Hello World! Ali AlNaseeb here!
Hello World!
Ali here!
Hey there! I’m Ali B. AlNaseeb, a computer engineering student who’s fascinated by the art of breaking things—legally, of course! My main passion is penetration testing, where I get to dive into systems, find the cracks, and help businesses patch them before the bad guys can. Think of me as the person who keeps hackers on their toes.
Currently, I’m wrapping up my final year at The Pennsylvania State University, where I’m majoring in Computer Engineering and minoring in Cybersecurity. I’m also proud to represent Kuwait, where I earned a prestigious full merit scholarship from the Ministry of Higher Education—an honor given to just 5% of sponsored students.
One of the highlights of my career so far has been working at Kuwait Oil Company (KOC), where I was part of the Incident Response team and played a role in Cyber Threat Management. I spent a lot of time in the Information Security Operations Centre room, the beating heart of KOC’s cybersecurity operations. Alongside the KOC cybersecurity team and Deloitte, who served as a contractor, I focused on finding and patching vulnerabilities to keep their systems safe from digital threats.
When I’m not testing systems or hunting for security gaps, you’ll find me experimenting in the kitchen or planning my next travel adventure. Just like with technology, I’m always looking to discover something new—whether it’s a great recipe, an exciting destination, or a fresh approach to solving a problem.
Let’s connect! Whether you want to talk tech, brainstorm innovative ideas, or share travel tips, I’m always up for a great conversation.
Hey there! I’m Ali B. AlNaseeb, a computer engineering student who’s fascinated by the art of breaking things—legally, of course! My main passion is penetration testing, where I get to dive into systems, find the cracks, and help businesses patch them before the bad guys can. Think of me as the person who keeps hackers on their toes.
Currently, I’m wrapping up my final year at The Pennsylvania State University, where I’m majoring in Computer Engineering and minoring in Cybersecurity. I’m also proud to represent Kuwait, where I earned a prestigious full merit scholarship from the Ministry of Higher Education—an honor given to just 5% of sponsored students.
One of the highlights of my career so far has been working at Kuwait Oil Company (KOC), where I was part of the Incident Response team and played a role in Cyber Threat Management. I spent a lot of time in the Information Security Operations Centre room, the beating heart of KOC’s cybersecurity operations. Alongside the KOC cybersecurity team and Deloitte, who served as a contractor, I focused on finding and patching vulnerabilities to keep their systems safe from digital threats.
When I’m not testing systems or hunting for security gaps, you’ll find me experimenting in the kitchen or planning my next travel adventure. Just like with technology, I’m always looking to discover something new—whether it’s a great recipe, an exciting destination, or a fresh approach to solving a problem.
Let’s connect! Whether you want to talk tech, brainstorm innovative ideas, or share travel tips, I’m always up for a great conversation.
Kuwait City, Kuwait
Kuwait City, Kuwait
Kuwait City, Kuwait
Kuwait City, Kuwait
Skills
Skills
Skills
Skills
- Cyber Risk Analysis
- Penetration Testing
- Python
- Cyber Threat Management
- Network Security
- Incident Response
- Problem Solving
- Reverse Engineering
- WebApp Exploitation
- Cyber Risk Analysis
- Penetration Testing
- Python
- Cyber Threat Management
- Network Security
- Incident Response
- Problem Solving
- Reverse Engineering
- WebApp Exploitation
- Cyber Risk Analysis
- Penetration Testing
- Python
- Cyber Threat Management
- Network Security
- Incident Response
- Problem Solving
- Reverse Engineering
- WebApp Exploitation
- Cyber Risk Analysis
- Penetration Testing
- Python
- Cyber Threat Management
- Network Security
- Incident Response
- Problem Solving
- Reverse Engineering
- WebApp Exploitation
Education
Education
Education
Education

Division of Continuing Education
University of California, Irvine - 2021

Division of Continuing Education
University of California, Irvine - 2021

Division of Continuing Education
University of California, Irvine - 2021

Division of Continuing Education
University of California, Irvine - 2021

Bachelor's Degree in Computer Engineering & minoring in Cybersecurity
The Pennsylvania State University, State College - 2025

Bachelor's Degree in Computer Engineering & minoring in Cybersecurity
The Pennsylvania State University, State College - 2025

Bachelor's Degree in Computer Engineering & minoring in Cybersecurity
The Pennsylvania State University, State College - 2025

Bachelor's Degree in Computer Engineering & minoring in Cybersecurity
The Pennsylvania State University, State College - 2025
Experience
Experience
Experience
Experience

Operations Team Member
Seazen Group, Oct 2020 - Feb 2021

Operations Team Member
Seazen Group, Oct 2020 - Feb 2021

Operations Team Member
Seazen Group, Oct 2020 - Feb 2021

Operations Team Member
Seazen Group, Oct 2020 - Feb 2021

Dialogue Facilitator
Penn State University, Aug 2022 - Dec 2022

Dialogue Facilitator
Penn State University, Aug 2022 - Dec 2022

Dialogue Facilitator
Penn State University, Aug 2022 - Dec 2022

Dialogue Facilitator
Penn State University, Aug 2022 - Dec 2022

Computer Science Teaching Assistant (KGSP Students)
Penn State University, Jan 2023 - Apr 2024

Computer Science Teaching Assistant (KGSP Students)
Penn State University, Jan 2023 - Apr 2024

Computer Science Teaching Assistant (KGSP Students)
Penn State University, Jan 2023 - Apr 2024

Computer Science Teaching Assistant (KGSP Students)
Penn State University, Jan 2023 - Apr 2024

Undergraduate Research Assistant
Penn State University, Feb 2023 - Jun 2023

Undergraduate Research Assistant
Penn State University, Feb 2023 - Jun 2023

Undergraduate Research Assistant
Penn State University, Feb 2023 - Jun 2023

Undergraduate Research Assistant
Penn State University, Feb 2023 - Jun 2023

Vice President
The Kuwaiti Students Association, May 2023 - May 2024

Vice President
The Kuwaiti Students Association, May 2023 - May 2024

Vice President
The Kuwaiti Students Association, May 2023 - May 2024

Vice President
The Kuwaiti Students Association, May 2023 - May 2024

Computer Science Grader
Penn State University, Jan 2024 - May 2024

Computer Science Grader
Penn State University, Jan 2024 - May 2024

Computer Science Grader
Penn State University, Jan 2024 - May 2024

Computer Science Grader
Penn State University, Jan 2024 - May 2024

Computer Engineer Intern
Kuwait Oil Company, May 2024 - Aug 2024

Computer Engineer Intern
Kuwait Oil Company, May 2024 - Aug 2024

Computer Engineer Intern
Kuwait Oil Company, May 2024 - Aug 2024

Computer Engineer Intern
Kuwait Oil Company, May 2024 - Aug 2024

Summer Intern
Boutiqaat Kuwait , Aug 2024 - Aug 2024

Summer Intern
Boutiqaat Kuwait , Aug 2024 - Aug 2024

Summer Intern
Boutiqaat Kuwait , Aug 2024 - Aug 2024

Summer Intern
Boutiqaat Kuwait , Aug 2024 - Aug 2024

Forward Progam
McKinsey & Company, Oct 2024 - Present

Forward Progam
McKinsey & Company, Oct 2024 - Present

Forward Progam
McKinsey & Company, Oct 2024 - Present

Forward Progam
McKinsey & Company, Oct 2024 - Present
Licenses & certifications
Licenses & certifications
Licenses & certifications
Licenses & certifications

Certified Ethical Hacker
EC-Council
The Certified Ethical Hacker (CEH) certification transforms cybersecurity professionals into digital detectives, equipping them with the skills to think like hackers. It dives into techniques like network scanning, system hacking, and social engineering. With CEH, professionals can outsmart cybercriminals, safeguarding an organization’s assets from potential threats.

Certified Ethical Hacker
EC-Council
The Certified Ethical Hacker (CEH) certification transforms cybersecurity professionals into digital detectives, equipping them with the skills to think like hackers. It dives into techniques like network scanning, system hacking, and social engineering. With CEH, professionals can outsmart cybercriminals, safeguarding an organization’s assets from potential threats.

Certified Ethical Hacker
EC-Council
The Certified Ethical Hacker (CEH) certification transforms cybersecurity professionals into digital detectives, equipping them with the skills to think like hackers. It dives into techniques like network scanning, system hacking, and social engineering. With CEH, professionals can outsmart cybercriminals, safeguarding an organization’s assets from potential threats.

Certified Ethical Hacker
EC-Council
The Certified Ethical Hacker (CEH) certification transforms cybersecurity professionals into digital detectives, equipping them with the skills to think like hackers. It dives into techniques like network scanning, system hacking, and social engineering. With CEH, professionals can outsmart cybercriminals, safeguarding an organization’s assets from potential threats.

WebApp Exploitation Expert
OPSWAT
WebApp Exploitation involves identifying vulnerabilities in web applications, such as SQL injection and cross-site scripting (XSS), to secure them. OPSWAT offers training in these techniques, providing hands-on experience to enhance web app defenses and prevent real-world cyberattacks.

WebApp Exploitation Expert
OPSWAT
WebApp Exploitation involves identifying vulnerabilities in web applications, such as SQL injection and cross-site scripting (XSS), to secure them. OPSWAT offers training in these techniques, providing hands-on experience to enhance web app defenses and prevent real-world cyberattacks.

WebApp Exploitation Expert
OPSWAT
WebApp Exploitation involves identifying vulnerabilities in web applications, such as SQL injection and cross-site scripting (XSS), to secure them. OPSWAT offers training in these techniques, providing hands-on experience to enhance web app defenses and prevent real-world cyberattacks.

WebApp Exploitation Expert
OPSWAT
WebApp Exploitation involves identifying vulnerabilities in web applications, such as SQL injection and cross-site scripting (XSS), to secure them. OPSWAT offers training in these techniques, providing hands-on experience to enhance web app defenses and prevent real-world cyberattacks.

Fundamentals of Deep Learning
NVIDIA
This course dives into neural networks, model training, and deep learning techniques. Through hands-on exercises, participants gain practical skills in AI development, applying these concepts to solve real-world problems effectively, enhancing their knowledge in artificial intelligence and machine learning.

Fundamentals of Deep Learning
NVIDIA
This course dives into neural networks, model training, and deep learning techniques. Through hands-on exercises, participants gain practical skills in AI development, applying these concepts to solve real-world problems effectively, enhancing their knowledge in artificial intelligence and machine learning.

Fundamentals of Deep Learning
NVIDIA
This course dives into neural networks, model training, and deep learning techniques. Through hands-on exercises, participants gain practical skills in AI development, applying these concepts to solve real-world problems effectively, enhancing their knowledge in artificial intelligence and machine learning.

Fundamentals of Deep Learning
NVIDIA
This course dives into neural networks, model training, and deep learning techniques. Through hands-on exercises, participants gain practical skills in AI development, applying these concepts to solve real-world problems effectively, enhancing their knowledge in artificial intelligence and machine learning.

Mobila App Security
Cybrary
Mobile app security focuses on protecting applications from threats like data breaches, malware, and unauthorized access. Training covers areas such as secure coding practices, encryption, and vulnerability testing. It helps professionals build apps that safeguard sensitive user data and resist various cyberattacks.

Mobila App Security
Cybrary
Mobile app security focuses on protecting applications from threats like data breaches, malware, and unauthorized access. Training covers areas such as secure coding practices, encryption, and vulnerability testing. It helps professionals build apps that safeguard sensitive user data and resist various cyberattacks.

Mobila App Security
Cybrary
Mobile app security focuses on protecting applications from threats like data breaches, malware, and unauthorized access. Training covers areas such as secure coding practices, encryption, and vulnerability testing. It helps professionals build apps that safeguard sensitive user data and resist various cyberattacks.

Mobila App Security
Cybrary
Mobile app security focuses on protecting applications from threats like data breaches, malware, and unauthorized access. Training covers areas such as secure coding practices, encryption, and vulnerability testing. It helps professionals build apps that safeguard sensitive user data and resist various cyberattacks.

Cybersecurity Job (Virtual)
Mastercard
Designing a phishing email simulation involves creating an email that mimics real-world phishing tactics, like impersonating a trusted source. Interpreting results focuses on metrics such as click rates and user responses to identify security awareness gaps and improve future cybersecurity training.

Cybersecurity Job (Virtual)
Mastercard
Designing a phishing email simulation involves creating an email that mimics real-world phishing tactics, like impersonating a trusted source. Interpreting results focuses on metrics such as click rates and user responses to identify security awareness gaps and improve future cybersecurity training.

Cybersecurity Job (Virtual)
Mastercard
Designing a phishing email simulation involves creating an email that mimics real-world phishing tactics, like impersonating a trusted source. Interpreting results focuses on metrics such as click rates and user responses to identify security awareness gaps and improve future cybersecurity training.

Cybersecurity Job (Virtual)
Mastercard
Designing a phishing email simulation involves creating an email that mimics real-world phishing tactics, like impersonating a trusted source. Interpreting results focuses on metrics such as click rates and user responses to identify security awareness gaps and improve future cybersecurity training.

Reverse Engineering
U.S. Department of Homeland Security
Reverse engineering involves analyzing software or systems to understand their inner workings, often to identify vulnerabilities or security flaws. It requires dissecting code, breaking down system components, and studying their functions. This skill is crucial for cybersecurity professionals aiming to strengthen defenses against potential threats.

Reverse Engineering
U.S. Department of Homeland Security
Reverse engineering involves analyzing software or systems to understand their inner workings, often to identify vulnerabilities or security flaws. It requires dissecting code, breaking down system components, and studying their functions. This skill is crucial for cybersecurity professionals aiming to strengthen defenses against potential threats.

Reverse Engineering
U.S. Department of Homeland Security
Reverse engineering involves analyzing software or systems to understand their inner workings, often to identify vulnerabilities or security flaws. It requires dissecting code, breaking down system components, and studying their functions. This skill is crucial for cybersecurity professionals aiming to strengthen defenses against potential threats.

Reverse Engineering
U.S. Department of Homeland Security
Reverse engineering involves analyzing software or systems to understand their inner workings, often to identify vulnerabilities or security flaws. It requires dissecting code, breaking down system components, and studying their functions. This skill is crucial for cybersecurity professionals aiming to strengthen defenses against potential threats.

Fundamentals of TinyML
Harvard University Online
The course on the fundamentals of TinyML delves into the basics of machine learning on microcontrollers and small devices. It covers topics such as model training, optimization, and deployment on resource-constrained hardware, equipping learners with the skills to bring smart capabilities to everyday devices efficiently.

Fundamentals of TinyML
Harvard University Online
The course on the fundamentals of TinyML delves into the basics of machine learning on microcontrollers and small devices. It covers topics such as model training, optimization, and deployment on resource-constrained hardware, equipping learners with the skills to bring smart capabilities to everyday devices efficiently.

Fundamentals of TinyML
Harvard University Online
The course on the fundamentals of TinyML delves into the basics of machine learning on microcontrollers and small devices. It covers topics such as model training, optimization, and deployment on resource-constrained hardware, equipping learners with the skills to bring smart capabilities to everyday devices efficiently.

Fundamentals of TinyML
Harvard University Online
The course on the fundamentals of TinyML delves into the basics of machine learning on microcontrollers and small devices. It covers topics such as model training, optimization, and deployment on resource-constrained hardware, equipping learners with the skills to bring smart capabilities to everyday devices efficiently.

Implementing an information security program
LinkedIn Learning
Implementing an information security program involves establishing policies, procedures, and controls to protect an organization’s data and systems. It covers areas such as risk management, incident response, compliance, and security awareness training, ensuring that security practices align with organizational goals and industry standards.

Implementing an information security program
LinkedIn Learning
Implementing an information security program involves establishing policies, procedures, and controls to protect an organization’s data and systems. It covers areas such as risk management, incident response, compliance, and security awareness training, ensuring that security practices align with organizational goals and industry standards.

Implementing an information security program
LinkedIn Learning
Implementing an information security program involves establishing policies, procedures, and controls to protect an organization’s data and systems. It covers areas such as risk management, incident response, compliance, and security awareness training, ensuring that security practices align with organizational goals and industry standards.

Implementing an information security program
LinkedIn Learning
Implementing an information security program involves establishing policies, procedures, and controls to protect an organization’s data and systems. It covers areas such as risk management, incident response, compliance, and security awareness training, ensuring that security practices align with organizational goals and industry standards.

IOS App Developer
Apple
As an iOS app developer since 2016, I’ve been passionate about creating secure and user-friendly applications for Apple devices. I continuously stay updated with Apple’s latest development tools, coding practices, and security protocols to deliver high-quality mobile apps that meet the industry’s evolving standards.

IOS App Developer
Apple
As an iOS app developer since 2016, I’ve been passionate about creating secure and user-friendly applications for Apple devices. I continuously stay updated with Apple’s latest development tools, coding practices, and security protocols to deliver high-quality mobile apps that meet the industry’s evolving standards.

IOS App Developer
Apple
As an iOS app developer since 2016, I’ve been passionate about creating secure and user-friendly applications for Apple devices. I continuously stay updated with Apple’s latest development tools, coding practices, and security protocols to deliver high-quality mobile apps that meet the industry’s evolving standards.

IOS App Developer
Apple
As an iOS app developer since 2016, I’ve been passionate about creating secure and user-friendly applications for Apple devices. I continuously stay updated with Apple’s latest development tools, coding practices, and security protocols to deliver high-quality mobile apps that meet the industry’s evolving standards.