// Computer Engineering · ENISO · Tunisia · Class of 2027

Oussama
Ghali

Cybersecurity Engineer  ·  SOC Builder  ·  CTF Competitor

Defensive monitoring meets offensive testing — building secure systems,
analyzing threats, and automating security workflows with AI.

Now featuring live profile ID and mission status

50+
CTF Challenges
100+
Alerts Analyzed
50+
Students Impacted
2027
Graduation

Who Am I?

Interactive Security Console
Type help to list commands
oussama@oussamaghali.me:~$
Education
ENISO — Tunisia
Applied Computer Science Engineering · Expected 2027
Prep School
IPEIEM El Manar
Physics & Technology Track · Ranked 171
Club Role
Cyberguards — ENISO
General Secretary · 50+ students impacted
Certifications
Certification Status
Ethical Hacker - Netcad CyberOps Associate - In Progress

Field Work

2025 — Present
Personal Lab
Personal SOC Lab — Wazuh SIEM
Security Analyst (Self-Directed)
  • Deployed SIEM monitoring multiple endpoints — generated and analyzed 100+ security alerts from simulated attack scenarios
  • Detected brute-force, privilege escalation, and suspicious process execution patterns
  • Tuned detection rules to reduce noise and improve alert relevance during testing
  • Performed log correlation across system, auth, and network events to reconstruct attack timelines
2024 — Present
TryHackMe · PicoCTF
CTF Competition Practice
Offensive Security
  • 50+ hands-on challenges covering web exploitation, Linux privesc, and network enumeration
  • Applied real-world recon → exploitation → post-exploitation methodology on vulnerable systems
  • Sharpened analytical speed under time-constrained, competitive scenarios
2025 — Present
ENISO
Cyberguards Cybersecurity Club
General Secretary
  • Coordinated cybersecurity workshops and events impacting 50+ students
  • Led internal organization, communications, and execution of technical sessions and CTF prep

Featured Work

Web Security · AppSec
Web-App-Security-Lab
Deliberately vulnerable web app simulating SQL Injection, XSS, and IDOR attack vectors — built for attack analysis, detection testing, and understanding exploitation paths vs. defensive countermeasures.
Proof of Work
  • Attack scenarios implemented: SQL Injection, XSS payload injection, and IDOR access bypass.
  • Detection scenario: suspicious input patterns and auth/resource events correlated for analysis.
  • Defense scenarios documented: parameterized queries, output encoding, and authorization checks.
Web-App-Security-Lab architecture and attack/defense workflow preview
View on GitHub

Arsenal

SIEM & Monitoring
Wazuh Log Analysis Alert Triage Threat Detection
Offensive Security
Web Exploitation Privilege Escalation Network Enumeration Recon
Systems & Networking
Linux Windows TCP/IP SSH VMware
Programming
Python C Java SQL .NET

Let's Connect

Looking for a
cybersecurity internship.

SOC analyst, blue team, or offensive security roles —
ready to contribute from day one with real hands-on skills.

Available for Internships

Currently seeking a cybersecurity internship opportunity where I can apply SIEM, offensive testing, and AI automation skills in a real security environment.

SOC Analyst Blue Team Penetration Testing AppSec
Send Message