DISCLAIMER



BEFORE PROCEEDING, PLEASE READ THE OPERATIONS

MANUAL FOR IMPORTANT INFORMATION

ABOUT THIS SOFTWARE.



Available online at rlphwkm.com



Please wait, loading content...

Hello There, I'm

Ralph Wakim RLPHWKM

Security Specialist

In a world of evolving threats, security isn't optional—it's essential. I'm here to shield your data, secure your systems, and safeguard your peace of mind. From your systems to your workplace, trust robust protection that evolves faster than the threats you face. Defend your digital and physical assets today.

Learn more My work
Hero Image
About Image

Get to know me!

I'm currently pursuing a Bachelor of Science in Cybersecurity & Counter-Terrorism at Marist University, complemented by minors in Computer Science, Information Systems, and Information Technologies. My experience spans security, cybersecurity, and web technologies, and I'm proficient in Python, Java, JavaScript, HTML, CSS, SQL, and more. With experience in public safety, cybersecurity, IT, and sales, I bring diverse and practical expertise to effectively manage your security projects and responsibilities. Additionally, I'm fluent in multiple languages, including English, French, Arabic, and the Levantine dialect, allowing me to communicate clearly across diverse teams and clients.

  • Stay safe in your day to day routine
  • Secure your business and systems
  • Stay connected to the things you love, the safe way
Coming Soon

Experiences

I began my journey as a self-taught developer, but I’ve always had a passion for security. I then moved to New York, and that's when I made the decision to specialize in cybersecurity.

Communications Security

Multiple layers of security are dispersed across devices and networks.

Data Security

Data that one wants to keep secure in an effective cyber security strategy.

OSINT Services

Data analysis and OSINT research on a specific set of targets.

5+

Years of Experience

55+

TryHackMe Rooms

8%

Top TryHackMe Rank

5+

Awards & Certifications

Tools I Have Experience With

I have hands-on experience with a variety of technical and cybersecurity tools utilized for research, educational, personal, and professional purposes, including but not limited to the ones cited below.

Wireshark
Nmap
VSCode
Metasploit
John the Ripper
Hashcat
Nessus
Kali Linux
VirtualBox
VMware
Splunk
OSINT Frameworks
Git & GitHub

why choose me

I have many years of experience in public safety and cybersecurity. I have a background with specialty in the field, and I believe I can fulfill your goals one way or another.

Top Priority: CIA

Here are my top priorities when it comes to security—both online and offline. I strongly believe in the CIA triad. These principles form the core foundation for any secure environment, ensuring that information is protected, trustworthy, and accessible when needed.

  • Confidentiality

    Protecting information from unauthorized access, ensuring that sensitive data is only accessible to those who have the right to view it.

  • Integrity

    Maintaining the accuracy and completeness of data, preventing unauthorized modification or destruction, and ensuring data remains reliable and trustworthy.

  • Availability

    Ensuring that authorized users can access information and systems when they need it, without compromising confidentiality or integrity.

Why Choose Me Image

Privacy is Your Right - Own It

Privacy is not just a preference; it's a fundamental human right. In today's interconnected world, safeguarding your personal information is essential for maintaining freedom, autonomy, and dignity. Understanding your rights and actively protecting your data puts control back into your hands, empowering you to confidently navigate both the digital landscape and your everyday life.

Coming Soon

Projects

Here are some projects I've worked on, along with what I learned from each experience.

Project Image

Wazuh SIEM Management

Deployed and managed a SIEM system in my homelab. A virtual instance was created using VMware.

Skills Developed

  • SIEM Management
  • SOC Analysis
  • Rules and Dashboard Creation
Project Image

Real-World Cyber Attack

I simulated a real-world cyber attack on a vulnerable VM (Metasploitable) and used defensive measures to counter offensive techniques.

Skills Developed

  • Kali Linux & Tools
  • Offensive & Defensive Tactics
  • Virtualization
Project Image

Virtual Cyber World

Deployed VMware to simulate real-world cybersecurity strategies.

Skills Developed

  • Virtualization
  • Networking
  • Network Security
Project Image

TrueNAS

Repurposed an older device by installing TrueNAS SCALE and implementing the solution in my homelab to make my own private cloud system.

Skills Developed

  • Network Security
  • NAS Management
  • Device Management
Project Image

Home Assistant

Deployed Home Assistant to manage smart devices at home and control environments remotely and securely.

Skills Developed

  • Smart Home Management
  • Network Security
  • Internet of Things (IoT)

Some of my favorite projects

This is a paragraph where I will be writing some info or a brief description about my personally ranked favorite projects I have worked on or participated in. Some projects might be personal, while others can be for clients.

[Project Name]

[Company/Client Name]

I deployed and configured an IBM QRadar SIEM solution for a classified multinational client in the MENA region. My work involved designing and implementing custom rules, offenses, and dashboard to enhance real-time threat detection and streamline incident response, ensuring a more resilient and responsive security posture.

IBM QRadar SIEM

[CLASSIFIED]

©2025 RLPHWKM - Ralph Wakim. All Rights Reserved