Loading...

I'm

卂YOUB乃
EL MEJDOU乃

|__#IT:~$ CyberSecurity, |__#CyberSecurity:~$ AnalystSOC, |__#Ethical Hacker:~$ Pentester
Download CV
Read CV

37

Hard-Skills

11

Certificate

5

Projects

With Good Soft Skills:

Ethical and Legal Awareness

Time Management

Active Listening

Creativity

Read More
Technical Support and Security in Atento

2024

Processing and resolving reported issues, especially those requiring physical access or related to hardware, and managing most aspects related to physical security, hardware changes, and repairs.

Penetration Test / Incident Response

2023

Scope : Network - Infrastructure - Physical
Sections : Vulnerability - CVSS - Description - Risks - Solutions - Recommendations
+Leaked Emails Passwords
While Penetration Test, I detect an attack by a virus (Trojan) where the company's devices are used as zombies in DDOS attacks (denial-of-service).I responded to the attack and solved it...

Diploma Technician Specialized Infrastructure Digital option CyberSecurity

2021

A strong focus on the fields of cybersecurity (Cyber Security, SOC Analyst, Penetration Testing, Digital Forensics) aiming to become a SOC Analyst, along with studying the fundamentals and requirements in Networking, Operating System, Automation, Virtualization, and Cloud. This includes proficiency with numerous tools for defense and offense purposes.

Bachelor Professional Maintenance IT and Networks

2019

CCNA 1 / 2, Binary Math, Hardware, IT Essentials, Office, Windows, Linux

About Me

divider
Image

Hello!

I'm Ayoub El Mejdoub, a dedicated professional in the realm of cybersecurity with a strong focus on Security analyzing (SOC). With a solid foundation in IT and specialized expertise in cyber defense, I have a wealth of skills, knowledge and experience.
My journey in learning, search and Applying my knowledge as a technician specialized in the field of cybersecurity has equipped me with a comprehensive understanding of various domains within IT, bolstering my capabilities as an Analyst in a Security Operation Center. Proficient in an array of vital practices such as Penetration Testing, Hardening, Incident Response and Management, as well as Vulnerability Assessment, I am committed to fortifying digital landscapes against evolving threats. My continuous pursuit of knowledge and dedication to honing my self allow me to effectively navigate the dynamic and complex landscape of cybersecurity. With a fervent commitment to safeguarding digital ecosystems,
I endeavor to contribute my expertise to creating a more secure online world.

Skills & Study

My Skills

CyberSecurity
87%
Networking
70%
Problem Solving
70%
Hardening
82%
Penetration Testing
81%
Scripting
74%
Hardware - Binary Math - IT Essentials

2019 - 2020

Bac Pro Maintenance IT and Networks - ISMONTIC Tanger
CCNA 1&2 - Windows - Linux - Office

2020 - 2021

Bac Pro Maintenance IT and Networks - ISMONTIC Tanger
Networking - Operating System - Automatisation - Virtualisation - Cloud

2021 - 2022

Diploma Technician Specialized CyberSecurity - ISMONTIC Tanger
Cyber Security - Analyst SOC - Penetration Testing - Digital Forensics - Tools/Methodologies/Attacks

2022 - 2023

Diploma Technician Specialized CyberSecurity - ISMONTIC Tanger
OSCP Cours

100%

By Nakerah Network
Understand the basics of code

100%

By Google
Python Cours & Exercices

100%

By W3School
Html+CSS Cours & Exercices

100%

By W3School
JavaScript Course AR

100%

By Abderahman Gamal
Ethical Hacking Cours

63%

By Sa7ee7
CS50 Cours

61%

By Harvard University
Course Pentest Wireless

37%

By ITI Mooc academy

Experience

Technical Support and Security in Atento

Technical Support and Security

Jan 2024 - June 2024

Processing and resolving reported issues, especially those requiring physical access or related to hardware, and managing most aspects related to physical security, hardware changes, and repairs.

Penetration Test & Incident Response

Penetration Test & Incident Response

May 2023

Scope : Network - Infrastructure - Physical
Sections : Vulnerability - CVSS - Description - Risks - Solutions - Recommendations+Leaked Emails Passwords
While Penetration Test, I detect an attack by a virus (Trojan) where the company's devices are used as zombies in DDOS attacks (denial-of-service).I responded to the attack and solved it...

Winning a CTF hacking competition

Within the first three ranks CTF

May 2024

Winning the Capture the Flag Breakthrough Competition, the first organized in the north of the Kingdom of Morocco, Within the IT WAVE event

some

Hard Skills

  • best
  • Security
  • Pentest
  • IT
  • Scripting
  • Methodologies
...
Microsoft Network Resource Management
Active Directory
...
Operating System
Windows Client & Server
...
Operating System
LinuX
...
Programming Language
Python
...
Vulnerability Scanner
Nessus
...
Operating System for Penetration
Kali LinuX
...
Operating System
Ubuntu
...
SIEM - Log Analysis and Management
ELK Stack
...
Network Scanner
Nmap
...
Incident Response Tool
Velociraptor
...
Penetration Testing Software
MetaSploit
...
Firewall & Router Software
PFsense
...
Forensic tool
AutoPSY
...
Forensic tool
Volatility
...
Unix shell, Command language
Bash
...
Scripting Language for Automating Windows
Batch
...
Operating System of Routers & Switches
CISCO OS
...
Language Creating Web Pages
HTML
...
Web Design Language
CSS
...
Database of Exploits & Vulnerabilities
Exploit-DB
...
Database of Google hacking search queries
Google Hack Data Base
...
Search Engine to to identify vulnerable or misconfigured devices connected to the internet
Shodan
...
data visualization tool used for link analysis and data mining
Maltego
...
stands for Open Source Intelligence
OSINT
...
Virtualization Platform by Microsoft
Hyper-V
...
Virtualization Software
VMWARE
...
Productivity Software
Microsoft Office
...
Support IT - Remote Control App
TeamViewer
...
framework for understanding, categorizing cyber threats, defensive strategies.
MITRE ATT&CK
...
International standard for Information Security Management Systems
ISO27001
...
International standard for Information Security Risk Management
ISO27005
...
International standard for Information Security Incident Management
ISO27035
...
Recommendations Computer Security Incident Handling
NIST SP 800-61 R2
...
Open Web Application Security
OWASP
...
Open Source Security Testing Methodology Manual
OSSTMM
...
Penetration Testing Execution Standard
PTES
...
Concept Describe The Stages Cyber Attack
Kill-Chain

Projects

Finished Projects ✔Alhamdolilah


Dark Script
A YouTube channel explaining cybersecurity in a simple way

Dark Script

Smart Files
Desktop app use to Automation Orginize and Rename and Compression Files

Smart Files

Check Key
Test work buttons of Keyboard, The main reason for creating it is to facilitate the process of testing keyboards while working in Atento

Check Key

In Progress Projects : May God grant us success

FocusZone
...
FocusZone
31%
The Collector
CLI Batch App collect Data of Desktops of Entreprise
The Collector
87%

Future Projects : In Sha Allah

...
...

Certification

My Services

hardning


Hardening:

On-call Schedule
is process of strengthening the security of an organization's systems, applications, networks, and devices to make them more resistant to cyberattacks, unauthorized access, and other potential security risks. The goal of hardening is to reduce an organization's attack surface and minimize vulnerabilities that could be exploited by malicious actors.
IRM


Incident Response and Management:

Full-Time Work Schedule
Analyst SOC is a cybersecurity professional responsible for monitoring and analyzing an organization's security infrastructure, detecting and responding to security incidents, and maintaining the overall security of the organization's information systems and networks.
pentest


Penetration Testing

On-call Schedule
is a practice that involves simulating real-world cyberattacks on an organization's systems, networks, applications, and other assets to identify vulnerabilities and weaknesses. The primary objective of penetration testing is to assess the security posture of an organization and determine how well its defenses can withstand various types of cyberattacks. and After conducting the tests, penetration testers provide detailed reports that outline the vulnerabilities discovered, the methods used to exploit them, the potential impact of successful attacks, and recommendations for remediation.
vuln


Technical Support and Security

Full-Time Work Schedule
Technical support and security involve providing assistance and solutions for technical issues while ensuring the protection of an organization's systems, networks, and data. and troubleshoot and resolve hardware, software, and network problems, offering help through various channels such as phone, email, or live chat. Concurrently, security measures are implemented to safeguard against cyber threats, unauthorized access, and data breaches.

Let's Work Together


Call me:

+212 607 511 248


Mail me:

TheAMB47@gmail.com


Sociel Media:

© AMB47, All Right Reserved.
Customize By: Ayoub El Mejdoub
Developed by: HTML Codex
Designed By: Ayoub El Mejdoub