Nouaïm Souiki
Verified Expert in Engineering
Cybersecurity Engineer and Developer
Nouaïm is an advanced developer and cybersecurity engineer with five years of professional experience. He holds a bachelor's degree in mathematics and computer science and a master's degree in the latter. Nouaïm is also passionate about cryptography, reverse engineering, exploitation and mitigation, low-level programming, robotics, IoT, and all related security challenges.
Portfolio
Experience
Availability
Preferred Environment
Burp Suite, Assembler x86, ARM Assembler, C, C++, NMap, mitmproxy, Visual Studio, Python, AFL++
The most amazing...
...thing I've developed as part of a team is an automated tool to remotely take over drones by exploiting weaknesses in wireless communication protocols.
Work Experience
Product Security Engineer
Med-El
- Handled firmware emulation of embedded devices using an EMUX virtual environment.
- Conducted vulnerability assessment and penetration testing (VAPT) of an Android application.
- Performed risk analysis, threat modeling, and software bill of materials and SDLC audits.
- Wrote a secure coding document for the development team to implement.
- Devised a secure firmware over-the-air strategy to safely update the firmware of remote medical devices.
Security Researcher
Technology Innovation Institute
- Handled firmware emulation, reverse engineering, and exploitation.
- Conducted wifi protocol vulnerability analysis and wireless communications interception.
- Developed an automated vulnerability framework centered around 0-day vulnerability research through advanced fuzzing and automated patching.
Embedded Software Engineer
Redline
- Handled set-top-box embedded programming for eCos and Linux platforms.
- Chased errors, defects, and bugs in the embedded software.
- Contributed to improving the graphical user interface code.
Embedded and Security Engineer
Wyplay
- Handled the set-top-box embedded programming, kernel drivers, and HAL implementation.
- Performed the security hardening of the underlying Linux firmware and middleware.
- Reverse-engineered and took over closed-source, third-party libraries.
Security, Networking, and Industrial Engineer
Pellenc ST
- Performed a low-level calibration of the industrial panel PC capacitive touchscreen used on the machines by modifying the Kernel evdev generic driver and configuring the Ubuntu display manager.
- Put together a networking module using the C++ Boost.Asio framework for low-level sockets and TCP segment handling, allowing intra-machine communications between waste material sensors' drivers and sorting engine.
- Devised a secure credential storage strategy using hashing schemes, like the bcrypt key derivation function, and Unix security modules, such as AppArmor, Yama, and SELinux, eliminating hard-coded passwords and keys.
- Presented the DevSecOps methodology to the management to create a security-sensitized environment.
- Led the progressive upgrade of the Fieldbus networking technology from Modbus to the more secure OPC Unified Architecture standard, meant to secure the intra-components communication of the sorting machines.
Ethical Hacker and C/C++ Engineer
Self-employed
- Conducted VAPT on a cryptocurrency exchange platform for a foreign company.
- Assessed the security flaws exposed by the web application client, determining the attack surface and potential attack vectors based on OWASP testing guidelines.
- Exposed SQL injection vulnerabilities and Cloudflare misconfiguration—which allowed bypassing the web application firewall set up by Cloudflare and attacking the origin server—and communicated mitigation steps to the client.
- Sniffed and reverse-engineered a foreign cryptocurrency exchange Windows application.
- Countered a man-in-the-middle (MITM) attack on the app's communication protocol using mitmproxy and a fake TLS certificate injection, allowing decryption and modification of the ongoing HTTPS flow between the app and the back-end exchange servers.
- Maintained a GPS program developed in C++ for a foreign client, debugging the program using GDB to detect and patch the defects the code exposed.
Security and iOS Engineer
CAR360
- Supervised the cybersecurity aspects of the company's components, from the back-end infrastructure and web services to the front-end framework and mobile applications.
- Conducted the mobile application security's VAPT by reverse-engineering, debugging, and performing static and dynamic analyses.
- Managed the AWS EC2 instance security and update, primarily through the TLS deployment and enhancement on back-end servers.
- Helped develop the main application's augmented reality (AR) features on iOS 11 using Swift 4 and ARKit, including displaying a car walkaround path on the AR scene, beautifying the end-user experience.
C/C++ and .NET Engineer
Atos
- Built a native driver in cutting-edge Modern C++ for the camera device of a Windows 10-based tablet, enabling the main app to access the camera's video flow without relying on the standard camera application or the tablet's local file system.
- Developed the driver with pure native C++ technology leveraging OpenCV capabilities. The driver is used as a DLL by the .NET main application.
- Implemented a bridge between the native and the managed code by wrapping the native code layer using Microsoft CLI/C++. This allowed producing the managed driver DLL, making it directly callable from the .NET layer.
- Deployed the unitary tests using C#, WPF, and XAML.
- Upgraded, optimized, and deployed a SOAP web service built on ASP.NET, which handles PDF document conversion and merging for the main application and is callable from the client.
- Executed the related algorithms that fetch all the meaningful remote client-side data using other pre-built, in-house SOAP web services, respecting the given order and document hierarchy constraints.
- Utilized the third-party tool: Aspose.Total for the entire PDF conversion and merging task. The tool is well-known for its advanced Office and image document processing and PDF/A format support.
- Upgraded, optimized, and deployed a small Windows desktop app developed with C#.NET, enabling the client to insert a document into the remote server by locally exposing the feature as a right-click menu item.
Experience
Trigger Warning Browser Extension for Netflix
http://github.com/programmersn/triggers-warning-browser-extensionSkills
Languages
C, Python, JavaScript, HTML, C++, Assembler x86, Swift, C++/CLI, C#, XAML, Swift 4
Tools
GDB, Smali, IntelliJ IDEA, OWASP Zed Attack Proxy (ZAP), Wireshark, Emacs, Visual Studio, Android Studio, Vim Text Editor, Git, AutoTools, NMap, Xcode, Jira, NGINX, Graylog
Platforms
Kali Linux, iOS, Burp Suite, Embedded Linux, Kernel, Amazon Web Services (AWS), iOS 11
Industry Expertise
Cybersecurity, Network Security
Other
APK, Security, Vulnerability Identification, IT Security, ARM, Binwalk, APIs, Cloud, Authentication, Microsoft Message Analyzer, Cloudflare, OWASP, Frida, JADX, Ubertooth, Scapy, Aircrack-ng, Ghidra, OneFuzz, AFL++, Linux Kernel, eCos, Embedded Hardware, Secure Boot, ISO 27001, Common Criteria, Security Testing, CERT, OPC UA, Robot Operating System (ROS), Embedded Systems, HAL, Middleware, Threat Modeling, Security Architecture, Software Development Lifecycle (SDLC), Cloud Security, Cryptography, Trusted Execution Environments (TEE), Transport Layer Security (TLS), SOAP
Libraries/APIs
WebExtensions API, OpenCV, Aspose Components, REST APIs
Frameworks
Django, .NET, Windows Presentation Foundation (WPF)
Paradigms
REST, DevSecOps
Storage
Microsoft SQL Server
Education
Master of Science Degree in Computer Science
Aix-Marseille University - Marseille, France
Bachelor of Science Degree in Mathematics and Computer Science
Aix-Marseille University - Marseille, France
How to Work with Toptal
Toptal matches you directly with global industry experts from our network in hours—not weeks or months.
Share your needs
Choose your talent
Start your risk-free talent trial
Top talent is in high demand.
Start hiring