Mohammad Mosleh

Cyber Security and Cloud Computing Specialist

Amman, Jordan
+962776319568
maxgold222@gmail.com
February 24, 2002

About Me

Specializing in cybersecurity and cloud computing, with expertise in securing digital environments, implementing robust cloud-based solutions, and designing secure, scalable IT infrastructures.

Proficient in risk assessment, threat mitigation, and compliance with security standards, with a focus on leveraging cloud technologies to enhance organizational efficiency and resilience against evolving cyber threats.

Personal Information

  • Nationality: Jordanian (Born in Saudi Arabia)
  • Languages: Arabic (Native), English (Fluent)
  • Current Location: Amman, Jordan
Mohammad Mosleh in graduation attire

Experience & Education

My professional journey and academic background in cybersecurity and cloud computing.

Work Experience

Inspire For Solution Development

Apr 2025 - Present

Networking & Cyber Security Engineer

Amman, Jordan

Accomplishments:
  • Installed and deployed IBM QRadar SIEM, working in the SOC for monitoring security events and incidents
  • Installed and configured firewalls (Sophos), VPN solutions, and Active Directory to enhance network security infrastructure
  • Worked with Kaspersky EDR, enhancing the organization's cybersecurity posture and endpoint protection
  • Conducted penetration testing to assess vulnerabilities and strengthen overall security measures
  • Installed and deployed IBM Guardium for database security, helping protect sensitive data and ensure compliance
  • Provided technical support for network security tools and infrastructure for troubleshooting issues

Cloud Seven Technology Solutions LLC

Feb 2023 - Jun 2023

Cyber Security Advisor (Remote)

Abu Dhabi, UAE

Accomplishments:
  • Provided remote assistance in improving cybersecurity infrastructure and preventing phishing scams and malware attacks
  • Educated employees on the risks of cyber attacks and implemented training programs to enhance cybersecurity awareness
  • Collaborated with the IT team to implement effective cybersecurity measures and protocols

Green Circle

Jul 2024 - Sep 2024

Trainee

Amman, Jordan

Accomplishments:
  • Worked on a virtual company environment to detect vulnerabilities and secure its infrastructure
  • Managed and implemented security policies to safeguard company assets and ensure operational continuity
  • Conducted penetration testing on a virtual company environment to identify and exploit vulnerabilities

Education

Applied Science Private University

Oct 2021 - Feb 2025

B.A Cyber Security and Cloud Computing

Amman, Jordan

GPA: 81.1

Certifications

  • Certified Ethical Hacker (CEH)
  • Cisco Certified Network Associate (CCNA) Training
  • Huawei Advanced Cloud Computing
  • Network Development Group (NDG) from Cisco
  • Cybersecurity Essentials from Cisco Skills
  • AWS Academy Certified Cloud Practitioner CCP
  • AWS Academy Cloud Developing Course
  • AWS Academy Cloud Security Foundations Course
  • AWS Academy Cloud Architecting Course

My Projects

Showcasing my technical expertise through various cybersecurity and development projects.

Linux-based GUI Network Scanner

Implemented a Linux-based GUI tool for network scanning, combining features of Sandmap and Nmap tools to simplify the scanning process for users.

Web Encryption System

Designed and implemented a web encryption page utilizing a combination of DES and Playfair encryption algorithms to encrypt plaintext in a highly secure manner.

Bus Trips Reserving System

Developed an ASP.NET Core-based Bus Trips Reserving System (BTRS) with user authentication, trip management, and streamlined booking features.

Python Security Automation Tool

Developed a Python-based tool for automating security tasks, enhancing efficiency and consistency in security operations.

Django Network Security Manager

Created a web application using Django framework for managing network security configurations and monitoring security status.

Skills & Expertise

My technical skills and cybersecurity expertise that enable me to deliver secure and efficient solutions.

Technical Skills

Python programming

Web programming (back-end and front-end)

C++ and Java programming

Linux OS and other operating systems

GO programming language

Fyne framework

CTF competitions

Cybersecurity Expertise

Digital Forensics: Expertise in the analysis and recovery of digital evidence, with experience in handling forensic investigations.

Security Operations Center (SOC) Analysis: Skilled in monitoring, analyzing, and responding to security incidents in a SOC environment.

Penetration Testing: Hands-on experience with penetration testing tools and techniques to identify vulnerabilities in networks and applications.

Ethical Hacking: Proficient in ethical hacking methodologies for discovering and exploiting security weaknesses to improve system security.

Network Security: In-depth knowledge of network security protocols, architecture, and methodologies to safeguard sensitive data.

Threat Analysis and Mitigation: Experienced in identifying, analyzing, and implementing solutions to mitigate security threats.

Encryption and Decryption: Proficient in cryptographic techniques, including encryption and decryption of sensitive information to ensure data integrity and confidentiality.

SIEM Management: Hands-on experience with IBM QRadar SIEM deployment, configuration, and SOC operations for real-time security monitoring.

Endpoint Detection and Response (EDR): Proficient in Kaspersky EDR implementation and management for advanced threat detection and response.

Database Security: Experience with IBM Guardium deployment for database activity monitoring and data protection compliance.

Firewall Management: Skilled in Sophos firewall installation, configuration, and management for network perimeter security.

VPN Solutions: Expertise in implementing and managing VPN solutions for secure remote access and site-to-site connectivity.

Active Directory: Proficient in Active Directory installation, configuration, and management for enterprise identity and access management.

Get In Touch

I'm currently open to new opportunities in cybersecurity and cloud computing. Feel free to reach out if you'd like to work together.

Built with v0