Printing tool Download PDF


Strong Communications Skills, articulate oral and written reports and presentations including meetings and workshops.

Work experience

Information Security Engineer

  • Develop Information Security Plans and Policies.
  • Planning and implementing security measures.
  • Monitor the hospital networks and systems for security breaches or intrusions.
  • Operate Kaspersky Security Center © 2014 Kaspersky Lab.

Alcatel Lucent

Feb 2014Sep 2014

Network Operation Centre (NOC) Engineer

  • Ensure maximum possible service availability and performance.
  • Provision customer network services on core equipment.
  • Provide support services for Engineering and other technical teams.

Radiation Therapy Engineer

Operate and maintain Intensity-modulated radiation therapy (IMRT) and perform equipment repair of Linear Accelerator, Treatment Planning and Imaging equipment calibration as well as preventive maintenance of specialized Varian, Elekta and Siemens linear accelerators/radiation treatment planning systems within the healthcare network.


MS in Information, Network, & Computer Security

The program, applied in nature, is focused on the study of several important security skills that are in short supply. It addresses aspects of security, providing a comprehensive understanding of security and its implications on networks, web services, infrastructure, databases, and software design. Specific areas of study include, but are not limited to, best practices in security, network protection, intrusion detection, and hacker exploits.

Taif University

Mar 2004Jul 2008

Computer Science

Computer Science major work with standard technology that is widely used across many industries and disciplines. Students learn to program in multiple languages using multiple paradigms.

  • Design and integrate all elements of computer systems, including networks, hardware, and software.
  • Work with databases, algorithms, and operating systems
  • Explore cutting-edge areas such as data mining, digital compression, and virtual machine migration.
  • Design computing-based solutions to problems in various disciplines.
  • Conduct computing-based research.
  • Evaluate the social implications of computing.



Aug 2015Aug 2018

Certified Ethical Hacker

Certification Number:  ECC67889441181



  • Through my education, work experience, and general interest I've become familiar with multiple programming languages. These include VB, HTML, Java Script, VB Script, PHP, C, C++ and Java.

Operating Systems

  • Windows XP/Vista/7/ server 2008/2012.

  • Mac OSX.

  • Linux, Backtrack 5 and Kali.


  • GNS3, Packet Tracer, Putty, SecureCRT.

  • Penetration testing tools, Metasploit, Wireshark, Nmap.

  • Vulnerability Scanner, Nessus, Nexpose.


  • Microsoft Office  (Word, Excel, PowerPoint, Access, Visio, Project)

  • Adobe Photoshop.


  • Arabic – Native
  • English – Fluent