20. Machine Language