Hi,I'm Abdullah Amouriđź‘‹

Aspiring cyber security professional actively looking for a cyber security role. I continue to learn and build my skills in both the GRC and technical areas of cyber security.


EXPERIENCE
Ema Security
Penetration Tester Intern
Aug 2025 - Sep 2025
  • Conducted web application security assessments using BurpSuite and brute-force techniques.
  • Found and validated vulnerabilities including SQL injection, XSS, IDOR, and authentication issues.
  • Performed reconnaissance, enumeration, and automated scanning with Nessus and OWASP ZAP.

Projects & Certificates
Real-Time Honeypot Log System
Real-Time Honeypot Logs System
  • Built a cloud-based lab to simulate a live environment for detecting and analyzing unauthorized access.
  • Configured an Apache2 web server to act as a target system for capturing and logging real-time attack data.
  • Implemented Firewall rules to manage incoming traffic, secure management ports, and control the exposure of the trap system.
  • Developed a real-time dashboard to visualize attack info like: source IP Address, Destination Port, and used Commands, for better analysis of attacks patterns.
SOC Analyst Learning Path
SOC Analyst Path - LetsDefend
  • SOC Fundamentals
  • Cyber Kill Chain
  • MITRE ATT&CK Framework
  • Phishing Email Analysis
  • Detecting Web Attacks
  • Detecting Brute Force Attacks
  • Dynmaic Malware Analysis
  • Network Log Analysis
  • SPLUNK SIEM Tool
  • Cyber Threat Intelligence
SOC Analyst Learning Path
Penetration Testing - Tryhackme
Aug 2025 - Oct 2025
  • Network Reconnaissance: Used Nmap for network scanning, service discovery, and attack surface mapping.
  • Exploitation: Identified vulnerabilities and used exploits to gain system access via reverse shells.
  • Post-Exploitation: Performed privilege escalation to move from user-level to administrative access in lab environments.
SOC Analyst Learning Path
Simulated SIEM Operations - LetsDefend
Nov 2025 - Fab 2026
  • Log Monitoring: Analyzed real-time event logs for suspicious activity.
  • Alert Triage: Prioritized security alerts based on severity and risk.
  • Incident Investigation: Followed playbooks to investigate and resolve threats.
  • Case Management: Managed and documented security incidents via the ticketing system.
Cyber Security For Students
Cyber Security For Students - LetsDefend
  • Linux & Windows Fundamentals
  • Network Fundamentals & Protocols
  • Network Traffic Analysis with Wireshark
  • Cryptographic Basics.

Contact Me
For more info: