IT infrastructure engineer currently studying at Al Iraqi University. Hands-on experience managing hybrid environments (Windows Server, Linux, VMware, Azure AD). Specializing in network penetration testing, SIEM engineering, and incident response. Level 7/10 engineer with strong practical skills.
Passionate about building resilient systems and hunting threats before they become breaches. When I'm not in a terminal, I'm competing in CTFs or contributing to open-source security tooling.
#️⃣ TryHackMe · OSCP in progress · 12 lab boxes rooted
Full corporate forest: 2 DCs, file server, SQL, CA, ADFS. Simulated Golden Ticket & DCSync attacks with detection rules in Wazuh.
Splunk + pfSense + Windows event forwarding. Built 20+ custom correlation rules for brute-force, LOLBins, and privilege escalation.
Rust-based port scanner with service fingerprinting, NSE-style script engine, and JSON output. 2x faster than masscan for /16 subnets.
Built SIEM pipelines (Splunk + Wazuh) and detection rules. Conducted purple-team exercises in lab environments. Strong hands-on troubleshooting across Windows, Linux, and network infrastructure.
Managed 100+ virtual and physical devices. Designed VLANs, pfSense firewalls, and Active Directory environments. Automated deployments with Ansible and PowerShell. Level 7/10 practical proficiency.
Managed Windows Server labs, Active Directory, and hybrid Azure environments. Automated user provisioning with PowerShell. Built and secured multi-site network topologies.
Monitored SIEM alerts and performed initial triage. Created detection rules and incident response playbooks. Gained strong foundational skills in threat hunting.