I’m a computer Cybersecurity addict from Iraq, and below is a short answer to whoami.

NOTE: This is an old page and has not been updated in years (but will very soon)! Want to know more about whoami? Check my bio here.


  • PhD, research was on a new Port Knocking Technique called Tariq. (Scapy)
  • MS, research was on Software Maintenance using a new Plugin Engine technique. (Visual C++)
  • BS, research was on a new Form Shape Designer and an MP3 Player with Robotic Effects. (Visual C++)

Current Job:

  • Currently working as a Professor during the day for both Computer and Digital Forensics and Cybersecurity programs at Champlain College. During the night a researcher and an investigator.


Contributions and Achievements:

Technical Profile (old and not updated in years!):

  • Operating Systems
    Linux (Red Hat, CentOS, Fedora, Debian, Ubuntu)
  • Unix IBM AIX, and Unix Sun Solaris
    Microsoft Win2K, Win2003, Win2008, WinXP, Vista, and Windows7

  • Hardware
    Intel Based x86/x86-64 Servers (HP/Dell), IBM Power Servers, Sun SPARC Servers

  • Development
    Shell Scripting, Python, C/C++, Java, Pascal/Delphi, Assembly (Linux/Windows), PHP, and HTML

  • DBMS
    MySQL, PostgreSQL, MSSQL, IBM DB2, and SQLite

  • Network Services
  • Installing, Configuring, Hardening, and Tuning any of the following services:
    DHCP, DNS (BIND), Apache, Tomcat, Subversion (SVN), SMB/CIFS, NFS, SSH, openLDAP, NIS, NTP, Squid, FTP, Sendmail, Postfix, Exim, IPTables, openVPN, Microsoft ISA, Active Directory, and Web Hosting (WHM/CPanel Web Hosting Control Panel, Plesk, and WHMCS).

  • Virtualization Hypervisor
  • VMware WorkStation, VMware Server, Xen, XenServer, Virtuozzo, OpenVZ and VirtualBox.

  • Infosec, Digital Forensics, and Malware Analysis
  • – Linux Kernel Patching, Compilation, Tunning, and Hardening.
    – Linux System Integrity, Data and Filesystem Encryption,
    – Hardening and Auditing Linux Services, Web Applications, and Firewalls.
    – Install, configure, and maintain IDS/IPS (Snort, OSSEC, etc) systems.
    – Install, configure, and maintain network security devices (Firewalls, VPN concentrators, routers, Internet Gateways, and content filtering systems).
    – Vulnerability Assessment and Patch Management (NeXpose, Nessus, SAINT Exploit, GFI LanGuard, Shavlik, MBSA, etc).
    – Exploit Development and Analysis (Spike, Ollydbg, Immunity Debugger, GNU Debugger (gdb), IDA Pro, etc).
    – Doing both Static and Dynamic Malware Analysis (Ollydbg, Immunity Debugger, IDA Pro, Sysinternals Suite, etc).
    – Penetration Testing using Metasploit Framework, Nmap, Maltego, etc.
    – Perform Network Security Auditing using Scapy.
    – Investigate network attacks and Traffic Analysis (Security Onion, tcpdump, Wireshark, Xplico, Snort, NetworkMiner, NetWitness Investigator, NetSniff-NG, TCPFlow, tcptrack, tcpreplay, etc).
    – Memory and Data Aquisition (Memoryze, DumpIt, FastDump, FTK Imager, ddcfld, dd, etc).
    – Retrieve and Analyze Data from a Suspect’s Computer (The Sleuth Kit (TSK), Autopsy, Forensic Toolkit (FTK), Digital Forensics Framework (DFF), ProDiscover, Foremost, Scalpel, MFTAnalyzer, Hex Workshop, Sysinternals Suite, P2 eXplorer, Dependency Walker, Windows File Analyzer, RegShot, RegRipper, different EXIF Viewers, etc).
    – Windows Memory Forensics using Volatility
    – Event and Log monitoring (Splunk, Syslog, Ntop, Nagios, munin, EventLog Analyzer, etc).
    – Writing Different Security Tools using Python
    – Implement and Enforce Security Policies and Procedures (PCI Compliance, etc).
    – Develop and maintain Business Continuity and Disaster Recovery plans.

Publications (Books, Papers, Courses, Whitepapers):

Training Courses Taken:

  • OpenStack Bootcamp, Mirantis
  • SourceFire Security Education Program – Snort IDS/IPS Technology v2.8
  • Project Management
  • Business Continuity & Disaster Recovery
  • SolarisTM 9 Operating Environment – 6 Months Track
  • Cisco Networking Academy Program, CCNA – 3 Months Track

Scientific Hobbies: (check my bio)

  • A computer addict, who just can’t leave his desk.
  • Reading about Digital Forensic, Incident Response, Malware & Network Traffic Analysis, Social Engineering, and Writing Simple Python Tools.


  • Trained Kickboxing for more than two years under the coach Omar Enayah (Holds Blackbelts in the follwoing: Kickboxing “5″, Mauy Thai “1″, Ji Jitsu “1″, Seylat “1″, Arabic Sword Fighter, and Qoowat Al-Rami “5 Qabtha”),
  • Left training for around two years, then got back to work, but as a Mauy Thai and Brazilian Jiu-Jitsu practitioner, under the same coach Omar Enayah,
  • A big fan of MMA and combat competitions (UFC, K-1, Strikeforce, DREAM, PRIDE),
  • Best fighter of all time: Fedor Emelianenko (MMA)
  • Other favorite fighters: Khabib Nurmagomedov, Justin Gaethje, Anderson Silva, Frankie Edgar, Carlos Condit, (all MMA) and Badr Hari (K-1),
  • Favorite fighting style is: Muay Thai,
  • Might be the biggest Real Madrid Football Club fan in the Middle East!
  • Used to present my University in Billiard competitions.

Social Activities:

  • Meeting new friends.
  • My Twitter [email protected].
  • I love a Majestic Palm Tree … it means a lot to me.