Khaled Serag is seeking a position in cyber security. He has a Master's degree in Electrical and Computer Engineering from SUNY Binghamton and a Bachelor's degree in Electrical Engineering from Ain Shams University in Egypt. Currently he works as a Cyber Security Researcher at Boeing Research and Technology where he has designed guards and security architectures for MIL-STD-1553 systems and contributed to the Common Open Research Emulator API. He has relevant experience from internships at Deloitte and Security Meter and holds several IT certifications.
1. Khaled Serag
Email: kserag1@binghamton.edu
412 Breckenridge drive, apt 15, 35802 Huntsville, AL USA.
(347) 766-1152 (cell)
Qualifications:
o Cyber Security Researcher at Boeing Research and Technology
o Information Assurance industry experience obtained through position at Boeing and two internships
o Research Experience obtained through position at Boeing and Master’s Degree research
o Diverse Background in Electrical Engineering, Computer Engineering, Network Engineering, and Information
Assurance
o Cisco Certified Network Associate (CCNA)
o Certified Ethical Hacker (CEH)
o Export Control Friendly, Security Clearance Pending (Secret)
Education:
State University of New York at Binghamton
The Thomas J. Watson School of Engineering
Master of Science in Electrical and Computer Engineering December 2015
Specialization: Information Assurance
Cumulative GPA (3.9125)
Ain Shams University, Cairo, Egypt
Bachelor of Science in Electrical Engineering September 2012
General Grade (G.)
Major Grade (V.G.)
Certifications:
Cisco Certified Network Associate (CCNA) December 2013
Certified Ethical Hacker (CEH) July 2016
Skills:
Programming and Scripting: PHP, JavaScript, HTML, CSS, JQuery, AJAX, C, C++, Python, Tcl, Bash Scripting, Matlab,
PLC Ladder Programming
Networks and Security: Cryptography, Linux, Windows, Wireshark, VMware, Network Troubleshooting, Subnetting,
Network Security, IPV4, IPV6, MIL-STD-1553, MySQL, PHPMyAdmin, SQL Injection, FreeRadius Authentication, Multi-
Factor Authentication, Syslog Servers, Vulnerability Assessment, Nessus, Penetration Testing, Metasploit, DNS
Computer Engineering: Digital Systems Design, Computer Design, System on a Chip, CMOS, Verilog, Synopsis
Electrical Engineering Skills: Power Electronics, Power distribution, Classic Control Circuits, PLC, Power Transmission,
Power generation, Electrical Machines, AutoCAD
Languages: English & Arabic Fluency, Above Intermediate French
Citizenship and Visa Status:
U.S. Citizen
2. Related Professional Experience:
Software Engineer (Cyber Security Researcher)
Boeing Research and Technology, Huntsville, Alabama, USA February 2016 - Present
MIL-STD-1553 Guard/Monitor Design (Multiple Patents Disclosed)
February 2016- Present
o Collaborate with team to design a guard for MIL-STD-1553 systems using off-the-shelf components
o Researched what existing solutions could be deployed
o Researched what existing components could be incorporated into the guard design (Processors, 1553 Controllers)
o Researched what approaches could be followed for the guard design to meet the Electrical, Physical, and Latency
requirements
o Investigated the impact of installing a guard between the protected payload and the bus on the system’s latency
o Investigated the various types of attacks that could take place on a 1553 bus system, and investigated the
counter-measures
o Collaborated with team to specify the electrical requirements of the guard
o Participated in outlining the system’s architecture (Processors, Memory, DMA, Hypervisors, 1553 Controllers…
etc.)
o Collaborate with team to implement a secure booting process
o Cooperate with team to implement a configuration process
Multiple Independent Layers of Security for MIL-STD-1553 Systems
September 2016 - Present
o Collaborate with two team-mates to design a Multiple Single Levels of Security architecture for multiple 1553
busses running on a shared hardware
o Work with team to design an interface that maintains the separation between different security levels of each bus
o Investigate the best way to maintain separation between security domains (Hypervisors, RTOS)
o Research the system’s time analysis, how to minimize the delays of an interface serving multiple systems
Common Open Research Emulator (CORE) API Development
September 2016 - Present
o Collaborate with team Develop CORE’s API to incorporate more protocols/standards
o Develop CORE’s API to be able to communicate with more network emulation open source software
o Investigate ways to develop a complete framework for wireless communications
o Develop CORE’s software to facilitate the interaction between CORE and EMANE (Extendable Mobile Ad-hoc
Network Emulator)
Cyber Risk Intern
Deloitte, New York City, New York, USA June 2015 - July 2015
o Collaborated with team to develop SIEM content for The State of Connecticut
o Created 8 Qradar reports based on 6 use cases
o Concluded with a final presentation during the Weekly Status Meeting
Information Security Engineering Intern
Security Meter, Giza, Egypt October - December 2013
o Applied (SIEM) solutions for both Linux & windows computers of Banque Misr Using Qradar & Tenable
o Collaborated with 2 Engineers to apply Freeradius server authentication on the computers of Banque Misr
o Participated in multiple projects to develop two factor authentication( using Entrust) plans for several
organizations
3. Academic Research & Projects:
Research
Distributed Web Crawling System September - December 2015
o Used Python and Selenium to control Google Chrome browser to interface with pages, and gather data in real
time
o Wrote a Crawling algorithm that allows for the specification of the crawling depth, and whether crawling should
be recursive or iterative
o Created a virtual machine, dedicated for crawling
o Ran several instances of the crawler virtual machines
o Created a central control unit, responsible for delegating tasks to virtual machines and switching them on and off
o Created a database that collects the data gathered from running crawlers and keeps track of the visited URLs
o Created a mechanism that checks whether a given link has already been visited before
o Used Chrome internals to get each page’s memory overhead
o Cooperated with a colleague to extend the usage of the system to find ways to detect intrusion attempts caused
by specific webpages
o Used Gephi to visualize the crawling operation in real time, draw relationships between links, and represent each
link as a node, whose size is dependent upon its memory consumption
Privacy Assurance on Facebook January - May 2015
o Collaborated with my professor to find better ways to protect personal information on Facebook
o Collaborated with two students to use Steganography to embed secret pictures in cover pictures
o Created a Facebook App. to upload pictures, create stego keys pertinent to each user, store them in a central
database, and distribute them later upon request
o Investigated whether using Homomorphic Encryption, or Partially Homomorphic Encryption is viable
o Investigated whether Partially Homomorphic Encryption (Additively, Multiplicatively) could be beneficial if used
to encrypt keys in the database
o Created an external authentication server, responsible for distributing the keys based on the requester’s identity
o Collaborated with a team member to write a JavaScript Plugin, that requests keys from the authentication server,
extracts the secret image, and displays it below the cover image for allowed users
Projects
Security Testing For LSBM Steganography December 2015
o Wrote a Matlab routine to define the pixel embedding costs for a given cover image
o Used the cost routine, LSBM, and 1000 Cover Images to embed 6 different payloads in each cover image, and
generate 6000 stego images
o Computed the KB features for all cover and stego images
o Steganalyzed each payload using the Ensemble Classifier
Dual Core Processor Design Using Verilog May 2014
o Collaborated with two team-mates to design a simple dual core processor
o Wrote the code for the Caches, ALU’s, And buffers
o Cooperated with team to outline the system’s architecture
o Synthesized the code using Synopsys
4. Patents:
Transparent Mode for MIL-STD-1553 Data Guards Disclosed*: October 2016
File-Driven Data Filtering and Monitoring for MIL-STD-1553 Disclosed*: October 2016
Monitor for MIL-STD-1553 with MILS Disclosed*: October 2016
(*): Patent filed and submitted to the Patent Portfolio Management Organization within the company, pending the company’s approval to be submitted to the USPTO
Other Work Experience:
Site Engineer
Telecomax Networks, Cairo, Egypt September - December 2012
o Oversaw the construction of four cell phone towers on one project site
o Planned, Outlined & Managed the project timeline, ensuring project was kept on schedule
o Ensured appropriate resources were sourced
o Attended the process of Construction of 3 Sites as a trainee
Hobbies:
Traveling, Languages, Literature, History, Philosophy, Playing Oud (Musical Instrument)