Specializing in digital forensics, incident response, and the intersection of technology and law enforcement
I am a dedicated cybersecurity professional with a focus on the intersection of technology and criminal justice. My academic background combines computer science with an emphasis on cybersecurity and a minor in criminal justice, providing me with a unique perspective on digital security challenges.
My research interests include digital forensics, cryptocurrency-based crimes, post-quantum cryptography, and the evolution of digital evidence in criminal investigations. I am passionate about developing innovative solutions that bridge the gap between technical security measures and law enforcement needs.
Throughout my academic and professional journey, I have developed a comprehensive skill set that enables me to analyze complex security threats, implement effective countermeasures, and collaborate with cross-functional teams to address cybersecurity challenges.
Hands-on training for the next generation of security professionals
Specialization in Cybersecurity with a Minor in Criminal Justice. Focusing on advanced security concepts, digital forensics, and the legal implications of cybercrime.
My research focuses on the intersection of cybersecurity, digital forensics, and criminal justice, aiming to develop more effective methods for investigating and preventing cybercrime.
This research explores the challenges law enforcement faces when investigating ransomware attacks that utilize cryptocurrency payments. The study proposes a framework for tracking cryptocurrency transactions while maintaining legal compliance with chain-of-custody requirements for digital evidence.
Read MoreThis ongoing research examines the practical challenges of implementing post-quantum cryptographic algorithms in critical infrastructure systems. The study analyzes potential security vulnerabilities during transitional periods and proposes a risk mitigation framework.
Read MoreThis research explores how the advent of quantum computing will transform digital evidence collection, preservation, and presentation in court. The paper discusses the legal and technical considerations for ensuring the admissibility of digital evidence in a post-quantum cryptographic environment.
Read MoreA selection of academic and personal projects that demonstrate my technical skills and research interests in cybersecurity and criminal justice.
Developed a comprehensive digital forensic toolkit that automates the collection and analysis of volatile and non-volatile data from compromised systems. The tool incorporates chain-of-custody documentation to ensure evidence admissibility in legal proceedings.
Created a tool that visualizes and analyzes cryptocurrency transaction patterns to identify suspicious activities. The system employs machine learning algorithms to detect potential money laundering techniques and generates reports suitable for law enforcement investigations.
Designed and implemented a zero-trust security architecture for a university research lab environment. The framework includes continuous authentication protocols, least privilege access controls, and comprehensive activity logging for security monitoring and incident response.
Professional certifications and technical skills that complement my academic qualifications and research experience.
Google (via Coursera)
Comprehensive cybersecurity program covering security fundamentals, tools, and practical skills needed for entry-level cybersecurity roles.
Completed: April 17, 2025
Google (via Coursera)
Mastery of cybersecurity fundamentals, security frameworks, and core security concepts.
Completed: April 17, 2025
Google (via Coursera)
Skills in security risk assessment, management, and mitigation strategies.
Completed: April 17, 2025
Google (via Coursera)
Expertise in network architecture, protocols, and securing network infrastructure.
Completed: April 17, 2025
Google (via Coursera)
Proficiency in Linux operating system and SQL database security techniques.
Completed: April 17, 2025
Google (via Coursera)
Knowledge in identifying critical assets, recognizing threats, and remediating vulnerabilities.
Completed: April 17, 2025
Google (via Coursera)
Skills in security incident detection, analysis, and effective response procedures.
Completed: April 17, 2025
Google (via Coursera)
Proficiency in developing Python scripts for security automation and analysis.
Completed: April 17, 2025
Google (via Coursera)
Career preparation for cybersecurity industry including job search strategies and professional development.
Completed: April 17, 2025
Technical Skills
Proficient in Python, C++, C#, C, SQL, and other languages for security application development and analysis.
Technical Skills
Experience with Wireshark, Metasploit, Nmap, Burp Suite, SIEM solutions, and other cybersecurity tools.
Technical Skills
Proficient in Windows, Linux, Kali Linux, virtualization, cloud security, and network architecture.
I'm interested in research collaborations, cybersecurity projects, and career opportunities in digital forensics and information security.
azizcsecj@gmail.com
+1 (720) ***-****
+966 50 *** ****
Riyadh, Saudi Arabia
aziz707.info