Hello, I'm
Specializing in Security Operations and Incident Response, with hands-on experience in threat detection, log analysis, and network monitoring. Passionate about protecting digital environments and continuously developing practical cybersecurity skills through real-world labs and security platforms.
I am a Third-Year Cybersecurity Student at the Faculty of Artificial Intelligence, Menoufia University (Egypt), with a strong focus on Security Operations Centers (SOC) and Incident Response.
Through practical labs and cybersecurity platforms, I have developed hands-on experience in network monitoring, threat detection, log analysis, and security investigations. I regularly work with security tools such as Wireshark, Nmap, Burp Suite, Splunk, ELK Stack, and Wazuh to analyze network traffic, detect anomalies, and investigate potential security incidents.
My goal is to build strong expertise in cyber threat detection and incident response, helping organizations identify threats quickly and respond effectively to protect critical systems and data.
Motivated cybersecurity student seeking an opportunity as an Incident Response Analyst where I can apply my knowledge in network monitoring, log analysis, and threat detection to help organizations identify cyber threats and respond effectively to security incidents.
My long-term goal is to become a highly skilled Blue Team Security Specialist capable of defending modern infrastructures against evolving cyber threats.
SOC / Blue Team focused labs and implementations.
Analyzed captured PCAP files to identify suspicious network activity and potential indicators of compromise using Wireshark.
View ProjectSimulated SOC alert investigations by analyzing logs and identifying malicious activities through SIEM tools.
View ProjectPerformed security testing on web applications using Burp Suite to identify vulnerabilities such as authentication issues and misconfigurations.
View ProjectImplemented threat detection techniques using Splunk and ELK Stack to analyze security logs and detect abnormal activity patterns.
View ProjectMonitoring security events and analyzing logs to detect suspicious activities and potential breaches.
Assisting organizations in detecting, analyzing, and responding to cybersecurity incidents efficiently.
Inspecting local and external network traffic to identify anomalies and potential security threats.
Researching cyber threats and analyzing attack techniques (TTPs) used by modern adversaries.
Let's connect and discuss cybersecurity opportunities.
Whether you have a question or just want to say hi, I'll try my best to get back to you!