I am a highly motivated and detail-oriented cybersecurity engineer. Skilled in incident response, threat analysis, and preventive security measures to ensure the confidentiality, integrity, and availability of assets. Eager to apply analytical skills and technical knowledge to real-world security challenges in a dynamic team environment.
- Security Information and Event Management (SIEM): Proficient in using Splunk Enterprise and Google Chronicle for monitoring and analyzing security events.
- Endpoint Detection and Response (EDR): Skilled in deploying and managing EDR solutions to detect and respond to threats.
- Network Security: Expertise in using NMAP for network discovery and security auditing.
- Penetration Testing and Ethical Hacking: Advanced user of Kali Linux for security testing and vulnerability assessments.
- Description: Implementation of a comprehensive SIEM solution using Splunk Enterprise, including data ingestion, correlation searches, and custom dashboards.
- Technologies: Splunk Enterprise, Python, Regular Expressions
- Highlights:
- Configured data inputs from various sources including network devices, servers, and applications.
- Developed correlation searches to detect potential security incidents.
- Created custom dashboards for real-time monitoring and reporting.
- Description: Deployment and management of EDR solutions using Google Chronicle to enhance threat detection and response capabilities.
- Technologies: Google Chronicle, Python, APIs
- Highlights:
- Integrated various endpoint data sources into Google Chronicle.
- Automated threat detection workflows using Python scripts.
- Developed detailed incident response playbooks.
- Description: Development of a glove-based gesture recognition system using flex sensors and an Arduino microcontroller to capture and translate hand gestures into corresponding characters.
- Technologies: Arduino, Flex Sensors, Serial Communication
- Highlights:
- Calibrated sensors for adaptability and accuracy.
- Mapped sensor values to angles for precise gesture recognition.
- Recognized specific gestures to translate into different characters.
- Description: Advanced penetration testing and ethical hacking using Kali Linux to identify and mitigate security risks.
- Technologies: Kali Linux, Metasploit, Burp Suite
- Highlights:
- Conducted penetration tests on web applications, networks, and systems.
- Identified critical vulnerabilities and provided actionable remediation steps.
- Created training materials and workshops on penetration testing techniques.
- Google Certificate in Cybersecurity
- Certified Information Systems Security Professional (CISSP)
- Certified Ethical Hacker (CEH)
- 🔗 LinkedIn: www.linkedin.com/in/ahmed-mashhour-b074ba178
- 📧 Email: ahm.mashhour@gmail.com