About me

Cybersecurity Researcher/Engineer with hands-on experience in offensive security, threat detection, and malware development/analysis. Strong background in conducting full-scope penetration testing across diverse environments, including web, mobile, cloud, networks, and Active Directory. Skilled in simulating real-world attacks, reproducing vulnerabilities using exploit PoCs and Metasploit, and developing detection content including IPS, log inspection, and integrity monitoring rules. Experienced in developing and reverse engineering malware samples, performing patch analysis, and validating detection coverage. Strong scripting background, with deep knowledge of network protocols, security frameworks, and cloud/container security.

What I'm doing

  • pencode icon

    Penetration Testing

    Perform comprehensive penetration testing across web applications, mobile platforms, networks, and cloud environments, identifying and exploiting security weaknesses to simulate real-world attack scenarios and strengthen overall security posture.

  • dev icon

    Threat Detection

    Design, develop, and validate threat detection logic by creating and tuning IPS signatures, integrity monitoring, and log inspection rules, leveraging exploit simulations, malware analysis, and patch behavior to ensure accurate detection with minimal false positives across diverse environments.

  • dev icon

    Security Automation & Scripting

    Develop and maintain automation scripts and pipelines using Python, Bash, PowerShell, and other scripting languages to streamline security testing, detection validation, and routine QA processes, enhancing efficiency and accuracy across threat research and penetration testing workflows.

  • pencode icon

    Code Auditing & Vulnerability Identification

    Perform secure source code analysis to identify vulnerabilities such as injection flaws, insecure deserialization, and logic errors across web and backend applications. Using both manual review and automated tools, I assess code for compliance with security best practices and provide actionable remediation guidance to development teams.

Resume

Education

  1. The German University in Cairo

    2015 — 2020

    • Bachelor of Science in Networks Engineering.
    • Thesis on "Collaborative Caching in Mobile Edge Computing for 5G Networks".

Experience

  1. Threat Researcher | Trend Micro

    2023 — Present

    • Develop and test IPS, Integrity Monitoring, and Log Inspection rules for accuracy and performance.
    • Reproduce vulnerabilities and attack scenarios to validate detection coverage.
    • Conduct testing using exploit PoCs, malware samples, Metasploit, and related tools.
    • Analyze and troubleshoot rule logic, code flaws, and false positive/negative behavior.
    • Perform security patch analysis to evaluate impact and effectiveness.
    • Automate testing tasks and workflows using Python, Perl, Ruby, and Bash.
    • Monitor emerging threats and analyze vulnerability scanner outputs.
    • Design and execute test cases aligned with specific security objectives.
    • Utilize tools such as VMware, SQL clients, binary editors, and browser developer tools.
    • Perform QA cycles including patch testing, rule validation, and routine security reviews.

  2. Information Security Engineer | Xceed

    2022 — 2023

    • Conduct network and web application penetration testing to identify and exploit security weaknesses.
    • Perform comprehensive vulnerability assessments across infrastructure and applications.
    • Serve as Tier 1 analyst in the Security Operations Center (SOC), handling initial triage and incident escalation.
    • Monitor enterprise networks and systems for potential threats, anomalies, and security breaches.

My skills

  • Offensive Security & Threat Research
    90%
  • Threat Detection & Exploit Analysis
    90%
  • Protocol & Network Security
    80%
  • Tools Proficiency
    80%
  • Scripting & Automation
    70%
  • Methodologies & Frameworks
    70%
  • Cloud & Container Security
    60%