Available for opportunities

Amed
Cybersecurity
Specialist

// Penetration testing, network defense & threat analysis. Building security from the ground up.

Who I Am

I'm a cybersecurity specialist focused on understanding how systems break — and how to make them resilient. My approach is hands-on: I learn by building, breaking, and rebuilding.

My work spans penetration testing, network security, reverse engineering, and Linux administration. I'm comfortable in terminal environments and prefer building custom tools over relying on off-the-shelf solutions.

Currently deepening my skills in offensive security, threat analysis, and security architecture — always looking for the next challenge.

5+
Projects
3+
Certifications
10+
Tools Mastered
Curiosity

Technical Arsenal

🛡️

Offensive Security

Nmap Metasploit Burp Suite Wireshark John the Ripper Hydra
🐧

Systems & OS

Kali Linux Ubuntu Windows Server Bash PowerShell VMware
🌐

Network & Defense

TCP/IP Firewall Config IDS/IPS VPN SIEM Snort
⚙️

Programming & Scripting

Python Bash Scripting SQL HTML/CSS JavaScript Regex
🔍

Analysis & Forensics

JADX Ghidra Volatility OSINT Autopsy ADB
📋

Compliance & Frameworks

HIPAA NIST OWASP Top 10 MITRE ATT&CK ISO 27001 Risk Assessment

Featured Work

🔓

Android API Reverse Engineering

Reverse-engineered a transit app's API endpoints using ADB, APK extraction, and JADX static analysis. Identified hidden Retrofit interfaces and base URLs.

JADXADBRetrofitAndroid
🖥️

Custom Network Scanner

Built a Python-based network reconnaissance tool for automated host discovery, port scanning, and service fingerprinting on local networks.

PythonScapyNmapBash
🧪

Home Lab Security Environment

Designed a virtualized security lab with segmented networks, vulnerable VMs, and monitoring tools for hands-on penetration testing practice.

VMwarepfSenseSplunkKali

Journey So Far

2024 — Present

Cybersecurity Studies

University — Cybersecurity / IT

Focused coursework in network security, ethical hacking, digital forensics, and compliance frameworks. Active in CTF competitions and security research.

2023 — 2024

Self-Directed Security Research

Independent

Built home lab environments, practiced on HackTheBox and TryHackMe platforms, reverse-engineered Android applications, and studied HIPAA security frameworks.

2022 — 2023

Linux & Systems Foundation

Self-taught

Developed core Linux administration skills, dual-boot setups, shell scripting, and networking fundamentals that form the base of all security work.

Let's Connect

Open to internships, collaborations, security research projects, and CTF teams. If you have something interesting — reach out.