I'm a junior offensive security professional based in the Eastern Province of Saudi Arabia. Day-to-day I work as an IT analyst — handling infrastructure, endpoints, and access for a corporate environment — and spend the rest of my time on Hack The Box, Active Directory labs, and the offensive security stack.
I earned my CPTS from Hack The Box in April 2026 after completing two pro labs — Dante and Zephyr. Currently working through CRTP, focused on Active Directory attack chains and Windows internals. BTL1 and eJPT came before that.
For roles, I'm not fixed on one track — pentesting, red teaming, SOC/threat detection, or security engineering. As long as the work is hands-on and technical, I'm interested.
Run IT and endpoint security for a 25-user corporate environment. Own user access and Active Directory hygiene, patching cadence, and AV/EDR coverage. First line on incidents — triage and resolve hardware, software, and network issues end-to-end.
Ran vulnerability assessments and penetration tests against university lab infrastructure. Surfaced exploitable misconfigurations and weak services, then wrote them up with risk ratings and concrete remediation steps the IT team could action.
Imaged and hardened lab workstations against a standard security baseline. Handled day-to-day hardware and software issues for students and staff, and wrote up procedures for the university's internal knowledge base.
Where I spend most of my off-hours — end-to-end attack chains against realistic corporate and Active Directory environments.
Internal network compromise — pivoting, post-exploitation, and privilege escalation across a corporate-style network.
Red team scenario focused on Active Directory attacks — Kerberos abuse, trust relationships, and lateral movement across multiple forests.

My journey from failing the BTL1 exam to scoring 95% on my second attempt. Learn about my preparation strategy, key mistakes, and tips for success.