I’m a self-taught AI Trust & Security Readiness Engineer from Morocco, driven by curiosity and a long habit of turning messy questions into clear answers. I was born on August 10, 1981. Even as a kid, I was one of the top students in my school—not because I memorized more, but because I genuinely loved understanding why things work. That curiosity never left. Since 2005, I’ve taught myself full-stack web development and programming from the ground up, purely through practice, research, and building—no degrees, no certificates, just deep work and consistency. From 2005 to 2017, I ran a cyber café. It wasn’t just a business for me—it became a real-world training ground. I was known for researching topics and helping students at every level find what they needed online. That experience shaped a core skill I still rely on today: I can ask the right question, search with purpose, and extract the right answer quickly. I learned how to navigate uncertainty, validate information, and explain complex ideas in simple terms. Today, I apply that same mindset to AI systems—especially where things can go wrong: misuse, prompt injection, unsafe tool use, data leakage, weak guardrails, and “it works in the demo” deployments that collapse in production. I’m focused on making AI reliable and safe to ship: clear policies, strong controls, evidence-based gates, and security-first design. I also bring a rare advantage: I’m exceptionally good at reading people. That helps me understand intent, spot risk patterns, and communicate security decisions in a way that teams actually adopt. My goal is simple: help teams build AI that’s trustworthy by default—quietly, consistently, and with the kind of readiness that protects users and organizations, even when nobody is watching.
I use Acunetix to analyse websites for potential vulnerabilities so the website can either be attacked or inform the website owner with security solutions.
I use Burp Suite to find vulnerabilities in websites by using their SQL injections, No-Redirect and SSRF tools.
I use Nmap to analyse Website and Server details like Port statuses in order to inform owners about closing ports that can potentially be exploited.
I use Wireshark to analyse incoming network traffic and investigate handshake packets.
I use SQLMap to retrieve Database and Admin Panel information of SQL enabled website.
I'm able to use some powerful set of tools and methods like Airmon-ng, Evil Twin, Bruteforce, Wireshark and Mitm. These allow me to conduct a range of attacks and analysisses on networks, identify vunerabilities and potential entry points for unauthorized access.
I'm able to use multiple techniques in order to attack passwords like Cryptography, Pass-The-Hash, Bruteforce and Phising attacks. These allow me to intercept accounts with the so called secure passwords.
I'm able to use vulnerabilities to my advantage like SQL- and XSS injections, SSRF, No-Redirect, Wordpress vulnerabilities and Web Shells. These allow to gain unauthorized access to Databases, Admin panels and Server Backdoors.
I'm able to use powerful set of tools and methods like DNS Floods, TCP/UDP attacks, Nmap, FTP/SSH attacks and Firewall Bypasses (Nmap). These allow me to gain unauthorized access to servers and clients and put them offline.
My activities as a Intern Cyber Security Specialist at Ecodation were to research the following sections within Cyber Security:
Even though I already had interests within the Cyber Security field, I wanted to learn the soft skills of International Trading in order to improve myself and keep it as a back-up plan in case we are doomed by Artificial Intelligence.
While taking the Ecodation Cyber Security Course, I was tested on the following sections:
While taking the BTK Academi DDOS Course, I was tested on the following sections: