Summary
Overview
Work History
Education
Skills
Certification
Projects
Hobbies
Additional Information
Languages
Accomplishments
Software
Timeline
Generic

Mohammed Aiman Ahmed Khan

Khobar,04

Summary

Dynamic cybersecurity professional with experience at Cyberlific Solutions, skilled in incident response management and ethical hacking techniques. Successfully optimized security tools and developed robust policies, enhancing threat detection and minimizing system downtime. Proven ability to collaborate effectively with teams, ensuring compliance and strengthening overall security posture.

Overview

1
1
year of professional experience
1
1
Certification

Work History

Associate Cyber Security Engineer

Cyberlific Solutions
07.2024 - Current
  • Optimized existing security tools by configuring custom rulesets tailored to the organization''s specific needs, enhancing threat detection capabilities.
  • Developed comprehensive security policies and procedures for the organization, resulting in improved protection against potential threats.
  • Managed incident response activities during critical security events, effectively containing threats and minimizing damage to systems and data.
  • Contributed to business continuity planning efforts by assessing potential risks to critical systems and implementing backup strategies that ensured minimal downtime during disaster recovery scenarios.

Cybersecurity Intern

Cyberlific Solutions
01.2024 - 06.2024
  • Collaborated with IT teams to integrate security measures into software development processes, enhancing overall application security.
  • Reviewed logs regularly to detect suspicious activity patterns before they escalate into full-blown incidents, enabling rapid response efforts when necessary.
  • Conducted regular penetration testing to identify vulnerabilities and address them proactively, strengthening system defenses.
  • Optimized existing security tools by configuring custom rule sets tailored to the organization''s specific needs, enhancing threat detection capabilities.
  • Enhanced network security by implementing advanced threat detection systems and conducting regular vulnerability assessments.
  • Evaluated new cybersecurity tools and technologies, ensuring that the organization remained up-to-date on industry best practices.


Education

Bachelor of Technology - Cyber Security

SRM Institute of Science And Technology
India, Chennai
11-2024

Skills

  • Identity and Access management
  • Incident response management
  • Ethical hacking techniques
  • Application security
  • Network security expertise
  • Cryptography implementation
  • Digital forensics investigation
  • Malware analysis and reverse engineering
  • Intrusion, response and detection
  • Cloud security
  • Vulnerability assessment and Penetration testing
  • Security compliance auditing

Certification

  • [TryHackMe - Cyber Defense] Training - [Issued on December 2023]
  • [TryHackMe - Offensive Pentesting] Training - [Issues on December 2023]
  • [TryHackMe - Jr Penetration Tester] Training - [Issues on September 2023]
  • [Cyber Heals - Cyber Security Master Program] Training - [Issues on December 2023]
  • [Coursera - Fundamentals of Red Hat Enterprise Linux] Training - [Issues on April 2023]
  • [Oracle Database Foundations] Training - [Issued on March 2023]
  • [AWS Academy Graduate - AWS Academy Cloud Security Foundations] Training - [Issued on November 2022]
  • [Cyberlific Solutions - Cybersecurity Industry Immersion Bootcamp] Training - [Issued on January 2024]
  • [Fortinet - NSE 3 Network Security Associate] Training - [Issued on July 2023]

Projects

Projects:


Preventing Ransomware using sql via Honeypots & AI
Designed a cloud-hosted dual-database environment using honeypots to trap ransomware attackers, simulate SQL injection, and analyze behavior with AI heuristics.


DISW – Cloud Connector Design (PoC Using PFsense Reverse Proxy)
Implemented a secure, proxy-based architecture using PFsense to manage message flow between clients and back-end services; built a Flask GUI for real-time monitoring.

Hobbies

Cybersecurity & Ethical Hacking
Actively engage in cybersecurity challenges and hands-on labs via platforms like TryHackMe, Hack The Box, and OverTheWire. Regularly practice penetration testing techniques, analyze vulnerabilities, and explore offensive and defensive security tactics. Passionate about threat modeling, exploit development, and digital forensics. 


Capture The Flag (CTF) Competitions
Enjoy participating in CTFs to test problem-solving under pressure. Develop skills in reverse engineering, cryptography, privilege escalation, and web application attacks in real-world simulated environments. 


Sports & Fitness
Active participant in sports including football and basketball with experience in team-based tournaments. Sports have taught me discipline, focus, and leadership — qualities I apply to both technical problem-solving and collaborative environments. 


Tech Exploration & Continuous Learning
Passionate about staying up to date with cybersecurity trends, new tools, and threat intelligence. Enjoy reading cybersecurity blogs, watching ethical hacking tutorials, and participating in online communities to learn from others.

Additional Information

  • Committed to continuous learning through hands-on platforms such as TryHackMe, Hack The Box, and CyberHeals, focusing on real-world cybersecurity scenarios.
  • Actively expanding knowledge in ethical hacking, red team tactics, and defensive security strategies, supported by structured learning paths and practical labs.
  • Strong interpersonal and communication skills developed through team-based sports and collaborative technical projects.
  • Open to relocation and flexible working hours for internship or entry-level cybersecurity opportunities.
  • Willing to pursue industry-recognized certifications such as CompTIA Security+, CEH (Certified Ethical Hacker), or Offensive Security Certified Professional (OSCP) to enhance professional capabilities and meet organizational needs.

Languages

English
Upper intermediate (B2)

Accomplishments

  • Used Microsoft Excel to develop inventory tracking spreadsheets.
  • Resolved product issue through consumer testing.

Software

Burp Suite – Web vulnerability scanning and interception

Metasploit Framework – Exploit development and post-exploitation

Wireshark – Packet analysis and network traffic inspection

Nmap – Network scanning and port discovery

Netcat – Manual data transfer and port listening for diagnostics

Python – Automation, scripting, web app development (Flask)

HTML / CSS / JavaScript – Front-end interface for Flask applications

Timeline

Associate Cyber Security Engineer

Cyberlific Solutions
07.2024 - Current

Cybersecurity Intern

Cyberlific Solutions
01.2024 - 06.2024

Bachelor of Technology - Cyber Security

SRM Institute of Science And Technology
Mohammed Aiman Ahmed Khan