Eng. Dalia Al-Bash
Red Team Specialist | Ethical Hacker | Threat Intelligence Analyst | IT Infrastructure Architect
I am a cybersecurity professional specializing in Red Team operations, ethical hacking, threat intelligence, and secure IT infrastructure architecture. I work in high-pressure environments to build resilient systems, lead digital transformation, and teach advanced cybersecurity courses at the academic level.
Academic Background
Master’s in Web Sciences
Syrian Virtual University — Informatics Engineering (Academic Track)
2022–2024
Master’s in Electronic Business Administration
Arab Academy for Electronic Business
Specialization: E-Business & Digital Transformation
Graduation Project: 93% (Top Score)
Bachelor’s in Information Technology Engineering
Damascus University — Networks & Operating Systems
Graduation Project: 88% (Top Score)
Final Average: 69.45% (Good)
Professional Experience
Cybersecurity & Red Team Operations
2021–Present
Penetration testing, threat modeling, and adversary simulation.
Digital forensics, malware analysis, and threat-intelligence reporting.
Development of SOC detection rules, SIEM use-cases, and incident-response workflows.
Hardening of hybrid/on-prem infrastructures using Zero Trust, RBAC, NAC, and segmentation.
Achieved a 35% reduction in cybersecurity incidents through proactive threat hunting.
IT Infrastructure Architecture & Digital Transformation
2021–2025
Designed secure, high-availability enterprise networks (VLANs, routing, firewalling).
Built backup and DR systems that reduced downtime by 40%.
Migrated enterprise services to hybrid cloud with 100% data integrity.
Implemented ISO 27001 controls and multiple risk analyses.
Upgraded infrastructure using virtualization, containerization, and cloud orchestration.
Academic Teaching Experience
Syrian Private University (SPU)
Lecturer: Networks (CCNA), Operating Systems.
Built Linux-based lab environments with AI-aided evaluations.
Trained 100+ faculty members on digital systems.
Arab International University (AIU)
Instructor for Network Security (ECIR, SOC-200, SOC-450), Ethical Hacking (OSCP/eJPT track), Cloud & Distributed Systems, CCNA.
CYBERPEDIA — Red Team Trainer
Specialized courses: Linux for Hackers, Offensive Security, Hacking the Hacker.
Designed full attack–defense labs and OSINT/threat-intel exercises.
Certifications
(Newest → Oldest)
Cybersecurity & Ethical Hacking
OSCP (In Progress)
ECIR – Cyber Incident Response
SOC-450 – Advanced SOC Operations
SOC-200 – Cyber Defense Analyst
PenTest+ (PT0-002)
eJPT
CompTIA Security+ (SY0-601 Prep)
Ethical Hacking Bootcamp
Google Cybersecurity Professional
Threat Hunting (Infosec)
Cyber Security Specialization – University of London
Ethical Hacking – Johns Hopkins
Windows Security – University of Colorado
International Cyber Conflict – NYU
Cloud & Virtualization
Microsoft Azure (AZ-900)
AWS Cloud Computing
Windows Server Hyper-V
Networking
CCNP Enterprise (350-401 ENCOR)
CCNA
Network+
MCSA (Microsoft Server)
Data & AI
IBM Data Analyst Professional
Microsoft AI Fundamentals
Key Projects
1. Secure Hybrid Cloud Migration
Migrated enterprise infrastructure into a hybrid cloud model using Azure AD, RBAC, VPN, Zero Trust segmentation, and cloud-native SIEM integration.
Outcome: 60% improvement in service availability and enhanced SOC visibility.
2. Infrastructure Modernization & Network Hardening
Redesigned legacy network architecture with secure VLANs, firewall segmentation, high-availability core, NAC, SIEM, and automated configuration (Ansible).
Outcome: Reduced attack surface by 45% and improved performance by 40%.
3. Cybersecurity Framework & SOC Implementation
Implemented ISO-27001-aligned policies, performed risk assessments, built SOC detection logic mapped to MITRE ATT&CK, and executed red-team/purple-team cycles.
4. Smart & Secure Building Infrastructure (IoT-Ready)
Designed secure IoT-based building systems including segmented networks, encrypted IP surveillance, identity-secured automation, and AI-based anomaly detection.
5. Cloud-Native Monitoring & SOC Automation
Developed SIEM/SOAR pipelines (ELK + Wazuh, CloudWatch, Azure Monitor) with automated response flows for phishing, brute force, and beaconing.
Outcome: 30% reduction in analyst workload.
Member since August 2025