Back to Portfolio

MOHAMMED FOUZAN AAMIRI

mohammedfouzan.aamiri@pace.edu | (551) 260-8984 | GitHub | LinkedIn

EDUCATION

Pace University, Seidenberg School of Computer Science and Information Systems

Master of Science (MS) in Cybersecurity

New York, NY

05/2025

Relevant Coursework: Information Security Policy & Management (GRC), Network Engineering/Security & Defense, Ethical Hacking and Penetration testing, Malware Analysis and Reverse Engineering, Cyber Threat Intelligence Analysis & Modelling, Digital & Mobile Forensics, Automating Information security with Python & PowerShell, Data Centers

Visvesvaraya Technological University

Bachelor of Engineering (BE) in Computer Engineering

Bangalore, KA

07/2022

SKILLS

  • Data Analysis & Security Intelligence: Log Analysis, Trend Detection, Anomaly Identification, Incident Response, Threat Intelligence, SIEM (Splunk, ELK Stack), Data-driven Decision Making, Digital Forensics, OSINT (Maltego, Shodan, MXToolbox)
  • Programming & Automation: Python, C++, Java, PowerShell, Shell Scripting, SQL, Ansible, CloudFormation, Terraform, Python for Security Automation
  • Security Tools & Platforms: SIEM (Splunk), EDR (CrowdStrike, Microsoft Defender), SOAR, Wireshark, Nessus, Terraform, Windows & Linux Forensics, IDA Pro, FTK, Procmon, Procdot, UFED, OSINT Tools
  • Networking & Cloud Security: Palo Alto Firewall, Cisco ASA, VPN, DNS, EIGRP, BGP, OSPF, IDS/IPS, TLS/SSL, Wireless Security, Zero Trust Architecture (ZTA), Microsegmentation, AWS IAM, GCP Security, Azure Security Center
  • Cybersecurity & Fraud Prevention: Malware Analysis, Ransomware Reverse Engineering, Adversary Emulation (Atomic Red Team), Risk Management, Threat Modeling (MITRE ATT&CK, Diamond Model, Cyber Kill Chain), Intrusion Detection/Prevention, IAM, ISO 27001, NIST Framework, Phishing Detection & Analysis
  • Cryptography & Secure Communications: PKI (Public Key Infrastructure), TLS Certificate Management, OpenSSL, Self-Signed Certificates, Cryptographic Protocols
  • Certifications: Networking Essentials (Cisco), Microsoft Azure IAM, CompTia A+, Security+ (InProgress)

EXPERIENCE

Cybersecurity Graduate Researcher

09/2023–05/2025

Pace University

New York, NY

  • Developed security automation scripts using Python & PowerShell, including network scanning (Nmap), forensic data extraction, and automated threat detection.
  • Led open-source intelligence (OSINT) research on STV Incorporated, conducting domain reconnaissance, DNS analysis, and security risk assessment.
  • Designed a Public Key Infrastructure (PKI) solution for document encryption using self-signed certificates and tested cross-platform decryption.
  • Investigated TCP session hijacking and SYN flooding attacks, replicating the Mitnick Attack in a controlled environment and proposing defensive strategies.
  • Analyzed mobile forensics data (Android & iOS), including file system extraction, encrypted artifacts, and call detail record (CDR) analysis.
  • Wrote detailed technical reports and case studies, providing actionable insights for threat intelligence, incident response, and forensic investigations.

Associate Customer Care Engineer

02/2023 - 08/2023

Smartbear

Bangalore, KA

  • Analyzed customer-reported technical issues and anomalies, identifying patterns and trends in software performance.
  • Worked with large datasets from logs to detect error trends and resolve customer issues, improving resolution time by 50%.
  • Collaborated with engineering teams to identify security vulnerabilities and software abuse cases, contributing to a 15% improvement in product reliability.
  • Assisted in network security assessments, ensuring proper configurations and compliance with industry standards.
  • Provided data-driven insights for improving fraud detection and abuse mitigation strategies in software products.

PROJECTS

Implementation of Public Key Infrastructure for Document Security(GitHub)

  • Designed and deployed a Public Key Infrastructure (PKI) using a self-signed certificate on Windows Server to encrypt and secure sensitive documents for Wonderville Town Hall.
  • Ensured cross-platform compatibility by enabling secure decryption on Windows and Ubuntu, preventing unauthorized access to confidential files.
  • Tested encryption mechanisms in a cyber range environment, simulating real-world attacks and validating security resilience.

Advanced Ransomware Analysis & Reverse Engineering(GitHub)

  • Conducted static & dynamic malware analysis on Sepsis Ransomware, utilizing PE View, PE Studio, IDA Pro, Procmon, Procdot, and Wireshark to reverse-engineer encryption techniques and identify Indicators of Compromise (IOCs).
  • Dissected AES-128 CBC encryption methods, registry modifications, and persistence techniques, formulating defensive countermeasures against future ransomware threats.
  • Provided detailed forensic documentation to support threat intelligence and incident response teams.

Open-Source Intelligence (OSINT) Threat Assessment(GitHub)

  • Conducted a comprehensive OSINT investigation using Shodan, Maltego, MXToolbox, and WHOIS lookups to map attack surfaces, employee exposure, and digital footprints of an organization.
  • Assessed security risks related to DNS misconfigurations, email spoofing, and data breaches, providing actionable recommendations for mitigating cyber threats.
  • Demonstrated real-world intelligence gathering techniques to aid threat detection, investigations, and security decision-making.

Recreation & Defense Analysis of the Mitnick Attack (TCP Session Hijacking)(GitHub)

  • Simulated Mitnick's TCP session hijacking attack in a controlled lab, showcasing vulnerabilities in TCP protocol and sequence number prediction.
  • Executed a SYN flooding attack to demonstrate denial-of-service effects, reinforcing the importance of rate limiting, SYN cookies, and intrusion detection systems (IDS/IPS).
  • Delivered technical insights and security hardening strategies to strengthen enterprise network defenses against similar real-world attacks.

ONGOING PROJECTS

Phishing Detection Using Machine Learning (Capstone Project)

  • Developing a phishing detection system using datasets (PhishTank, OpenPhish, Enron, SpamAssassin) and machine learning models (Logistic Regression, Random Forest, XGBoost, Deep Learning).
  • Building a Chrome extension integrated with a Flask API to provide real-time phishing alerts for users.
  • Deploying the model on cloud platforms (AWS, Azure, or GCP) or as a Streamlit Web App, ensuring scalability and usability.
  • Conducting rigorous testing and validation of phishing detection accuracy across different domains and attack patterns.

Automated Penetration Testing & Vulnerability Assessment Tool

  • Developing a prompt-driven security assessment tool that integrates network scanning, vulnerability detection, and penetration testing in an AI-powered interface.
  • Enhancing the tool to identify vulnerabilities, automate reconnaissance, and execute security tests using Metasploit, Nmap, Hydra, and JohnTheRipper.
  • Implementing natural language prompts to allow users to request security tasks conversationally, improving usability for security analysts and red teams.
  • Structuring the tool for future integrations with SIEM systems, enabling automated alerting and reporting on detected vulnerabilities.