Printing tool Download PDF


Strong Communications Skills, articulate oral and written reports and presentations including meetings and workshops.

Work experience

Dec 2014Present

Information Security Engineer

Armed Forced Hospital in Taif Region
  • Develop Information Security Plans and Policies.
  • Planning and implementing security measures.
  • Monitor networks and systems for security breaches or intrusions.
  • Operate Kaspersky Security Center © 2014 Kaspersky Lab.
  • Deploy critical updates and security patch.
Feb 2014Sep 2014

Network Operation Centre (NOC) Engineer

Alcatel Lucent
  • Ensure maximum possible service availability and performance.
  • Provision customer network services on core equipment.
  • Provide support services for Engineering and other technical teams.
Apr 2008Dec 2008

Radiation Therapy Engineer

National Guard Health Affairs

Operate and maintain Intensity-modulated radiation therapy (IMRT) and perform equipment repair of Linear Accelerator, Treatment Planning and Imaging equipment calibration as well as preventive maintenance of specialized Varian, Elekta and Siemens linear accelerators/radiation treatment planning systems within the healthcare network.


Jan 2011May 2013

MS in Information, Network, & Computer Security

New York Institute of Technology

The program, applied in nature, is focused on the study of several important security skills that are in short supply. It addresses aspects of security, providing a comprehensive understanding of security and its implications on networks, web services, infrastructure, databases, and software design. Specific areas of study include, but are not limited to, best practices in security, network protection, intrusion detection, and hacker exploits.

Mar 2004Jul 2008

Computer Science

Taif University

Computer Science major work with standard technology that is widely used across many industries and disciplines. Students learn to program in multiple languages using multiple paradigms.

  • Design and integrate all elements of computer systems, including networks, hardware, and software.
  • Work with databases, algorithms, and operating systems
  • Explore cutting-edge areas such as data mining, digital compression, and virtual machine migration.
  • Design computing-based solutions to problems in various disciplines.
  • Conduct computing-based research.
  • Evaluate the social implications of computing.


Aug 2015Aug 2018

Certified Ethical Hacker


Certification Number:  ECC67889441181


  • Through my education, work experience, and general interest I've become familiar with multiple programming languages. These include VB, HTML, Java Script, VB Script, PHP, C, C++ and Java.
Operating Systems
  • Windows XP/Vista/7/ server 2008/2012.

  • Mac OSX.

  • Linux, Backtrack 5 and Kali.

  • GNS3, Packet Tracer, Putty, SecureCRT.

  • Penetration testing tools, Metasploit, Wireshark, Nmap.

  • Vulnerability Scanner, Nessus, Nexpose.
  • Microsoft Office  (Word, Excel, PowerPoint, Access, Visio, Project)

  • Adobe Photoshop.


  • Arabic – Native
  • English – Fluent