Skip to content
View ahmed-humayun's full-sized avatar

Block or report ahmed-humayun

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
ahmed-humayun/README.md

πŸ‘‹ Hi, I'm Humayun Ahmed

πŸ“ New York City, NY | πŸ“ž 917-969-9351 | πŸ“§ humayunahmed290@gmail.com | LinkedIn | GitHub


TryHackMe

πŸ›‘οΈ SUMMARY

Cybersecurity enthusiast with a strong foundation in computer science and hands-on cybersecurity training. Proficient in vulnerability assessment, penetration testing, and malware analysis to identify and mitigate threats, ensuring robust protection of digital assets. Holding a Security+ certification and currently enrolled in Springboard’s cybersecurity program to enhance practical expertise. Committed to continuous learning and staying updated with emerging threats and industry best practices. Ready to leverage my skills and knowledge to contribute to innovative security solutions and safeguard organizational data.


πŸ’Ό WORK EXPERIENCE

Springboard
Cyber Security Trainee
February 2024 - Present

  • πŸ”’ Configured and deployed personal firewalls, antivirus programs, and host-based intrusion detection systems to enhance network security.
  • πŸ› οΈ Executed hands-on training in over 50 technical labs and completed 35 projects, enhancing practical cybersecurity skills with real-world applications.
  • πŸ“š Acquired expertise in systems security best practices through continuous training and certification courses, ensuring up-to-date knowledge in the ever-evolving cyber threat landscape.

πŸ’» PROJECT EXPERIENCE

Malware Analysis: WannaCry | GitHub
June 2024

  • πŸ›‘οΈ Successfully identified and documented critical symptoms and indicators of WannaCry ransomware infection, enhancing understanding of its impact.
  • πŸ” Extracted and analyzed significant strings and API calls, uncovering key operational details of the ransomware.
  • πŸ’‘ Discovered and detailed the WannaCry killswitch mechanism, providing crucial insights into its prevention and mitigation strategies.

Sandbox Environment Setup | GitHub
June 2024

  • πŸ–₯️ Established a secure sandbox environment for malware analysis by configuring VirtualBox with Windows VM running FLARE VM and REMnux VM with INetSim.
  • 🌐 Implemented a host-only network setup, ensuring isolated communication between VMs for controlled testing without compromising the primary network.
  • πŸ”„ Designed INetSim settings on REMnux to accurately simulate internet services, enabling comprehensive analysis of malware behavior and facilitating effective threat detection.

πŸŽ“ EDUCATION

John Jay College of Criminal Justice
Graduation date – June 2023
πŸŽ“ Bachelor of Science in Computer Science and Information Security


πŸ“œ CERTIFICATIONS

CompTIA Security+ Certification
πŸ—“οΈ July 2023


πŸ› οΈ SKILLS

Security:

  • Vulnerability Scanning, Penetration Testing, Malware Analysis, Incident Response, Risk Mitigation, Data Encryption, Intrusion Detection, IDS/IPS, DLP, SIEM/SOAR, EDR, Virtualization

Programming Languages:

  • Python, C++, JavaScript

Systems:

  • Windows, Linux, Unix

Tools:

  • Nmap, Wireshark, Metasploit, Splunk, Nessus, OpenVAS, BurpSuite, John the Ripper

Pinned Loading

  1. sandboxSetup sandboxSetup Public

  2. Diffie-Hellman Diffie-Hellman Public

    Python

  3. Malware-Analysis-WannaCry Malware-Analysis-WannaCry Public