AB

Ali Basalama

Network & Security Cloud Senior Specialist at Solutions By STC
, Saudi Arabia
Mutual Connections
Loading...
S9-122025-21286

Send Message

No file chosen
8 Publications
0 Followers
0 Following
0 Questions

👤 About

Skills & Expertise

Research Interests

No research interests added yet.

Connect With Me

💼 Experience

Network & Security Cloud Senior Specialist

Solutions By STC · Dec 2019 - Present
Cloud & Digital Platform Operations. Expert Network & Security Engineer.

IT Projects Manager

Khaleej Computers Co. · Jul 2018 - November 2019
Active & Passive Infrastructure Operations and Security Systems. Web Hosting Cloud Servers and Domains Admin. DevOps Practices. Software Business Solutions for Small Company.

Systems Support + Senior Network & Security

Rusd International Group · Apr 2007 - June 2018
Next Generation Firewall Devices (Cisco ASA, Fire Power, ESA, AMP and Palo Alto). Network Routing & Switching, Wan Connection and Access Point Devices Managed. Install & Managed IP Camera Systems, Hand Bunch Machines for All Branches. Communication (Cisco CM & Avaya Systems), Voice Mail Pro, SIP Lines Installation + Integration Cisco and Avaya Systems. Data Center Relocated to new building (24 Hours downtime). Install & Managed Load Balancing Application Device (F5). Active Directory Management. Mail Server management by Microsoft Exchange. Internet Access Servers Management by ISA & Bluecoat System.

Programmer Assistant + Network Admin

AL Sharif Company · Mar 2005 - November 2006
Built and Install Networks between H.O and Branches (MAKKAH, RYADH, and JEDDAH). Network Admin Systems (Exchange, ISA, and Security) Evaluated and Building Work-Shop Program by SQL Server and Visual Basic 6.

🎓 Education

SABA'A University

Bachelor Of Information Systems in · 2004
Description (between 50 and 1500 characters)

📚 Publications (8)

Journal: SSRN (Social Science Research Network) • October 2025
An Attack Signature is a digital fingerprint—a distinct pattern, often encoded as a Regular Expression (RegEx), that serves as an identifiable characteristic of a known cyberattack. These signatures a...
Artificial Intelligence (AI) Machine Learning (ML) Penetration Testing (Pen testing) Vibe Hacking Zero Trust Architecture (ZTA)
Journal: Journal of Emerging Technologies and Innovative Research • November 2025
This paper investigates the integration of AI and Machine Learning (ML) into security by focusing on automated penetration testing. It explores the reasons for this transition, including the need for...
Artificial Intelligence (AI) Machine Learning (ML) Penetration Testing (Pen testing) Vibe Hacking Zero Trust Architecture (ZTA)
Journal: Social Science Research Network • January 2025
Spatial computing refers to the technology that merges the digital and physical worlds, enabling intuitive and immersive interactions between people and computers. It is an umbrella term that encompas...
Computing Ai Spatial computing Indoor navigation Cloud Nvidia
Journal:
comprehensive overview of Low Earth Orbit (LEO) satellite technology and its potential to revolutionize global connectivity. Operating at altitudes between 160 km and 2,000 km, LEO satellites offer si...
Leo Geo Space sustainability Internet Iot
Journal:
Cloud Governance Definition: The study defines cloud governance as a structured set of rules that guide the access, usage, and management of cloud services to ensure alignment with business strategic...
Cloud governance Iam Gdpr Security
dd