Specializing in digital forensics, incident response, and the intersection of technology and law enforcement
I am a dedicated cybersecurity professional with a focus on the intersection of technology and criminal justice. My academic background combines computer science with an emphasis on cybersecurity and a minor in criminal justice, providing me with a unique perspective on digital security challenges.
My research interests include digital forensics, cryptocurrency-based crimes, post-quantum cryptography, and the evolution of digital evidence in criminal investigations. I am passionate about developing innovative solutions that bridge the gap between technical security measures and law enforcement needs.
Throughout my academic and professional journey, I have developed a comprehensive skill set that enables me to analyze complex security threats, implement effective countermeasures, and collaborate with cross-functional teams to address cybersecurity challenges.
Specialization in Cybersecurity with a Minor in Criminal Justice. Focusing on advanced security concepts, digital forensics, and the legal implications of cybercrime.
My research focuses on the intersection of cybersecurity, digital forensics, and criminal justice, aiming to develop more effective methods for investigating and preventing cybercrime.
This research explores the challenges law enforcement faces when investigating ransomware attacks that utilize cryptocurrency payments. The study proposes a framework for tracking cryptocurrency transactions while maintaining legal compliance with chain-of-custody requirements for digital evidence.
Read MoreThis ongoing research examines the practical challenges of implementing post-quantum cryptographic algorithms in critical infrastructure systems. The study analyzes potential security vulnerabilities during transitional periods and proposes a risk mitigation framework.
Read MoreThis research explores how the advent of quantum computing will transform digital evidence collection, preservation, and presentation in court. The paper discusses the legal and technical considerations for ensuring the admissibility of digital evidence in a post-quantum cryptographic environment.
Read MoreThis study examines the challenges of using blockchain forensics in prosecuting cryptocurrency crimes. It highlights technical, legal, and procedural issues, analyzes case studies, and identifies gaps in current laws. The research proposes strategies to improve investigations while balancing privacy with effective law enforcement.
Read MoreThis study explores the growing challenges digital forensic investigators face with modern encryption. As encryption becomes more advanced, it creates major technical and legal hurdles for evidence collection. The paper reviews current technologies, anti-forensic tactics, legal issues, and new forensic methods, emphasizing the need to balance privacy with law enforcement needs. Findings highlight the ongoing need to adapt forensic tools, laws, and training to keep pace with evolving encryption.
Read MoreThis research explores the effectiveness and challenges of modern digital forensics in criminal investigations. It reviews current techniques and issues, including encryption, cloud evidence, mobile forensics, and courtroom admissibility. While progress has been made, the study highlights ongoing challenges like anti-forensics, cross-border cases, and fast-changing technology, calling for continual updates to both forensic methods and legal standards.
Read MoreThis study examines how cryptocurrency enables money laundering and challenges traditional AML efforts. It highlights key vulnerabilities and calls for advanced blockchain tools, international cooperation, and better law enforcement training to address the issue effectively.
Read MoreA selection of academic and personal projects that demonstrate my technical skills and research interests in cybersecurity and criminal justice.
Developed a comprehensive digital forensic toolkit that automates the collection and analysis of volatile and non-volatile data from compromised systems. The tool incorporates chain-of-custody documentation to ensure evidence admissibility in legal proceedings.
Created a tool that visualizes and analyzes cryptocurrency transaction patterns to identify suspicious activities. The system employs machine learning algorithms to detect potential money laundering techniques and generates reports suitable for law enforcement investigations.
Designed and implemented a zero-trust security architecture for a university research lab environment. The framework includes continuous authentication protocols, least privilege access controls, and comprehensive activity logging for security monitoring and incident response.
Developed a responsive web application that replicates the Netflix streaming interface, focusing on the user experience and UI design. Created a secure authentication system, content categorization, and search functionality to simulate the core features of a modern streaming platform.
Created a functional Snapchat clone with ephemeral messaging capabilities, camera filters, and story features. Implemented real-time communication, media processing, and intuitive gesture controls to replicate the core functionality of the popular social media platform.
Designed and built a faithful recreation of Instagram's user interface and core functionality. Features include photo sharing, user profiles, infinite-scroll feed, likes and comments systems, and direct messaging capabilities. Focused on creating a smooth, responsive experience across all devices.
Professional certifications and technical skills that complement my academic qualifications and research experience.
Google (via Coursera)
Comprehensive cybersecurity program covering security fundamentals, tools, and practical skills needed for entry-level cybersecurity roles.
Completed: April 17, 2025
Google (via Coursera)
Mastery of cybersecurity fundamentals, security frameworks, and core security concepts.
Completed: April 17, 2025
Google (via Coursera)
Skills in security risk assessment, management, and mitigation strategies.
Completed: April 17, 2025
Google (via Coursera)
Expertise in network architecture, protocols, and securing network infrastructure.
Completed: April 17, 2025
Google (via Coursera)
Proficiency in Linux operating system and SQL database security techniques.
Completed: April 17, 2025
Google (via Coursera)
Knowledge in identifying critical assets, recognizing threats, and remediating vulnerabilities.
Completed: April 17, 2025
Google (via Coursera)
Skills in security incident detection, analysis, and effective response procedures.
Completed: April 17, 2025
Google (via Coursera)
Proficiency in developing Python scripts for security automation and analysis.
Completed: April 17, 2025
Google (via Coursera)
Career preparation for cybersecurity industry including job search strategies and professional development.
Completed: April 17, 2025
Technical Skills
Proficient in Python, C++, C#, C, SQL, and other languages for security application development and analysis.
Technical Skills
Experience with Wireshark, Metasploit, Nmap, Burp Suite, SIEM solutions, and other cybersecurity tools.
Technical Skills
Proficient in Windows, Linux, Kali Linux, virtualization, cloud security, and network architecture.
I'm interested in research collaborations, cybersecurity projects, and career opportunities in digital forensics and information security.
azizcsecj@gmail.com
+1 (720) 400-1869
+966 50 006 5661
Riyadh, Saudi Arabia
aziz707.info