FILE · /home/mohamad/portfolio.idx BUILD · 2026 NODE · BEY-01

Mechanical engineer building defenses for industrial systems.

I'm Mohamad Chehab — a mechanical engineering student at USJ ESIB in Beirut, focused on blue team cybersecurity, SCADA/ICS/OT security, and the practical automation glue between them. I write Python that cleans tag names, parse Windows event logs to reconstruct attack timelines, and wire up Ignition dashboards in between physics labs.

Based in
Beirut · LB
Program
ESIB · PM25
Certs
CEH · CCNA · MCSA
Languages
EN · FR · AR

Engineering reasoning, security thinking,
applied to the things that actually run.

I study mechanical engineering at École Supérieure d'Ingénieurs de Beyrouth — thermodynamics, materials, mechanics, the usual. But the part of the lab I keep coming back to is where the physical world meets the digital one: PLCs, sensors, HMIs, the messy wiring between OT and IT.

On the security side I'm a blue-teamer. I like reconstructing timelines from Windows event logs, hunting through Sysmon, explaining what happened to people who weren't in the room. I've investigated brute-force attempts on AWS-hosted infrastructure, traced default EC2 reverse-DNS as an indicator of throwaway attacker nodes, and written incident reports clean enough for a non-technical audience.

On the SCADA side I run an Ignition lab on Ubuntu VMs with simulated PLCs and Modbus, and I do paid contract work helping a friend with industrial automation gigs. Long-term I want to sit at the seam — OT security for industrial operators in MENA, where most defenders still aren't fluent in both sides.

Tools I actually use.

Blue Team & Forensics

  • Windows Event Viewer · Security & Sysmon logs
  • Event ID 4688, Sysmon EID 1 process creation
  • RDP & Terminal Services investigation
  • Brute-force & successful-logon analysis
  • PSEXEC traces · UTC ↔ local timeline rebuild
  • Incident reporting for non-technical audiences

SCADA · ICS · OT

  • Inductive Automation Ignition (Vision & Perspective)
  • Siemens S7, Modbus PLC integration
  • Tag history · DB-backed historians
  • Industrial tag naming & asset registry logic
  • HMI & dashboard design
  • Lab on Ubuntu VMs with simulated PLCs

Programming & Automation

  • Python — log parsing, tag cleanup, security tooling
  • Excel automation for industrial data
  • HTML · CSS · JavaScript
  • RAG pipelines · embeddings · tool-calling
  • FastAPI · PostgreSQL · Qdrant
  • Git · GitHub · GitHub Pages

Hardware & Embedded

  • ESP32 · STM32 · Raspberry Pi
  • NRF24L01 · SX1278 · RTL-SDR
  • Sensors, breadboards, wireless comms
  • OBD2 vehicle diagnostics (concept work)
  • Networking fundamentals (CCNA-level)
  • Linux administration basics

Selected work.

  1. 2026 SCADA · RAG · AI

    Solar Plant SCADA RAG Assistant

    Retrieval-augmented assistant over an industrial tag namespace of roughly 85,000 tags from a solar plant. Python ingestion, Qdrant vector store, PostgreSQL for metadata, embeddings tuned for industrial naming conventions. Lets operators query the plant in natural language without scrolling through HMI trees.

    • Python
    • Qdrant
    • PostgreSQL
    • Ignition
    • RAG
  2. 2026 Blue Team · Forensics

    Windows Forensic Timeline Lab

    Investigation lab built around Event Viewer, Sysmon, and Security logs. Reconstructs attacker timelines from Event ID 4688, Sysmon EID 1, RDP / Terminal Services events, and PSEXEC traces — converting between UTC and local time, then rendering a clean incident narrative for non-technical readers.

    • Sysmon
    • Event Viewer
    • Python
    • IR
  3. 2026 OT/ICS Strategy

    OT/ICS Cybersecurity — Mid-Market Thesis

    Strategic teardown of a startup wedge in OT/ICS security for mid-market utilities and industrial operators. Identified a five-way competitive gap (software-only deployment, inline protocol enforcement, AI-generated policies, mid-market pricing, compliance automation) and a co-managed MDR go-to-market in the $25K–$75K ARR band.

    • OT
    • ICS
    • Strategy
    • MDR
  4. 2026 Markets · Python

    Gold Market Analysis Pipeline

    Full-stack analysis system: Python / FastAPI backend, React Bloomberg-Terminal-style frontend, 60+ technical indicators via yfinance & FRED, with the Anthropic API generating analyst-style commentary. Built as directional analysis, not a prediction oracle — and engineered around that distinction.

    • FastAPI
    • React
    • yfinance
    • Anthropic API
  5. 2026 Automation · Excel

    Industrial Tag Parser & Cleaner

    Python tooling that takes raw exported SCADA tag lists, cleans naming inconsistencies, splits physical asset from logical monitoring object, and emits a structured asset registry — turning spreadsheet chaos into something a historian can actually query.

    • Python
    • pandas
    • Excel
    • SCADA
  6. 2025 LabVIEW · Instrumentation

    LabVIEW Temperature Conversion VI

    NI LabVIEW 2022 Q3 virtual instrument that converts Celsius to Fahrenheit and Kelvin via a Boolean toggle and a Case Structure — a small teaching piece on dataflow programming and instrumentation UX.

    • LabVIEW
    • Instrumentation

Education & certifications.

EDU

USJ — École Supérieure d'Ingénieurs de Beyrouth

Préparatoire Génie Mécanique · PM25

Beirut, Lebanon · in progress

Mathematics, physics, thermodynamics, materials science, linear algebra, mechanics, optics, chemistry, and engineering laboratory work — taught in French.

CERT

CEH — Certified Ethical Hacker

EC-Council

Offensive techniques, tooling, and methodology — used as the lens for blue-team detection design.

CERT

CCNA — Cisco Certified Network Associate

Cisco

Routing, switching, IP services, security fundamentals, and network automation basics.

CERT

MCSA — Microsoft Certified Solutions Associate

Microsoft

Windows Server administration, identity, and core infrastructure — foundation for endpoint forensics.

Open to internships, collaborations,
and interesting OT/blue-team problems.

Reach out in English, French, or Arabic. I respond fastest to email.