Quantum Secure Interface

WELCOME TO MY PORTFOLIO

I am Nader Waleed Mohamed — Cybersecurity Specialist | SOC Analyst

Cybersecurity Specialist · SOC Analyst

Securing the digital frontier with precision and intelligence.

270+

Hours SOC Training

4

Security Domains

12+

Lab Simulations

Portrait of Nader Waleed Mohamed
Scroll

About

Mission-driven defender focused on detection, investigation, and response.

Story

My journey into cybersecurity began with a fascination for how systems fail and how defenders can stay ahead. While studying Artificial Intelligence with a specialization in Cybersecurity, I gravitated toward blue team operations, threat detection, and incident response.

Through hands-on labs and real-world simulations, I developed practical experience analyzing logs, identifying suspicious activity, and investigating threats across networks and endpoints.

I continuously sharpen my skills through defensive tooling, SOC workflows, and projects centered on digital forensics and threat intelligence.

Unique Selling Point

I blend SOC monitoring, threat detection, and forensic analysis with clear reporting and calm execution under pressure. My work focuses on turning complex telemetry into actionable decisions.

العربي

أمتلك مزيجًا من مهارات مراقبة الأمن (SOC) وتحليل التهديدات والتحقيقات الجنائية الرقمية، مع خبرة عملية عبر المختبرات الأمنية التي تساعدني على اكتشاف الأنشطة المشبوهة بسرعة وتحليل الهجمات بكفاءة.

Education

Academic foundations with a focus on applied security.

Bachelor of Artificial Intelligence — Cybersecurity Department

Egyptian Russian University (ERU) · 2022 — 2026 (Expected)

Cybersecurity Fundamentals Network Security Digital Forensics AI in Security

Skills Dashboard

Core competencies visualized as a defensive command center.

Operational Proficiency

SOC Monitoring 92%
Threat Detection 88%
Incident Response 84%
Digital Forensics 86%
90%

SIEM

82%

Network

78%

OSINT

85%

IR Docs

Security Operations

  • Security Monitoring
  • Alert Triage
  • Incident Detection & Response
  • Log Correlation
  • Threat Hunting Basics

Network Security

  • TCP/IP & OSI Model
  • Traffic Analysis
  • IDS/IPS Concepts
  • Recon Detection

Digital Forensics

  • Evidence Collection
  • Metadata Analysis
  • File Integrity Verification
  • Cryptographic Hashing

Platforms & Tools

  • Splunk · ELK Stack
  • Wireshark · Nmap
  • Burp Suite
  • Linux & Windows Security

Work Experience & Training

Structured training and hands-on defensive operations.

Cybersecurity Trainee

Digital Egypt Pioneers Initiative (DEPI)

  • Completed 270-hour cybersecurity training program
  • Practiced SOC monitoring and alert investigation
  • Performed log analysis and threat detection
  • Learned incident response workflows

Cybersecurity Trainee

Sprints x Microsoft Cybersecurity Summer Camp

  • Completed hands-on cybersecurity training
  • Simulated real-world cyber attack scenarios
  • Practiced defensive security strategies
  • Performed incident investigation exercises

Services

Strategic defensive services for resilient security operations.

🛡️

Security Monitoring

24/7 visibility, alert triage, and rapid escalation support.

🧠

Threat Detection

Pattern analysis, behavioral baselining, and anomaly detection.

🛰️

Network Security

Traffic inspection, reconnaissance detection, and attack path mapping.

🔎

Digital Forensics

Evidence collection, integrity verification, and forensic reporting.

🧩

Vulnerability Review

Attack surface analysis and mitigation prioritization.

Projects

Premium showcases of applied cybersecurity expertise.

TrustEra — Deepfake Detection & Digital Forensics

Flagship

AI-driven forensic platform for detecting synthetic media and preserving evidence integrity.

Deepfake Detection SHA-256 Integrity Forensic Reports

Network Traffic Analysis Lab

Lab

Captured and analyzed network packets to detect suspicious scanning activities.

Wireshark Nmap TCP/IP Analysis

SIEM Log Analysis Lab

Investigation

Investigated suspicious login attempts and security alerts using SIEM tooling.

Splunk ELK Stack Alert Triage

Vulnerability Assessment Project

Assessment

Assessed exposed services and open ports to identify potential vulnerabilities.

Burp Suite Nmap Risk Ranking

Achievements & Certifications

Achievements

  • Completed SOC Level 1 Path on TryHackMe
  • Delivered TrustEra forensic integrity pipeline

Certifications

  • IBM Artificial Intelligence Practitioner — IBM (07/2024 — 09/2024)
  • Ethical Hacker — Cisco Networking Academy (06/2025 — 08/2025)
  • Network Defense — Cisco Networking Academy (08/2025 — 10/2025)
  • Cybersecurity Summer Camp — Sprints × Microsoft (10/2025 — 11/2025)

Testimonials

What instructors and teammates say about working with me.

Demonstrated strong analytical thinking in security monitoring exercises and threat investigation scenarios. Shows a natural instinct for pattern recognition in complex log data.

Worked effectively within cybersecurity teams to analyze alerts and improve detection processes. Nader consistently brings structured thinking and a proactive mindset to collaborative investigations.

The TrustEra project showed exceptional understanding of forensic requirements and evidence integrity. The SHA-256 implementation and metadata pipeline were particularly well-executed.

Contact

Ready to collaborate? Let’s secure what matters most.

Send a Secure Message

Messages are delivered instantly to my inbox. WhatsApp opens a direct chat.