> KERNEL_LOAD: [OK]
> MOUNTING_FS: /dev/divanny
> CRYPTO_ENGINE: ENABLED
> IDENTITY_CHECK: divanny (Haitam Belcaida)
> ESTABLISHING SECURE DASHBOARD...
> ACCESS GRANTED.
> DISPLAYING USER INTERFACE.
belcaida.com // V.2.0.4
NET: ONLINE CPU: 12% MEM: 4GB ● REC
HAITAM BELCAIDA

// IT SECURITY ENGINEER & CTF PLAYER


Welcome to the node. I specialize in both offensive and defensive security operations. My mission is to break systems to make them stronger and design robust incident response strategies.

./init_skills.sh
Metasploit Burp Suite SIEM / Splunk Incident Response Python Scripting Active Directory Penetration Testing Digital Forensics SOC Operations & Monitoring

// TryHackMe

Real-time data stream from public profile @divanny.


> LATEST_FLAG_CAPTURED: root{piv0t_c0mpleted}

> CURRENT_ROLE: Security Engineer

> RANK: Check Live Feed

// DEPLOYED PAYLOADS

Project: SERVERLESS INCIDENT RESPONDER

AWS Lambda | Python (Boto3) | CloudWatch/GuardDuty

Built a serverless (AWS Lambda) solution that monitors cloud security alerts from GuardDuty. The function automatically triggers a defensive response, such as revoking specific IAM permissions or isolating a compromised EC2 instance within seconds of detection, minimizing blast radius.

Project: NIGHTCRAWLER

Python | Scapy | Network

An automated network vulnerability scanner written in Python using raw sockets. Capable of detecting open ports and outdated service banners.

CTF: HACKTHEBOX 'DANTE'

Pro Lab | Red Team

Successfully compromised the entire Dante Pro Lab subnet. Documented exploit chains involving buffer overflows and AD pivoting.

// ENCRYPTED CHANNEL

Secure transmission lines are open.

> INITIATE_EMAIL: contact@belcaida.com

> GITHUB_REPO: github.com/h-belcaida

> LINKEDIN_NODE: linkedin.com/in/belcaida/