S

Sulaiman Alhasawi

Co-Founder

Salmiya, Hawalli, Kuwait22 yrs 3 mos experience
AI EnabledHighly Stable

Key Highlights

  • Founder of ICSRank, advancing OT security.
  • Author of the first Arabic book on OT cybersecurity.
  • Host of ICSArabia Podcast, engaging global experts.
Stackforce AI infers this person is a Cybersecurity Expert specializing in OT and ICS security with extensive training and research experience.

Contact

Skills

Core Skills

Ot CybersecurityPenetration TestingCybersecurityWritingResearchPodcastingOsintFintechTrainingEthical HackingSoftware Development

Other Skills

Artificial Intelligence (AI)Cloud ApplicationsCloud ComputingCompliance (GRC)Docker ProductsGovernanceHands-on TrainingICS SecurityICS/SCADA SimulationInformation Security AwarenessJavaScriptLabshockLarge Language Models (LLM)Next.jsOT Security

About

As a Ph.D. holder in ICS/OT Cybersecurity and the founder of ICSRank — a platform for discovering, assessing, and securing industrial environments — I’m dedicated to advancing the field of OT security through innovation, research, and education. I am the author of the first Arabic book on OT cybersecurity, "Digital Protection of Industrial Systems (ICS/OT)". which addresses the challenges of securing critical infrastructure in the region. I host the ICSArabia Podcast, where I engage with global experts on OT cybersecurity, and I regularly publish articles on the Zerontek Blog to raise awareness and share practical insights. In addition to my research and content creation, I teach hands-on courses in: 1- ICS/OT security 2- Penetration testing 3- Cybersecurity fundamentals My mission is to empower engineers, defenders, and ethical hackers with the tools and knowledge to protect critical infrastructure.

Experience

Institute of cybersecurity excellence

Course Instructor : ICS/OT OSINT

Sep 2025Sep 2025 · 0 mo · Remote

  • Delivered a specialized training session on OSINT in ICS/OT as part of the ICE Certified OT Cybersecurity Training Course, a free two-day program aimed at engineers, cybersecurity professionals, and asset owners.
  • Session Title:
  • "ICS/OT OSINT – Discovering and Assessing Industrial Assets via Open Sources"
  • Topics Covered:
  • Introduction to OSINT in ICS/OT
  • Search engines for ICS discovery (Shodan, ZoomEye, Censys)
  • Identifying exposed industrial assets and services
  • Mapping ICS vendors, devices, and geolocation
  • Risk assessment from OSINT findings
  • Hands-on demo: Using ICSRank.com for analysis
  • 🎓 Participants received an official ICE Certificate of Participation.
OSINTOT Cybersecurity

Capital markets authority - kuwait

Instructor: Cybersecurity for Capital Markets & FinTech

Sep 2025Sep 2025 · 0 mo · Kuwait · On-site

  • As part of CMA’s training initiatives, I designed and delivered a one-day specialized course on cybersecurity for the financial sector and emerging FinTech platforms. The program was developed for CMA staff, compliance officers, IT teams, and financial advisors, with a focus on aligning local and international standards.
  • Key Highlights:
  • Explored the cyber threat landscape targeting capital markets and FinTech platforms, including crowdfunding, robo-advisors, and smart contracts.
  • Delivered hands-on labs using participants’ smartphones:
  • Identifying phishing attempts.
  • Analyzing and dealing with suspicious links.
  • Creating and testing tracking links safely for awareness.
  • Examining URLs and QR codes to detect fraud.
  • Mapped attack techniques (phishing, ransomware, DDoS, data breaches, supply chain attacks) to MITRE ATT&CK, NIST CSF, ISO/IEC 27001, and Kuwait’s NCSC regulations.
  • Presented case studies of global cyber incidents affecting financial institutions and their lessons learned.
  • Introduced best practices in data protection, governance, operational resilience, and compliance.
  • Concluded with a knowledge test and awarded participants an official certificate of completion.
  • 🎯 Outcome: Participants gained practical skills to recognize and respond to threats, stronger awareness of fraud and attack methods, and confidence in applying both CMA regulations and global cybersecurity frameworks in their daily work.
CybersecurityFinTechGovernanceRisk ManagementCompliance (GRC)OSINT+3

Kuwait information technology society

Course Instructor : Hands-On OT Security: An Introductory Course for Beginners

Jul 2025Jul 2025 · 0 mo · Kuwait · On-site

  • Title:
  • 🔐 ICS/OT Cybersecurity Fundamentals – Hands-On Course
  • Description:
  • This two-day course provides a hands-on introduction to Operational Technology (OT) and Industrial Control System (ICS) security, tailored for beginners and IT professionals transitioning into the OT space.
  • Participants explore real-world ICS/OT environments through guided labs, covering:
  • Core Concepts: Introduction to ICS, SCADA, PLCs, IIoT, and the differences between IT and OT systems
  • Protocol Analysis: Modbus and other ICS protocols using Wireshark and Tshark (Lab)
  • Threat Intelligence: ICS/OT threat landscape and attacker TTPs (Lab)
  • Offensive Skills: Risk assessment and penetration testing in a simulated ICS network (Lab)
  • Defensive Skills: Monitoring, incident response, access controls, and alignment with standards like IEC 62443 and NIST 800-82 (Lab)
  • 📎 Learn more & register: https://zerontek.com/zt/training-2
OT CybersecurityPenetration TestingEthical HackingOffensive SecurityOSINTICS/SCADA Simulation+5

Institute of cybersecurity excellence

Course Instructor : Risks, Vulnerabilities & Cybersecurity Controls in ICS/OT Environments

Jun 2025Jun 2025 · 0 mo · Remote

  • Delivered a focused, expert-led session on OT risk and vulnerability management as part of the ICE Certified OT Cybersecurity Training Course, a free two-day event designed for engineers, cybersecurity professionals, and asset owners.
  • Session Title:
  • "Risks, Vulnerabilities & Cybersecurity Controls in ICS/OT Environments"
  • Topics Covered:
  • ICS/OT cyber incidents overview
  • Vulnerability vs. risk in industrial environments
  • Types of ICS/OT vulnerabilities and risks
  • ICS/OT-specific security controls
  • Case study: Triton/Trisis malware attack
  • Hands-on lab: ICS/OT OSINT using Shodan and ICSrank
  • 🎓 Participants received an official ICE Certificate of Participation.
CybersecurityTrainingTechnical Instruction

Zerontek

2 roles

Course Instructor : Hands-On OT Security: An Introductory Course for Beginners

May 2025Present · 10 mos · Kuwait

  • Title:
  • 🔐 ICS/OT Cybersecurity Fundamentals – Hands-On Course
  • Description:
  • This two-day course provides a hands-on introduction to Operational Technology (OT) and Industrial Control System (ICS) security, tailored for beginners and IT professionals transitioning into the OT space.
  • Participants explore real-world ICS/OT environments through guided labs, covering:
  • Core Concepts: Introduction to ICS, SCADA, PLCs, IIoT, and the differences between IT and OT systems
  • Protocol Analysis: Modbus and other ICS protocols using Wireshark and Tshark (Lab)
  • Threat Intelligence: ICS/OT threat landscape and attacker TTPs (Lab)
  • Offensive Skills: Risk assessment and penetration testing in a simulated ICS network (Lab)
  • Defensive Skills: Monitoring, incident response, access controls, and alignment with standards like IEC 62443 and NIST 800-82 (Lab)
  • 📎 Learn more & register: https://zerontek.com/zt/training-2
OT CybersecurityPenetration TestingEthical HackingOffensive SecurityCybersecurityOSINT+8

Founder

Jan 2018Present · 8 yrs 2 mos · Kuwait

  • Zerontek is a cybersecurity company based in Kuwait. We offer OT and IT cybersecurity services. Our services ranges from consultation, assessment and training.
OT CybersecurityPenetration TestingEthical HackingCloud ComputingWeb DevelopmentSoftware Development+7

Sulitechkw

Course Instructor : Penetration Testing for Beginners

May 2025Present · 10 mos · Kuwait · Hybrid

  • Completed a practical, lab-based course designed for entry-level penetration testers. Students were required to solve a challenge exam to pass and receive certification.
  • Skills & Topics Covered:
  • Lab Setup: Kali Linux VM installation and configuration
  • Reconnaissance & Scanning: Nmap, Bettercap for discovering targets
  • System Exploitation:
  • Windows 7 exploitation using Metasploit, privilege escalation, persistence (EternalBlue)
  • Windows 10 SMB brute-force attack with custom wordlists using Hydra
  • Web Application Attacks:
  • Information gathering, backdoor/admin panel detection (manual + dirsearch)
  • SQL injection + password cracking with Hashcat
  • File upload vulnerability exploitation via web shell and Burp Suite
  • Cookie-based account takeover (JWT token manipulation + Hashcat)
  • Server-Side Template Injection (SSTI) leading to reverse shell
  • Post-Exploitation:
  • Database dumping, hash cracking
  • Privilege escalation using misconfigured sudo permissions
  • ✅ Final challenge exam required practical application of all techniques to receive certification.
Penetration TestingEthical HackingOffensive SecurityVMware WorkstationWeb Application SecurityCybersecurity+3

Turath training center

Course Instructor : Practical Tools and Techniques in Cybersecurity for Beginners

Feb 2025Feb 2025 · 0 mo · Kuwait · On-site

Gulf university for science and technology

Course Instructor : Protect Your Smartphone - Staying Safe from Cyber Threats

Dec 2024Dec 2024 · 0 mo · Kuwait · On-site

Ethical HackingCybersecurityTrainingHands-on TrainingTechnical Instruction

The gulf diwan

Course Instructor : IT/OT Cybersecurity 101 Workshop

Dec 2024Dec 2024 · 0 mo · Kuwait · On-site

CybersecurityTrainingTechnical Instruction

Coded

Course Instructor : Introduction to Client-Side Attacks: Theory and Application

Nov 2024Nov 2024 · 0 mo · Kuwait · On-site

  • Hackathon Kuwait Workshops – Kuwait University
OT CybersecurityCybersecurityTrainingTechnical Instruction

Al-multaqa al-elmi – future education

Course Instructor : Principles of Cybersecurity

Oct 2024Oct 2024 · 0 mo · Kuwait · On-site

Ethical HackingWeb Application SecurityCybersecurityTrainingTechnical Instruction

Turath training center

Course Instructor : Principles of Cybersecurity - Protecting Computers and Smartphones

Sep 2024Sep 2024 · 0 mo · Kuwait · On-site

CybersecurityTrainingTechnical Instruction

Icsrank

Founder

Jan 2024Present · 2 yrs 2 mos · Kuwait · Remote

  • ICSrank.com is a cutting-edge platform designed for the discovery and security assessment of Industrial Control Systems, Operational Technology, and Industrial iIoT devices on the internet, utilizing data from major search engines for comprehensive cybersecurity insights.
  • 🔗 Visit us at https://www.icsrank.com
OT CybersecurityCloud ComputingWeb DevelopmentSoftware DevelopmentResearchCybersecurity+3

Kipicofficial

Course Instructor : Cyber Security 101

Oct 2023Oct 2023 · 0 mo · Kuwait · On-site

CybersecurityTrainingHands-on TrainingTechnical Instruction

Freelance

2 roles

Cybersecurity Writer (ICS/OT Focus)

Dec 2020Present · 5 yrs 3 mos · https://zerontek.com/zt/blog/

  • Since 2020, I've been actively contributing to the ICS/OT cybersecurity discourse through my writings. My articles span a range of topics including technical guides, in-depth analyses, informed opinions, event overviews, and more, all tailored to the nuances of ICS/OT cybersecurity. My aim has always been to provide readers with a comprehensive understanding of the field, emphasizing both current trends and foundational knowledge. By merging practical insights with theoretical expertise, I endeavor to create content that is both accessible to newcomers and valuable to seasoned professionals. Join the conversation and stay updated with the ever-evolving landscape of ICS/OT cybersecurity.
OT CybersecurityEthical HackingResearchWeb Application SecurityCybersecurityOSINT+3

Open Source Contributor (ICS/OT Cybersecurity)

Dec 2019Present · 6 yrs 3 mos · https://github.com/selmux/Alhasawi-ICS-OT-Security-projetcs

  • Initiated in 2019, my GitHub repository is a straightforward, geek-oriented space dedicated to ICS/OT cybersecurity tools. Tinkering around, I've been compiling and coding some essential tools and resources, like dorks, wordlists, scripts, simulators, and the occasional guide. It's a bit of my own digital workshop where I log and share things that caught my nerdy interest, hoping others might find them handy too. Feel free to dive in, use the tools, or even contribute to our growing collection. Let's geek out together!
OT CybersecurityWeb DevelopmentResearchCybersecurityOSINTOT Security+2

Ics arabia podcast

Podcaster @ ICS Arabia

Jan 2018Present · 8 yrs 2 mos · https://www.youtube.com/@icsarabiapodcast

  • "ICS Arabia" began its journey in 2019 as a modest platform for open dialogues with cybersecurity peers. The channel aims to foster understanding and collaboration within the ICS/OT cybersecurity community through candid conversations. If you're keen on sharing experiences and learning from fellow professionals, consider joining our growing community.
OT CybersecurityEthical HackingPodcastingResearchCybersecurityOT Security+1

Liverpool john moores university

Researcher Phd Candidate

Sep 2012Sep 2017 · 5 yrs · Liverpool, England, United Kingdom

Ethical HackingCybersecurityTrainingHands-on TrainingTechnical Instruction

Unix zone

Business Owner

Jan 2002Jan 2009 · 7 yrs · Kuwait

  • Web development
  • Web hosting
  • Cyber Security services
OT CybersecurityResearchCybersecurityOSINTWritingICS/SCADA Simulation

Kuwait linux company

System Network Administrator

Jan 2000Jan 2002 · 2 yrs · Kuwait

  • Linux network administration
  • Linux system administration
  • Co-Founder
Software Development

Education

Liverpool John Moores University

Doctor of Philosophy (PhD) — Computer Science

Jan 2012Jan 2020

Bangor University

Master of Science (MSc) — Accounting and Finance

Jan 2009Jan 2010

The Open University

Bachelor of Science - BS — Information Technology and Computing

Jan 2003Present

Stackforce found 100+ more professionals with Ot Cybersecurity & Penetration Testing

Explore similar profiles based on matching skills and experience