Linux Administrator • Cybersecurity Enthusiast • DevOps Engineer
Red Team enthusiast — skilled in offense, defense, and breaking systems to build them stronger.
I am a Red Team enthusiast passionate about exploring the offensive side of cybersecurity. My focus is on understanding how systems can be broken, exploited, and hardened to ensure stronger defenses. With a solid foundation in Linux, DevOps, and system administration, I approach security from both technical and strategic angles. My skills cover vulnerability assessments, exploitation techniques, incident response, and system hardening. I thrive on simulating real-world attacks to uncover weaknesses before adversaries do, while also collaborating with defenders to strengthen digital infrastructure. Driven by curiosity and a problem-solving mindset, I aim to bridge the gap between offense and defense — helping organizations stay resilient in the face of evolving threats.
Focus on cybersecurity, web development and systems programming. Coursework includes algorithms, networks and security fundamentals.
Science stream with Computer Science electives. Participated in coding contests and tech clubs.
Completed Cybersecurity training with AlNafi, focusing on ethical hacking, penetration testing, and system defense. Gained hands-on experience in threat detection, vulnerability assessment, and real-world attack simulations.
Through Cisco Networking Academy, I built a strong foundation in cybersecurity by exploring threat landscapes, attack types, and defense strategies. I learned how to secure endpoints against malware and unauthorized access, while also understanding layered defense, monitoring, and incident response techniques to strengthen systems against evolving cyberattacks.
Practical experience in vulnerability assessments, penetration testing, and red team operations. Skilled in identifying security gaps, simulating real-world attacks, and implementing defense strategies. Worked on system hardening, risk assessment, and incident response to ensure strong and resilient infrastructures.
Hands-on exposure to containerization, orchestration, and CI/CD pipelines. Experienced in securing deployments, managing cloud environments, and implementing automation for scalable and efficient operations. Focused on integrating monitoring and security practices within DevOps workflows.
Proficient in Linux administration and security, including service management, user permissions, and process control. Skilled in Bash scripting, automation, and troubleshooting. Experienced in configuring and securing network services, scheduling with Cron, and applying security best practices across distributions.
Developed skills in Python for automation, data handling, and security scripting. Combined technical knowledge with creativity through editing tools like Canva, Adobe Photoshop, and After Effects. Experienced in designing visual content, animations, and presentations, blending both programming and creative workflows.
Gained foundational knowledge of cybersecurity concepts, including threat landscapes, attack vectors, and the importance of digital security. Learned about the principles of confidentiality, integrity, and availability (CIA triad), along with basic strategies to protect individuals and organizations against cyber risks.
Developed understanding of defensive security measures, focusing on firewalls, intrusion detection/prevention systems, and layered defense strategies. Learned how to monitor, detect, and respond to malicious activities while ensuring network resilience against evolving cyber threats.
Interested in collaborating or have a question? Reach out — I respond to thoughtful messages.