Nadim Saliby
System & Security Engineer

About

Dedicated IT professional with over 6 years of experience, focusing on cybersecurity and digital forensics. Demonstrated success in improving system performance and security through strategic planning and execution. Skilled in troubleshooting complex issues and optimizing operations across both Windows and Linux environments. Committed to continuous learning and staying updated on industry trends to effectively tackle emerging challenges. A collaborative team player who excels in dynamic environments, driven by a passion for contributing to organizational success and fostering innovation.

Education

Certifications & diploma

  • Bachelor Degree in ICT - Emphasis on Digital Forensics
  • Microsoft Certified System Engineer - MCSE
  • Microsoft Certified System Administrator - MCSA
  • Cisco Certified Network Administrator - CCNA
  • PEN200 Training (OSCP Course) - Offensive Security

Experience

Freelance Penetration Tester and Bug Hunter

Carma

4T

Smart Solutions & E-Consultancy

Universant

Penetration Tester and Bug Hunter

Present

Freelancer

→ Detect and leverage web application vulnerabilities, including SQL Injection, Cross-Site Scripting (XSS), and Cross-Site Request Forgery (CSRF), to strengthen security measures.
→ Contribute to bounty programs by submitting detailed reports that drive security advancements.
→ Perform thorough penetration assessments on web applications, APIs, and networks, providing actionable recommendations for remediation.
→ Create custom scripts and tools to enhance and automate vulnerability detection workflows.

Skills

System Administration & Cloud Technologies


→ Windows Server Management: AD, GPO, PowerShell automation, & security hardening.

→ Linux Administration: Optimization, service management, patching, and scripting.

→ Cloud Operations (AWS, Azure): Identity management, IAM policies, VPC design, and automation.

→ Privileged Access Management: Implementing PAM strategies to secure privileged accounts & mitigate insider threats.

Network Engineering & Monitoring


→ Firewall & VPN Solutions: Rule configurations, site-to-site VPNs, and secure access.

→ Network Diagnostics: Packet analysis and advanced troubleshooting.

→ Monitoring Solutions: Log pipelines, real-time alerting, and visualization.

Cybersecurity & Forensics


→ Vulnerability Assessment & Exploitation: Conducting detailed vulnerability assessments and penetration testing across networks, systems, and applications.

→ Memory & Disk Forensics: Analyzing artifacts to trace malicious activity and recover evidence.

→ Threat Intelligence & OSINT: Profiling, threat hunting, and mapping attack surfaces.

Projects

Blockchain Investigations

Decoding Ethereum

This guide explores how investigators can crack open the blockchain to uncover hidden transactions and connections.

Art of Anti-Forensics

Techniques for Hiding Digital Footprints

Advanced anti-forensics techniques, such as trail obfuscation, data destruction, encryption, and steganography. It provides detailed explanations of how attackers employ these methods to hide their activities. The article also outlines commands and strategies for detecting and preventing these techniques.

WAFs & IPS evasion

Deep Dive into Advanced bypass techniques

Advanced techniques for bypassing Web Application Firewalls (WAF) and Intrusion Prevention Systems (IPS). Learn how to outsmart modern security measures with real-world examples.