
Mohammed Fouzan Aamiri
Cybersecurity Professional
Specializing in threat intelligence, network security, and vulnerability management. Passionate about securing digital infrastructures and protecting against cyber threats.

About Me
Education
Pace University, Seidenberg School of Computer Science and Information Systems
New York, NY
Master of Science (MS) in Cybersecurity
Expected May 2025
Relevant Coursework:
Information Security Policy & Management (GRC)
Network Engineering/Security & Defense
Ethical Hacking and Penetration testing
Malware Analysis and Reverse Engineering
Cyber Threat Intelligence Analysis & Modelling
Digital & Mobile Forensics
Automating Information security with Python & PowerShell
Data Centers
Visvesvaraya Technological University
Bangalore, KA
Bachelor of Engineering (BE) in Computer Engineering
July 2022
Relevant Coursework:
Computer Network & Security
Cryptography
Operating Systems
Data Communications
Software Engineering
Unix Programming
Artificial Intelligence & Machine Learning
Data Structures
Software Architecture & Design Patterns
Skills
Threat Intelligence & Incident Response
SIEM (Splunk, ELK Stack)
Threat Hunting
Log Analysis
Incident Response
Digital Forensics
OSINT
Trend Detection
Network & Endpoint Security
Firewalls (Palo Alto, Cisco ASA)
IDS/IPS
VPN
EDR/XDR
TCP/IP
Zero Trust Architecture
Microsegmentation
Vulnerability Management & Penetration Testing
Ethical Hacking
Adversary Emulation
Risk Management
Threat Modeling
Malware Analysis
Cloud Security & IAM
AWS IAM
GCP Security
Azure Security Center
Privileged Access Management
Multi-Factor Authentication
Security Automation & Scripting
Python
PowerShell
Bash
SQL
Java
C++
Infrastructure as Code
Security Automation
Compliance & Risk Management
NIST
ISO 27001
SOC 2
GDPR
HIPAA
PCI-DSS
Security Audits
Certifications
Networking Essentials (Cisco)
Microsoft Azure IAM
CompTia A+
Security+ (In Progress)
Professional Experience
Cybersecurity Graduate Researcher
Pace University | New York, NY
September 2023 - May 2025
- Developed security automation scripts using Python & PowerShell, including network scanning (Nmap), forensic data extraction, and automated threat detection.
- Led open-source intelligence (OSINT) research on STV Incorporated, conducting domain reconnaissance, DNS analysis, and security risk assessment.
- Designed a Public Key Infrastructure (PKI) solution for document encryption using self-signed certificates and tested cross-platform decryption.
- Investigated TCP session hijacking and SYN flooding attacks, replicating the Mitnick Attack in a controlled environment and proposing defensive strategies.
- Analyzed mobile forensics data (Android & iOS), including file system extraction, encrypted artifacts, and call detail record (CDR) analysis.
- Wrote detailed technical reports and case studies, providing actionable insights for threat intelligence, incident response, and forensic investigations.
Cybersecurity Case Study Participant
2024 ISACA NYM Cybersecurity Case Study Competition | Remote
January 2024 - May 2024
- Conducted an in-depth analysis of the SolarWinds cyberattack, a significant security breach that impacted multiple organizations globally.
- Conducted extensive examination of the SolarWinds attack, identifying critical vulnerabilities and security gaps within the compromised supply chain.
- Designed a comprehensive security framework emphasizing proactive threat detection, vulnerability mitigation, and robust incident response to prevent similar future breaches.
- Worked closely with team members in an industry-competitive setting, exchanging insights and implementing security best practices based on real-world cybersecurity scenarios.
- Received recognition for teamwork and analytical skills, and actively engaged with industry mentors, cybersecurity experts, and peers, gaining valuable insights into real-world threat mitigation strategies.
Associate Customer Care Engineer
Smartbear | Bangalore, KA
February 2023 - August 2023
- Analyzed customer-reported technical issues and anomalies, identifying patterns and trends in software performance.
- Worked with large datasets from logs to detect error trends and resolve customer issues, improving resolution time by 50%.
- Collaborated with engineering teams to identify security vulnerabilities and software abuse cases, contributing to a 15% improvement in product reliability.
- Assisted in network security assessments, ensuring proper configurations and compliance with industry standards.
- Provided data-driven insights for improving fraud detection and abuse mitigation strategies in software products.
Software Engineer Intern
Cnetric Global Inc. | Bengaluru, India
August 2022 - October 2022
- Assisted in deploying enterprise software solutions on cloud platforms, improving efficiency and scalability.
- Utilized industry-standard tools such as Postman for API testing and Node.js for backend development, leading to a 30% reduction in response time for server requests.
- Developed and optimized server-side logic using Node.js, ensuring faster execution times and improved data processing.
- Worked within an Agile development environment, collaborating with cross-functional teams to meet project deadlines and deliver high-performance software solutions.
Machine Learning & AI Intern
Quant Masters | India
August 2021 - September 2021
- Led and executed a Sentiment Analysis Project on Amazon Reviews, earning a Certificate of Excellence for dedication and contributions.
- Collected and cleaned large datasets of Amazon customer reviews, transforming raw data into a structured format suitable for analysis.
- Utilized Scikit-learn and TensorFlow to develop and train sentiment analysis models, accurately classifying customer reviews as positive, neutral, or negative.
- Experimented with different machine learning algorithms, optimizing hyperparameters to improve model accuracy and efficiency.
- Employed Matplotlib and Seaborn to generate insightful data visualizations, presenting findings on customer sentiment trends effectively.
Projects
Completed Projects
Implementation of Public Key Infrastructure for Document Security
- Designed and deployed a Public Key Infrastructure (PKI) using a self-signed certificate on Windows Server to encrypt and secure sensitive documents for Wonderville Town Hall.
- Ensured cross-platform compatibility by enabling secure decryption on Windows and Ubuntu, preventing unauthorized access to confidential files.
- Tested encryption mechanisms in a cyber range environment, simulating real-world attacks and validating security resilience.
PKI
Encryption
Windows Server
Ubuntu
Security
Advanced Ransomware Analysis & Reverse Engineering
- Conducted static & dynamic malware analysis on Sepsis Ransomware, utilizing PE View, PE Studio, IDA Pro, Procmon, Procdot, and Wireshark to reverse-engineer encryption techniques and identify Indicators of Compromise (IOCs).
- Dissected AES-128 CBC encryption methods, registry modifications, and persistence techniques, formulating defensive countermeasures against future ransomware threats.
- Provided detailed forensic documentation to support threat intelligence and incident response teams.
Malware Analysis
Reverse Engineering
IDA Pro
Wireshark
Forensics
Open-Source Intelligence (OSINT) Threat Assessment
- Conducted a comprehensive OSINT investigation using Shodan, Maltego, MXToolbox, and WHOIS lookups to map attack surfaces, employee exposure, and digital footprints of an organization.
- Assessed security risks related to DNS misconfigurations, email spoofing, and data breaches, providing actionable recommendations for mitigating cyber threats.
- Demonstrated real-world intelligence gathering techniques to aid threat detection, investigations, and security decision-making.
OSINT
Threat Intelligence
Shodan
Maltego
Risk Assessment
Recreation & Defense Analysis of the Mitnick Attack (TCP Session Hijacking)
- Simulated Mitnick's TCP session hijacking attack in a controlled lab, showcasing vulnerabilities in TCP protocol and sequence number prediction.
- Executed a SYN flooding attack to demonstrate denial-of-service effects, reinforcing the importance of rate limiting, SYN cookies, and intrusion detection systems (IDS/IPS).
- Delivered technical insights and security hardening strategies to strengthen enterprise network defenses against similar real-world attacks.
TCP/IP
Session Hijacking
Network Security
DoS
IDS/IPS
Ongoing Projects
Phishing Detection Using Machine Learning (Capstone Project)
Capstone Project
- Developing a phishing detection system using datasets (PhishTank, OpenPhish, Enron, SpamAssassin) and machine learning models (Logistic Regression, Random Forest, XGBoost, Deep Learning).
- Building a Chrome extension integrated with a Flask API to provide real-time phishing alerts for users.
- Deploying the model on cloud platforms (AWS, Azure, or GCP) or as a Streamlit Web App, ensuring scalability and usability.
- Conducting rigorous testing and validation of phishing detection accuracy across different domains and attack patterns.
Machine Learning
Phishing Detection
Chrome Extension
Flask
API
Automated Penetration Testing & Vulnerability Assessment Tool
In Development
- Developing a prompt-driven security assessment tool that integrates network scanning, vulnerability detection, and penetration testing in an AI-powered interface.
- Enhancing the tool to identify vulnerabilities, automate reconnaissance, and execute security tests using Metasploit, Nmap, Hydra, and JohnTheRipper.
- Implementing natural language prompts to allow users to request security tasks conversationally, improving usability for security analysts and red teams.
- Structuring the tool for future integrations with SIEM systems, enabling automated alerting and reporting on detected vulnerabilities.
Penetration Testing
Automation
AI
Metasploit
Nmap
Get In Touch
Contact Information
Feel free to reach out through any of these channels
Send a Message
I'll get back to you as soon as possible