About
I'm a 20-year-old cybersecurity student at The Hashemite University in Jordan, passionate about building secure, privacy-focused digital solutions.
I specialize in web security, AI application development, and open-source contributions.
My journey spans Python (Flask), JavaScript, cybersecurity practices, and AI/ML integration.
I believe in creating tools that solve real problems while respecting user privacy - which is why many of my projects focus on local processing and offline capabilities.
Experience
Delivered full-cycle security and backend solutions, specializing in Linux infrastructure hardening, cloud database management, and secure automation.
Infrastructure & Security Hardening (Linux/VPS)
- Server Hardening: Provisioned and secured Arch Linux and Ubuntu VPS environments. Implemented rigorous security protocols including Port Security, Fail2Ban, and service isolation.
- Secure Access Control: Replaced standard access methods with Hardened SSH using 3-Factor Authentication (Key + Password + TOTP) and enforced secure file transfer protocols via SCP.
- Network Security: Deployed and managed Virtual Private Networks (OpenVPN) with custom client profiles (macOS/Android) to tunnel traffic securely.
- Vulnerability Management: Conducted port scanning and vulnerability assessments on active services, patching security gaps and reducing the attack surface.
- Disaster Recovery: Engineered manual backup scripts with automated cronjobs and validated restore functionality to ensure data integrity.
Backend Development & Automation
- Database Administration: Architected and managed Firestore databases for real-time data transactions. Built custom Admin Panels integrated with Flask to visualize and manage data streams efficiently.
- Secure Chatbot Integration: Developed Python-based chatbots for authentication systems, linking legacy web-email protocols to modern chat interfaces via secure APIs.
- Storage Solutions: Configured Encrypted Network-Attached Storage (NAS) accessible only via VPN, utilizing local AI models for automated photo sorting and identification.
- Web Security: Performed security audits and penetration testing on WordPress deployments, securing plugins and hosting environments against common web vulnerabilities.
- Authored enterprise security policies including data sharing and retention policies aligned with ISO 27001, ISO 27701, and JDPL
- Conducted vulnerability assessments using enterprise security tools by coordinated remediation efforts with data owners across multiple departments
- Performed threat intelligence analysis and security incident investigations using SIEM platforms and threat detection systems
- Analyzed cybersecurity frameworks including ISO 27701 and Jordan Data Protection Law for enterprise compliance implementation
- Supported security configuration management and coordinated with threat management teams on incident response procedures
Provided comprehensive technical services ranging from full-stack e-commerce development to low-level hardware optimization and digital growth strategies.
E-Commerce Development (Shopify, Zid, Salla)
- Full-Stack Deployment: Launched fully functional e-commerce stores across multiple platforms (Shopify, Zid, Salla). Handled end-to-end setup including domain integration, DNS configuration, and payment gateway connections.
- Frontend Customization: Edited and optimized frontend code to enhance UI/UX, ensuring responsive design and seamless user navigation.
- Product & Inventory Logic: Managed complex product configurations, bulk importing, and inventory categorization for rapid store launches.
Digital Growth & SEO
- Search Engine Optimization: Audited and optimized website structures for technical SEO, improving keyword ranking and organic visibility on search engines.
- Performance Marketing: Managed paid ad campaigns (Google, Meta) based on data-driven audience segmentation and performance analysis.
System Optimization & Hardware Diagnostics
- OS Tuning: Executed deep Windows optimizations, including registry edits, service debloating, and power plan management to minimize system latency for competitive gaming.
- Hardware Engineering: Performed advanced BIOS/UEFI configuration (overclocking/undervolting) and stress-testing (CPU/GPU/RAM) to ensure stability under peak loads.
- Driver Management: Utilized specialized tools (DDU) for clean driver installations to eliminate bottlenecks and input lag.
Education
Projects.
Co-developed a system to secure audit logs against tampering using cryptographic hash chaining (SHA-256) and distributed checkpoints with threshold signatures (3,5 Shamir's Secret Sharing). Prototype built with Python (Flask) and JavaScript, featuring an interactive Attack Simulation Lab.
Led the development of GRC AI, a platform leveraging local AI (Ollama, Gemma2 2B) for automated policy analysis and multi-framework compliance assessment (GDPR, ISO27001, PCI DSS, HIPAA, NIST, Jordan DPL). Placed TOP 5 in Jordan - Governance AI Hackathon (36 Hours).