Cybersecurity & Criminal Justice Professional

Specializing in digital forensics, incident response, and the intersection of technology and law enforcement

About Me

Aziz Alghamdi

Who I Am

I am a dedicated cybersecurity professional with a focus on the intersection of technology and criminal justice. My academic background combines computer science with an emphasis on cybersecurity and a minor in criminal justice, providing me with a unique perspective on digital security challenges.

My research interests include digital forensics, cryptocurrency-based crimes, post-quantum cryptography, and the evolution of digital evidence in criminal investigations. I am passionate about developing innovative solutions that bridge the gap between technical security measures and law enforcement needs.

Throughout my academic and professional journey, I have developed a comprehensive skill set that enables me to analyze complex security threats, implement effective countermeasures, and collaborate with cross-functional teams to address cybersecurity challenges.

Digital Forensics
Incident Response
Penetration Testing
Network Security
Cryptography
Secure Coding
Threat Intelligence
Security Analytics
Interactive Learning

Education

August 2018 - June 2019

High school Diploma

September High School

  • Boulder, Colorado, United States
August 2021 - May 2025

Bachelor of Arts and Science in Computer Science

University of Colorado at Colorado Springs

Specialization in Cybersecurity with a Minor in Criminal Justice. Focusing on advanced security concepts, digital forensics, and the legal implications of cybercrime.

  • Member of Mountain Lions Cyber Club,
  • Participant in National Cyber League competitions
  • Colorado Springs, Colorado, United States

Research

My research focuses on the intersection of cybersecurity, digital forensics, and criminal justice, aiming to develop more effective methods for investigating and preventing cybercrime.

Publication

Forensic Analysis of Cryptocurrency-Based Ransomware Attacks: Criminal Justice and Technical Perspectives

This research explores the challenges law enforcement faces when investigating ransomware attacks that utilize cryptocurrency payments. The study proposes a framework for tracking cryptocurrency transactions while maintaining legal compliance with chain-of-custody requirements for digital evidence.

Published: 2024 Journal of Cybersecurity & Digital Forensics
Read More
Publication

Post-Quantum Cryptography Implementation Challenges: Security Implications for Critical Infrastructure

This ongoing research examines the practical challenges of implementing post-quantum cryptographic algorithms in critical infrastructure systems. The study analyzes potential security vulnerabilities during transitional periods and proposes a risk mitigation framework.

Published: 2025
Read More
Publication

Quantum Cryptography Implications for Digital Evidence in Criminal Investigations

This research explores how the advent of quantum computing will transform digital evidence collection, preservation, and presentation in court. The paper discusses the legal and technical considerations for ensuring the admissibility of digital evidence in a post-quantum cryptographic environment.

Published: 2025 International Journal of Digital Criminology
Read More
Publication

Blockchain Forensics: Challenges in Criminal Prosecution of Cryptocurrency-Related Crimes

This study examines the challenges of using blockchain forensics in prosecuting cryptocurrency crimes. It highlights technical, legal, and procedural issues, analyzes case studies, and identifies gaps in current laws. The research proposes strategies to improve investigations while balancing privacy with effective law enforcement.

Published: 2024 International Journal of Digital Criminology
Read More
Publication

Digital Forensics Challenges in Modern Encrypted Environments

This study explores the growing challenges digital forensic investigators face with modern encryption. As encryption becomes more advanced, it creates major technical and legal hurdles for evidence collection. The paper reviews current technologies, anti-forensic tactics, legal issues, and new forensic methods, emphasizing the need to balance privacy with law enforcement needs. Findings highlight the ongoing need to adapt forensic tools, laws, and training to keep pace with evolving encryption.

Published: 2025
Read More
Publication

Evaluation of Digital Forensics Techniques in Modern Criminal Investigations

This research explores the effectiveness and challenges of modern digital forensics in criminal investigations. It reviews current techniques and issues, including encryption, cloud evidence, mobile forensics, and courtroom admissibility. While progress has been made, the study highlights ongoing challenges like anti-forensics, cross-border cases, and fast-changing technology, calling for continual updates to both forensic methods and legal standards.

Published: 2024
Read More
Publication

The Legal and Technical Challenges of Cryptocurrency-Based Money Laundering

This study examines how cryptocurrency enables money laundering and challenges traditional AML efforts. It highlights key vulnerabilities and calls for advanced blockchain tools, international cooperation, and better law enforcement training to address the issue effectively.

Published: 2024
Read More

Projects

A selection of academic and personal projects that demonstrate my technical skills and research interests in cybersecurity and criminal justice.

Digital Forensic Analysis Toolkit

Developed a comprehensive digital forensic toolkit that automates the collection and analysis of volatile and non-volatile data from compromised systems. The tool incorporates chain-of-custody documentation to ensure evidence admissibility in legal proceedings.

Python Digital Forensics Memory Analysis

Cryptocurrency Transaction Tracer

Created a tool that visualizes and analyzes cryptocurrency transaction patterns to identify suspicious activities. The system employs machine learning algorithms to detect potential money laundering techniques and generates reports suitable for law enforcement investigations.

Blockchain Machine Learning Data Visualization

Zero-Trust Security Implementation Framework

Designed and implemented a zero-trust security architecture for a university research lab environment. The framework includes continuous authentication protocols, least privilege access controls, and comprehensive activity logging for security monitoring and incident response.

Network Security Access Control Security Architecture

Netflix Streaming Service Mock Up

Developed a responsive web application that replicates the Netflix streaming interface, focusing on the user experience and UI design. Created a secure authentication system, content categorization, and search functionality to simulate the core features of a modern streaming platform.

HTML/CSS JavaScript Responsive Design UI/UX

Snapchat Clone Application

Created a functional Snapchat clone with ephemeral messaging capabilities, camera filters, and story features. Implemented real-time communication, media processing, and intuitive gesture controls to replicate the core functionality of the popular social media platform.

Swift/Android Firebase Camera API Real-time Messaging

Instagram Interface Recreation

Designed and built a faithful recreation of Instagram's user interface and core functionality. Features include photo sharing, user profiles, infinite-scroll feed, likes and comments systems, and direct messaging capabilities. Focused on creating a smooth, responsive experience across all devices.

React Node.js MongoDB Responsive Design

Certifications & Skills

Professional certifications and technical skills that complement my academic qualifications and research experience.

Google Cybersecurity Professional Certificate

Google (via Coursera)

Comprehensive cybersecurity program covering security fundamentals, tools, and practical skills needed for entry-level cybersecurity roles.

Completed: April 17, 2025

Verify Certificate

Foundations of Cybersecurity

Google (via Coursera)

Mastery of cybersecurity fundamentals, security frameworks, and core security concepts.

Completed: April 17, 2025

Verify Certificate

Play It Safe: Manage Security Risks

Google (via Coursera)

Skills in security risk assessment, management, and mitigation strategies.

Completed: April 17, 2025

Verify Certificate

Connect and Protect: Networks and Network Security

Google (via Coursera)

Expertise in network architecture, protocols, and securing network infrastructure.

Completed: April 17, 2025

Verify Certificate

Tools of the Trade: Linux and SQL

Google (via Coursera)

Proficiency in Linux operating system and SQL database security techniques.

Completed: April 17, 2025

Verify Certificate

Assets, Threats, and Vulnerabilities

Google (via Coursera)

Knowledge in identifying critical assets, recognizing threats, and remediating vulnerabilities.

Completed: April 17, 2025

Verify Certificate

Sound the Alarm: Detection and Response

Google (via Coursera)

Skills in security incident detection, analysis, and effective response procedures.

Completed: April 17, 2025

Verify Certificate

Automate Cybersecurity Tasks with Python

Google (via Coursera)

Proficiency in developing Python scripts for security automation and analysis.

Completed: April 17, 2025

Verify Certificate

Put It to Work: Prepare for Cybersecurity Jobs

Google (via Coursera)

Career preparation for cybersecurity industry including job search strategies and professional development.

Completed: April 17, 2025

Verify Certificate

Programming Languages

Technical Skills

Proficient in Python, C++, C#, C, SQL, and other languages for security application development and analysis.

Security Tools

Technical Skills

Experience with Wireshark, Metasploit, Nmap, Burp Suite, SIEM solutions, and other cybersecurity tools.

Systems & Networks

Technical Skills

Proficient in Windows, Linux, Kali Linux, virtualization, cloud security, and network architecture.

Contact Me

I'm interested in research collaborations, cybersecurity projects, and career opportunities in digital forensics and information security.

Email

azizcsecj@gmail.com

Phone

+1 (720) 400-1869

+966 50 006 5661

Location

Riyadh, Saudi Arabia

Website

aziz707.info