Ali AlNaseeb

Computer Engineer - Cybersecurity Expert

Ali AlNaseeb

Computer Engineer - Cybersecurity Expert

Ali AlNaseeb

Computer Engineer - Cybersecurity Expert

Hello World! Ali AlNaseeb here!

Hello World!
Ali here!

Hey there! Im Ali B. AlNaseeb, a computer engineering student whos fascinated by the art of breaking thingslegally, of course! My main passion is penetration testing, where I get to dive into systems, find the cracks, and help businesses patch them before the bad guys can. Think of me as the person who keeps hackers on their toes.


Currently, Im wrapping up my final year at The Pennsylvania State University, where Im majoring in Computer Engineering and minoring in Cybersecurity. Im also proud to represent Kuwait, where I earned a prestigious full merit scholarship from the Ministry of Higher Educationan honor given to just 5% of sponsored students.


One of the highlights of my career so far has been working at Kuwait Oil Company (KOC), where I was part of the Incident Response team and played a role in Cyber Threat Management. I spent a lot of time in the Information Security Operations Centre room, the beating heart of KOCs cybersecurity operations. Alongside the KOC cybersecurity team and Deloitte, who served as a contractor, I focused on finding and patching vulnerabilities to keep their systems safe from digital threats.


When Im not testing systems or hunting for security gaps, youll find me experimenting in the kitchen or planning my next travel adventure. Just like with technology, Im always looking to discover something newwhether its a great recipe, an exciting destination, or a fresh approach to solving a problem.


Lets connect! Whether you want to talk tech, brainstorm innovative ideas, or share travel tips, Im always up for a great conversation.

Hey there! Im Ali B. AlNaseeb, a computer engineering student whos fascinated by the art of breaking thingslegally, of course! My main passion is penetration testing, where I get to dive into systems, find the cracks, and help businesses patch them before the bad guys can. Think of me as the person who keeps hackers on their toes.


Currently, Im wrapping up my final year at The Pennsylvania State University, where Im majoring in Computer Engineering and minoring in Cybersecurity. Im also proud to represent Kuwait, where I earned a prestigious full merit scholarship from the Ministry of Higher Educationan honor given to just 5% of sponsored students.


One of the highlights of my career so far has been working at Kuwait Oil Company (KOC), where I was part of the Incident Response team and played a role in Cyber Threat Management. I spent a lot of time in the Information Security Operations Centre room, the beating heart of KOCs cybersecurity operations. Alongside the KOC cybersecurity team and Deloitte, who served as a contractor, I focused on finding and patching vulnerabilities to keep their systems safe from digital threats.


When Im not testing systems or hunting for security gaps, youll find me experimenting in the kitchen or planning my next travel adventure. Just like with technology, Im always looking to discover something newwhether its a great recipe, an exciting destination, or a fresh approach to solving a problem.


Lets connect! Whether you want to talk tech, brainstorm innovative ideas, or share travel tips, Im always up for a great conversation.

Kuwait City, Kuwait

Kuwait City, Kuwait

Kuwait City, Kuwait

Kuwait City, Kuwait

Skills

Skills

Skills

Skills

  • Cyber Risk Analysis
  • Penetration Testing
  • Python
  • Cyber Threat Management
  • Network Security
  • Incident Response
  • Problem Solving
  • Reverse Engineering
  • WebApp Exploitation
  • Cyber Risk Analysis
  • Penetration Testing
  • Python
  • Cyber Threat Management
  • Network Security
  • Incident Response
  • Problem Solving
  • Reverse Engineering
  • WebApp Exploitation
  • Cyber Risk Analysis
  • Penetration Testing
  • Python
  • Cyber Threat Management
  • Network Security
  • Incident Response
  • Problem Solving
  • Reverse Engineering
  • WebApp Exploitation
  • Cyber Risk Analysis
  • Penetration Testing
  • Python
  • Cyber Threat Management
  • Network Security
  • Incident Response
  • Problem Solving
  • Reverse Engineering
  • WebApp Exploitation

Education

Education

Education

Education

Division of Continuing Education

University of California, Irvine - 2021

Division of Continuing Education

University of California, Irvine - 2021

Division of Continuing Education

University of California, Irvine - 2021

Division of Continuing Education

University of California, Irvine - 2021

Bachelor's Degree in Computer Engineering & minoring in Cybersecurity

The Pennsylvania State University, State College - 2025

Bachelor's Degree in Computer Engineering & minoring in Cybersecurity

The Pennsylvania State University, State College - 2025

Bachelor's Degree in Computer Engineering & minoring in Cybersecurity

The Pennsylvania State University, State College - 2025

Bachelor's Degree in Computer Engineering & minoring in Cybersecurity

The Pennsylvania State University, State College - 2025

Experience

Experience

Experience

Experience

Operations Team Member

Seazen Group, Oct 2020 - Feb 2021

Operations Team Member

Seazen Group, Oct 2020 - Feb 2021

Operations Team Member

Seazen Group, Oct 2020 - Feb 2021

Operations Team Member

Seazen Group, Oct 2020 - Feb 2021

Dialogue Facilitator

Penn State University, Aug 2022 - Dec 2022

Dialogue Facilitator

Penn State University, Aug 2022 - Dec 2022

Dialogue Facilitator

Penn State University, Aug 2022 - Dec 2022

Dialogue Facilitator

Penn State University, Aug 2022 - Dec 2022

Computer Science Teaching Assistant (KGSP Students)

Penn State University, Jan 2023 - Apr 2024

Computer Science Teaching Assistant (KGSP Students)

Penn State University, Jan 2023 - Apr 2024

Computer Science Teaching Assistant (KGSP Students)

Penn State University, Jan 2023 - Apr 2024

Computer Science Teaching Assistant (KGSP Students)

Penn State University, Jan 2023 - Apr 2024

Undergraduate Research Assistant

Penn State University, Feb 2023 - Jun 2023

Undergraduate Research Assistant

Penn State University, Feb 2023 - Jun 2023

Undergraduate Research Assistant

Penn State University, Feb 2023 - Jun 2023

Undergraduate Research Assistant

Penn State University, Feb 2023 - Jun 2023

Vice President

The Kuwaiti Students Association, May 2023 - May 2024

Vice President

The Kuwaiti Students Association, May 2023 - May 2024

Vice President

The Kuwaiti Students Association, May 2023 - May 2024

Vice President

The Kuwaiti Students Association, May 2023 - May 2024

Computer Science Grader

Penn State University, Jan 2024 - May 2024

Computer Science Grader

Penn State University, Jan 2024 - May 2024

Computer Science Grader

Penn State University, Jan 2024 - May 2024

Computer Science Grader

Penn State University, Jan 2024 - May 2024

Computer Engineer Intern

Kuwait Oil Company, May 2024 - Aug 2024

Computer Engineer Intern

Kuwait Oil Company, May 2024 - Aug 2024

Computer Engineer Intern

Kuwait Oil Company, May 2024 - Aug 2024

Computer Engineer Intern

Kuwait Oil Company, May 2024 - Aug 2024

Summer Intern

Boutiqaat Kuwait , Aug 2024 - Aug 2024

Summer Intern

Boutiqaat Kuwait , Aug 2024 - Aug 2024

Summer Intern

Boutiqaat Kuwait , Aug 2024 - Aug 2024

Summer Intern

Boutiqaat Kuwait , Aug 2024 - Aug 2024

Forward Progam

McKinsey & Company, Oct 2024 - Present

Forward Progam

McKinsey & Company, Oct 2024 - Present

Forward Progam

McKinsey & Company, Oct 2024 - Present

Forward Progam

McKinsey & Company, Oct 2024 - Present

Licenses & certifications

Licenses & certifications

Licenses & certifications

Licenses & certifications

Certified Ethical Hacker

EC-Council

The Certified Ethical Hacker (CEH) certification transforms cybersecurity professionals into digital detectives, equipping them with the skills to think like hackers. It dives into techniques like network scanning, system hacking, and social engineering. With CEH, professionals can outsmart cybercriminals, safeguarding an organization’s assets from potential threats.

Certified Ethical Hacker

EC-Council

The Certified Ethical Hacker (CEH) certification transforms cybersecurity professionals into digital detectives, equipping them with the skills to think like hackers. It dives into techniques like network scanning, system hacking, and social engineering. With CEH, professionals can outsmart cybercriminals, safeguarding an organization’s assets from potential threats.

Certified Ethical Hacker

EC-Council

The Certified Ethical Hacker (CEH) certification transforms cybersecurity professionals into digital detectives, equipping them with the skills to think like hackers. It dives into techniques like network scanning, system hacking, and social engineering. With CEH, professionals can outsmart cybercriminals, safeguarding an organization’s assets from potential threats.

Certified Ethical Hacker

EC-Council

The Certified Ethical Hacker (CEH) certification transforms cybersecurity professionals into digital detectives, equipping them with the skills to think like hackers. It dives into techniques like network scanning, system hacking, and social engineering. With CEH, professionals can outsmart cybercriminals, safeguarding an organization’s assets from potential threats.

WebApp Exploitation Expert

OPSWAT

WebApp Exploitation involves identifying vulnerabilities in web applications, such as SQL injection and cross-site scripting (XSS), to secure them. OPSWAT offers training in these techniques, providing hands-on experience to enhance web app defenses and prevent real-world cyberattacks.

WebApp Exploitation Expert

OPSWAT

WebApp Exploitation involves identifying vulnerabilities in web applications, such as SQL injection and cross-site scripting (XSS), to secure them. OPSWAT offers training in these techniques, providing hands-on experience to enhance web app defenses and prevent real-world cyberattacks.

WebApp Exploitation Expert

OPSWAT

WebApp Exploitation involves identifying vulnerabilities in web applications, such as SQL injection and cross-site scripting (XSS), to secure them. OPSWAT offers training in these techniques, providing hands-on experience to enhance web app defenses and prevent real-world cyberattacks.

WebApp Exploitation Expert

OPSWAT

WebApp Exploitation involves identifying vulnerabilities in web applications, such as SQL injection and cross-site scripting (XSS), to secure them. OPSWAT offers training in these techniques, providing hands-on experience to enhance web app defenses and prevent real-world cyberattacks.

Fundamentals of Deep Learning

NVIDIA

This course dives into neural networks, model training, and deep learning techniques. Through hands-on exercises, participants gain practical skills in AI development, applying these concepts to solve real-world problems effectively, enhancing their knowledge in artificial intelligence and machine learning.

Fundamentals of Deep Learning

NVIDIA

This course dives into neural networks, model training, and deep learning techniques. Through hands-on exercises, participants gain practical skills in AI development, applying these concepts to solve real-world problems effectively, enhancing their knowledge in artificial intelligence and machine learning.

Fundamentals of Deep Learning

NVIDIA

This course dives into neural networks, model training, and deep learning techniques. Through hands-on exercises, participants gain practical skills in AI development, applying these concepts to solve real-world problems effectively, enhancing their knowledge in artificial intelligence and machine learning.

Fundamentals of Deep Learning

NVIDIA

This course dives into neural networks, model training, and deep learning techniques. Through hands-on exercises, participants gain practical skills in AI development, applying these concepts to solve real-world problems effectively, enhancing their knowledge in artificial intelligence and machine learning.

Mobila App Security

Cybrary

Mobile app security focuses on protecting applications from threats like data breaches, malware, and unauthorized access. Training covers areas such as secure coding practices, encryption, and vulnerability testing. It helps professionals build apps that safeguard sensitive user data and resist various cyberattacks.

Mobila App Security

Cybrary

Mobile app security focuses on protecting applications from threats like data breaches, malware, and unauthorized access. Training covers areas such as secure coding practices, encryption, and vulnerability testing. It helps professionals build apps that safeguard sensitive user data and resist various cyberattacks.

Mobila App Security

Cybrary

Mobile app security focuses on protecting applications from threats like data breaches, malware, and unauthorized access. Training covers areas such as secure coding practices, encryption, and vulnerability testing. It helps professionals build apps that safeguard sensitive user data and resist various cyberattacks.

Mobila App Security

Cybrary

Mobile app security focuses on protecting applications from threats like data breaches, malware, and unauthorized access. Training covers areas such as secure coding practices, encryption, and vulnerability testing. It helps professionals build apps that safeguard sensitive user data and resist various cyberattacks.

Cybersecurity Job (Virtual)

Mastercard

Designing a phishing email simulation involves creating an email that mimics real-world phishing tactics, like impersonating a trusted source. Interpreting results focuses on metrics such as click rates and user responses to identify security awareness gaps and improve future cybersecurity training.

Cybersecurity Job (Virtual)

Mastercard

Designing a phishing email simulation involves creating an email that mimics real-world phishing tactics, like impersonating a trusted source. Interpreting results focuses on metrics such as click rates and user responses to identify security awareness gaps and improve future cybersecurity training.

Cybersecurity Job (Virtual)

Mastercard

Designing a phishing email simulation involves creating an email that mimics real-world phishing tactics, like impersonating a trusted source. Interpreting results focuses on metrics such as click rates and user responses to identify security awareness gaps and improve future cybersecurity training.

Cybersecurity Job (Virtual)

Mastercard

Designing a phishing email simulation involves creating an email that mimics real-world phishing tactics, like impersonating a trusted source. Interpreting results focuses on metrics such as click rates and user responses to identify security awareness gaps and improve future cybersecurity training.

Reverse Engineering

U.S. Department of Homeland Security

Reverse engineering involves analyzing software or systems to understand their inner workings, often to identify vulnerabilities or security flaws. It requires dissecting code, breaking down system components, and studying their functions. This skill is crucial for cybersecurity professionals aiming to strengthen defenses against potential threats.

Reverse Engineering

U.S. Department of Homeland Security

Reverse engineering involves analyzing software or systems to understand their inner workings, often to identify vulnerabilities or security flaws. It requires dissecting code, breaking down system components, and studying their functions. This skill is crucial for cybersecurity professionals aiming to strengthen defenses against potential threats.

Reverse Engineering

U.S. Department of Homeland Security

Reverse engineering involves analyzing software or systems to understand their inner workings, often to identify vulnerabilities or security flaws. It requires dissecting code, breaking down system components, and studying their functions. This skill is crucial for cybersecurity professionals aiming to strengthen defenses against potential threats.

Reverse Engineering

U.S. Department of Homeland Security

Reverse engineering involves analyzing software or systems to understand their inner workings, often to identify vulnerabilities or security flaws. It requires dissecting code, breaking down system components, and studying their functions. This skill is crucial for cybersecurity professionals aiming to strengthen defenses against potential threats.

Fundamentals of TinyML

Harvard University Online

The course on the fundamentals of TinyML delves into the basics of machine learning on microcontrollers and small devices. It covers topics such as model training, optimization, and deployment on resource-constrained hardware, equipping learners with the skills to bring smart capabilities to everyday devices efficiently.

Fundamentals of TinyML

Harvard University Online

The course on the fundamentals of TinyML delves into the basics of machine learning on microcontrollers and small devices. It covers topics such as model training, optimization, and deployment on resource-constrained hardware, equipping learners with the skills to bring smart capabilities to everyday devices efficiently.

Fundamentals of TinyML

Harvard University Online

The course on the fundamentals of TinyML delves into the basics of machine learning on microcontrollers and small devices. It covers topics such as model training, optimization, and deployment on resource-constrained hardware, equipping learners with the skills to bring smart capabilities to everyday devices efficiently.

Fundamentals of TinyML

Harvard University Online

The course on the fundamentals of TinyML delves into the basics of machine learning on microcontrollers and small devices. It covers topics such as model training, optimization, and deployment on resource-constrained hardware, equipping learners with the skills to bring smart capabilities to everyday devices efficiently.

Implementing an information security program

LinkedIn Learning

Implementing an information security program involves establishing policies, procedures, and controls to protect an organization’s data and systems. It covers areas such as risk management, incident response, compliance, and security awareness training, ensuring that security practices align with organizational goals and industry standards.

Implementing an information security program

LinkedIn Learning

Implementing an information security program involves establishing policies, procedures, and controls to protect an organization’s data and systems. It covers areas such as risk management, incident response, compliance, and security awareness training, ensuring that security practices align with organizational goals and industry standards.

Implementing an information security program

LinkedIn Learning

Implementing an information security program involves establishing policies, procedures, and controls to protect an organization’s data and systems. It covers areas such as risk management, incident response, compliance, and security awareness training, ensuring that security practices align with organizational goals and industry standards.

Implementing an information security program

LinkedIn Learning

Implementing an information security program involves establishing policies, procedures, and controls to protect an organization’s data and systems. It covers areas such as risk management, incident response, compliance, and security awareness training, ensuring that security practices align with organizational goals and industry standards.

IOS App Developer

Apple

As an iOS app developer since 2016, I’ve been passionate about creating secure and user-friendly applications for Apple devices. I continuously stay updated with Apple’s latest development tools, coding practices, and security protocols to deliver high-quality mobile apps that meet the industry’s evolving standards.

IOS App Developer

Apple

As an iOS app developer since 2016, I’ve been passionate about creating secure and user-friendly applications for Apple devices. I continuously stay updated with Apple’s latest development tools, coding practices, and security protocols to deliver high-quality mobile apps that meet the industry’s evolving standards.

IOS App Developer

Apple

As an iOS app developer since 2016, I’ve been passionate about creating secure and user-friendly applications for Apple devices. I continuously stay updated with Apple’s latest development tools, coding practices, and security protocols to deliver high-quality mobile apps that meet the industry’s evolving standards.

IOS App Developer

Apple

As an iOS app developer since 2016, I’ve been passionate about creating secure and user-friendly applications for Apple devices. I continuously stay updated with Apple’s latest development tools, coding practices, and security protocols to deliver high-quality mobile apps that meet the industry’s evolving standards.

Let's Connect!

Let's Connect!

Contact

Contact

Contact

Contact

Send Me a Message

Send Me a Message

Send Me a Message

Send Me a Message