Jabir Ibn Hayyan University for Medical and Pharmaceutical Sciences
7 years of experience
I have extensive professional experience in the field of cybersecurity and network security, with a strong focus on analyzing, maintaining, troubleshooting, and securing network infrastructures in both research and applied technical environments. My work has concentrated on evaluating system vulnerabilities, analyzing network traffic, and developing defensive strategies to enhance the resilience of digital systems against cyber threats.
Throughout my career, I have gained hands-on expertise using specialized cybersecurity tools and environments, particularly in network traffic analysis, penetration testing, and threat detection. My experience includes working with tools such as Nmap, Wireshark, and various Linux-based security distributions such as Kali Linux, which I have used to conduct detailed experiments involving TCP SYN scans, UDP scans, XMAS scans, NULL scans, and FIN scans. These experiments were performed in controlled research environments using virtual machines (Ubuntu as the target system and Kali as the attacker) to simulate real-world attack scenarios and document network behavior under different scanning techniques.
In addition to technical execution, I have developed structured methodologies, analysis reports, and detailed documentation to support academic and scientific research in cybersecurity. This includes creating technical manuals, experiment workflows, and comprehensive network packet analyses aimed at improving the understanding of port-scanning behavior, intrusion detection mechanisms, and network protocol vulnerabilities. My documentation work is aligned with academic standards and supports publication in peer-reviewed engineering and cybersecurity journals.
I have also contributed to training and capacity-building efforts by guiding students and technical teams in understanding cybersecurity fundamentals, network monitoring, and secure system configuration. My training sessions and materials emphasize practical, real-world problem-solving using open-source security tools and standard network defense techniques.
My professional experience is supported by ongoing research in cybersecurity and network defense, particularly in analyzing network vulnerabilities using packet-capture files and evaluating system response behavior under different scanning and probing conditions. This work contributes to improving security practices and developing more resilient network infrastructures in academic and engineering environments.
My academic specialization focuses on cybersecurity and network-security research using advanced laboratory and analytical equipment commonly utilized in scientific and educational environments. I have hands-on experience with the following systems, tools, and platforms:
Network & Cybersecurity Laboratory Equipment
Managed Network Switches (Cisco, TP-Link, MikroTik) for VLAN configuration, segmentation, and traffic isolation
Enterprise Routers & Firewalls (Cisco ISR, MikroTik Cloud Router Switch, pfSense appliances)
Wireless Access Points used for Wi-Fi security testing and encryption analysis
Virtualization & Simulation Systems
VMware Workstation and Oracle VirtualBox
for building attacker/target environments and simulating network infrastructures
Linux-based Security Labs (Kali Linux, Parrot Security OS)
Ubuntu / Debian Servers used for hosting vulnerable services for academic testing
Network Traffic Analysis & Protocol Research Tools
Wireshark
for packet inspection, protocol analysis, and network traffic monitoring
Nmap / Zenmap
used for port scanning experiments and vulnerability detection
TCPdump & Tshark
command-line packet capture tools for deep network analysis
Security Testing & Monitoring Systems
OpenVAS Vulnerability Scanner
Snort IDS / Suricata IDS
for intrusion detection research and experiment documentation
Metasploitable & DVWA
vulnerable virtual machines for controlled penetration testing
Scientific & Academic Computing Resources
High-performance computing nodes used for running analysis scripts
Python-based research tools (Scapy, Pandas)
used for packet manipulation and dataset analysis
https://scholar.google.com/citations?user=F_dKkJ0AAAAJ&hl=en