Adam Asaad Abas
IT · Network · Cyber Security Engineer

$ whoami → Infra · Pentest · Defend
🔐 SOC Analyst 🌐 Network Architect 🖥️ SysAdmin ⚡ Red Team

$ whoami

IT infrastructure engineer currently studying at Al Iraqi University. Hands-on experience managing hybrid environments (Windows Server, Linux, VMware, Azure AD). Specializing in network penetration testing, SIEM engineering, and incident response. Level 7/10 engineer with strong practical skills.

Passionate about building resilient systems and hunting threats before they become breaches. When I'm not in a terminal, I'm competing in CTFs or contributing to open-source security tooling.

#️⃣ TryHackMe · OSCP in progress · 12 lab boxes rooted

$ skills --all

IT Infrastructure

  • Windows Server 2016–2022 / AD DS
  • Linux (RHEL, Ubuntu, Debian)
  • VMware vSphere / Hyper-V
  • Azure / Entra ID / Intune
  • Docker · Kubernetes (k3s)
  • Terraform · Ansible · Packer

Networking

  • Cisco IOS / NX-OS / Meraki
  • VLAN · VXLAN · OSPF · BGP
  • Firewalls: pfSense, FortiGate, Palo Alto
  • Wireless: Aruba, Ubiquiti
  • Wireshark / tcpdump deep analysis
  • SD-WAN · MPLS · VPN (IPsec/WireGuard)

Cyber Security

  • Penetration Testing (Web/Network/AD)
  • SIEM: Splunk, Wazuh, Sentinel
  • EDR: CrowdStrike, Defender for Endpoint
  • Threat Hunting · MITRE ATT&CK
  • Nmap · Burp Suite · Metasploit
  • Python / PowerShell / Bash automation

$ cat /etc/certificates

CompTIA Security+ CCNA (Cisco) AZ-500 (Azure Security) eJPT (elearnSecurity) PCNSE (Palo Alto) OSCP — Q3 2026 target

$ ls ~/projects/

Active Directory Lab

Full corporate forest: 2 DCs, file server, SQL, CA, ADFS. Simulated Golden Ticket & DCSync attacks with detection rules in Wazuh.

ADSecurityWazuh

SIEM Home Lab

Splunk + pfSense + Windows event forwarding. Built 20+ custom correlation rules for brute-force, LOLBins, and privilege escalation.

SplunkSIEMDetection

Network Scanner CLI

Rust-based port scanner with service fingerprinting, NSE-style script engine, and JSON output. 2x faster than masscan for /16 subnets.

RustNetworkingTooling

$ history | grep work

IT Security Engineer (Intern)

Freelance & University Projects · 2024 – Present

Built SIEM pipelines (Splunk + Wazuh) and detection rules. Conducted purple-team exercises in lab environments. Strong hands-on troubleshooting across Windows, Linux, and network infrastructure.

Network & Systems Administrator

Personal Homelab & University Labs · 2022 – 2024

Managed 100+ virtual and physical devices. Designed VLANs, pfSense firewalls, and Active Directory environments. Automated deployments with Ansible and PowerShell. Level 7/10 practical proficiency.

Systems Administrator (Student Projects)

Al Iraqi University · 2021 – 2023

Managed Windows Server labs, Active Directory, and hybrid Azure environments. Automated user provisioning with PowerShell. Built and secured multi-site network topologies.

Junior SOC Analyst (Intern)

University Security Lab · 2020 – 2021

Monitored SIEM alerts and performed initial triage. Created detection rules and incident response playbooks. Gained strong foundational skills in threat hunting.

$ nc -lvp contact