Specializing in SAMA & NCA framework assessments, compliance roadmaps, and governance, risk & compliance consulting for Saudi organizations
I am a Cybersecurity GRC Specialist at Sēnsus, a leading consulting firm in Riyadh, Saudi Arabia. With expertise in Saudi regulatory frameworks including SAMA Cybersecurity Framework, NCA Essential Cybersecurity Controls (ECC), and NCA Data Cybersecurity Controls (DCC), I help organizations achieve and maintain compliance while strengthening their security posture.
My work involves conducting comprehensive cybersecurity assessments for financial institutions, government organizations, and private sector clients. I specialize in gap analysis, risk assessments, compliance roadmap development, and creating detailed Arabic and English documentation that meets Saudi regulatory standards.
I bring a unique blend of technical cybersecurity knowledge and practical GRC consulting experience, having completed major assessments for clients including MedGulf Insurance Company and the Islamic Military Counter Terrorism Coalition (IMCTC). My academic background combines computer science with cybersecurity specialization and criminal justice, providing a comprehensive perspective on digital security challenges.
Hands-on training for the next generation of security professionals
Conducting comprehensive cybersecurity framework assessments and compliance consulting for clients across financial services, government, and private sectors in Riyadh, Saudi Arabia.
Supporting business continuity initiatives and cybersecurity compliance for the Chamber's Odoo ERP system in Al-Ahsa, Saudi Arabia.
Specialization in Cybersecurity with a Minor in Criminal Justice. Focusing on advanced security concepts, digital forensics, and the legal implications of cybercrime.
My research focuses on the intersection of cybersecurity, digital forensics, and criminal justice, aiming to develop more effective methods for investigating and preventing cybercrime.
This research explores the challenges law enforcement faces when investigating ransomware attacks that utilize cryptocurrency payments. The study proposes a framework for tracking cryptocurrency transactions while maintaining legal compliance with chain-of-custody requirements for digital evidence.
Read MoreThis ongoing research examines the practical challenges of implementing post-quantum cryptographic algorithms in critical infrastructure systems. The study analyzes potential security vulnerabilities during transitional periods and proposes a risk mitigation framework.
Read MoreThis research explores how the advent of quantum computing will transform digital evidence collection, preservation, and presentation in court. The paper discusses the legal and technical considerations for ensuring the admissibility of digital evidence in a post-quantum cryptographic environment.
Read MoreA selection of academic and personal projects that demonstrate my technical skills and research interests in cybersecurity and criminal justice.
Developed a comprehensive digital forensic toolkit that automates the collection and analysis of volatile and non-volatile data from compromised systems. The tool incorporates chain-of-custody documentation to ensure evidence admissibility in legal proceedings.
Created a tool that visualizes and analyzes cryptocurrency transaction patterns to identify suspicious activities. The system employs machine learning algorithms to detect potential money laundering techniques and generates reports suitable for law enforcement investigations.
Designed and implemented a zero-trust security architecture for a university research lab environment. The framework includes continuous authentication protocols, least privilege access controls, and comprehensive activity logging for security monitoring and incident response.
Professional certifications and technical skills that complement my academic qualifications and research experience.
Google (via Coursera)
Comprehensive cybersecurity program covering security fundamentals, tools, and practical skills needed for entry-level cybersecurity roles.
Completed: April 17, 2025
Google (via Coursera)
Mastery of cybersecurity fundamentals, security frameworks, and core security concepts.
Completed: April 17, 2025
Google (via Coursera)
Skills in security risk assessment, management, and mitigation strategies.
Completed: April 17, 2025
Google (via Coursera)
Expertise in network architecture, protocols, and securing network infrastructure.
Completed: April 17, 2025
Google (via Coursera)
Proficiency in Linux operating system and SQL database security techniques.
Completed: April 17, 2025
Google (via Coursera)
Knowledge in identifying critical assets, recognizing threats, and remediating vulnerabilities.
Completed: April 17, 2025
Google (via Coursera)
Skills in security incident detection, analysis, and effective response procedures.
Completed: April 17, 2025
Google (via Coursera)
Proficiency in developing Python scripts for security automation and analysis.
Completed: April 17, 2025
Google (via Coursera)
Career preparation for cybersecurity industry including job search strategies and professional development.
Completed: April 17, 2025
Technical Skills
Proficient in Python, C++, C#, C, SQL, and other languages for security application development and analysis.
Technical Skills
Experience with Wireshark, Metasploit, Nmap, Burp Suite, SIEM solutions, and other cybersecurity tools.
Technical Skills
Proficient in Windows, Linux, Kali Linux, virtualization, cloud security, and network architecture.
I'm interested in research collaborations, cybersecurity projects, and career opportunities in digital forensics and information security.
azizcsecj@gmail.com
+1 (720) ***-****
+966 50 *** ****
Riyadh, Saudi Arabia
aziz707.info