__   __  _______  __   __  ______
|  | |  ||       ||  | |  ||    _ |
|  |_|  ||   _   ||  | |  ||   | ||
|       ||  | |  ||  |_|  ||   |_||_
|_     _||  |_|  ||       ||    __  |
  |   |  |       ||       ||   |  | |
  |___|  |_______||_______||___|  |_|
      

[init] mounting cybersecurity portfolio

[scan] loading forensic toolchain

[link] syncing project evidence

[done] analyst profile ready

// cybersecurity & digital forensics

Mohammed Ayaz Ansari

I am building practical skills in security operations, malware analysis, system protection, and IT support while preparing for entry-level SOC Analyst and IT Support roles.

Status Open to opportunities
Target Roles IT Support / SOC Tier 1
Location Binghamton, NY

profile.log

$ ./get_profile.sh

name: Mohammed Ayaz Ansari

role: Cybersecurity & IT student

focus: SOC monitoring, malware analysis, system security

$ cat links.txt

site: mohammedayazansari.com

email: Ayazans07@gmail.com

$

// about

About Me

I am a cybersecurity and IT student at SUNY Broome Community College with a strong focus on security operations, malware analysis, and system protection.

I enjoy working hands-on with real-world systems, analyzing threats, troubleshooting technical issues, and building secure solutions. My goal is to start my career in IT Support or as a SOC Analyst Tier 1, where I can apply my skills in monitoring, detecting, and responding to security incidents while continuing to grow in cybersecurity.

about.js

const developer = {
  name: "Mohammed Ayaz Ansari",
  school: "SUNY Broome",
  focus: ["SOC", "Malware Analysis", "IT Support"],
  tools: ["Wireshark", "Splunk", "Wazuh"],
  seeking: "SOC Analyst Tier 1 / IT Support"
};
8Portfolio projects
6Licenses & certifications
SOCEntry-level career focus

// skills

Technical Skills

Cybersecurity & Analysis

Threat detection & log analysis
Malware analysis basics
Incident response basics

Tools & Technologies

Wireshark / IDA Free / Procmon
Splunk / Wazuh
Flask / scikit-learn

Programming & Networking

Python / web development
TCP/IP / VLAN basics
IT support & troubleshooting
Cybersecurity fundamentals & security operations
Threat detection, analysis & response
Network security & traffic analysis
SIEM monitoring & log investigation
AI & machine learning applications in security
Secure web development and SEO basics

// verified learning

Licenses & Certifications

Google - April 2026

Google Cybersecurity Professional Certificate

Credential ID: LHWO4EOAW3IQ

Strengthened skills in security operations, threat detection, network security, risk management, incident response, SIEM tools, Linux, and security tools.

IBM - November 2025

Generative AI: Prompt Engineering Basics

Credential ID: 0W7U02Y2UI96

Built a stronger understanding of prompt engineering techniques, AI model interaction, and natural language processing basics.

Google - April 2026

Discover the Art of Prompting

Credential ID: EOQ3U4BLK16I

Google - April 2026

Maximize Productivity with AI Tools

Credential ID: ZZ7VR7JMRI84

Google - December 2025

Introduction to AI

Credential ID: QQQWXVLNEWA4

Google - December 2024

IT Security: Defense Against the Digital Dark Arts

Credential ID: UZCYGSSQH49L

Certifications Summary

I have completed multiple industry-recognized certifications focused on cybersecurity, AI, and IT support. These certifications strengthened my understanding of real-world security practices, including threat detection, system protection, and secure network management.

I actively apply this knowledge in hands-on projects such as SOC labs, malware analysis, AI phishing detection, and secure web development.

// live lab interface

Threat Intel Board

Packet monitor simulated traffic visibility

Analyst Feed

00:00:00
Focus Blue team fundamentals
Lab stack Wireshark / Nmap / VirtualBox
Goal Part-time IT or cybersecurity role

// practical training

Cybersecurity Practice Platforms

I practice cybersecurity through TryHackMe and Hack The Box to build realistic, hands-on skills outside the classroom.

These platforms help me work through real-world simulations involving network scanning, enumeration, vulnerability analysis, privilege escalation basics, and documentation. I use them to keep improving my process, not to exaggerate my experience: the goal is steady, practical growth.

Additional Work

I continuously practice through labs, simulations, personal projects, DNS log analysis, malware analysis exercises, digital forensics practice, and small security-focused web projects.

TryHackMe Hack The Box Threat hunting Digital forensics Secure web apps

// mini blue-team tool

Threat Triage Sandbox

Local Analysis

READY

This lightweight demo checks for common suspicious words and patterns. It is not a real security product, but it shows the kind of thinking used in first-level triage.

    // response mindset

    Incident Response Playbook

    01

    Identify

    Review alerts, logs, affected hosts, user reports, and timeline clues to understand what may be happening.

    02

    Analyze

    Look for indicators such as suspicious domains, unusual processes, failed logins, abnormal traffic, or file changes.

    03

    Contain

    Limit impact by isolating affected systems, blocking known bad indicators, and preserving useful evidence.

    04

    Document

    Write clear notes on findings, actions taken, evidence reviewed, and recommendations for improving defenses.

    // timeline

    Experience

    Present

    Computer Security & Forensics Student

    Studying cybersecurity and digital forensics at SUNY Broome while building practical labs in networking, malware analysis, and incident investigation.

    Hands-on Labs

    Cybersecurity Practice

    Captured packets, reviewed DNS logs, tested analysis workflows, and documented findings using tools such as Wireshark, Nmap, IDA Free, CyberChef, and Autopsy.

    Web Project

    A1 Grocery & Halal Meat

    Built a responsive online pickup website with a dynamic cart, live subtotal, mobile-first layout, and a simple customer ordering flow.

    // featured work

    Projects

    01

    SOC Lab: Security Operations Simulation

    Created a home lab to simulate suspicious activity, collect logs, monitor alerts, and document investigations using SIEM tools such as Splunk and Wazuh.

    Discuss project

    02

    Malware Analysis Report

    Performed static and dynamic analysis using IDA Free, Wireshark, and Procmon to identify suspicious strings, imports, process activity, and network behavior.

    Discuss project

    03

    AI Phishing Detection System

    Developed a Python, Flask, and scikit-learn web app that reviews email characteristics such as links, urgency, and keywords to estimate phishing risk.

    Discuss project

    04

    Secure Grocery E-Commerce Website

    Designed the A-1 Grocery & Halal Meat ordering site with product categories, smooth UI, QR-based ordering, input validation, and secure structure.

    Visit website

    05

    Mosque IT & Website Support

    Provide ongoing technical support, website updates, event AV support, connectivity troubleshooting, and user assistance for a local mosque.

    Discuss work

    06

    Cafe Website Management

    Developed and maintained a modern cafe website for Milano Bean Cafe with a clean interface, interactive menu, and visual product presentation.

    Discuss work

    07

    Network Configuration Project

    Designed a small-scale network setup with IP addressing, subnetting, basic VLAN structure, firewall rules, connectivity testing, and security checks.

    Discuss project

    08

    Python Vulnerability Scanner

    Built a practical Python scanner using the requests library to check URLs for basic issues such as missing security headers and input validation concerns.

    Discuss project

    09

    DNS Threat Hunting Simulation

    Analyzed DNS logs to identify suspicious patterns such as DGA-style domains, spoofed IPs, unusual queries, and possible encoded data exfiltration.

    Discuss project

    10

    SEO Optimization Project

    Applied keyword optimization, content structure improvements, and performance updates to improve search visibility and user traffic.

    Discuss project

    // career direction

    What I Bring

    What I Learned

    • How to detect and analyze realistic cyber threats.
    • How attackers behave in lab environments.
    • How to identify vulnerabilities and strengthen systems.
    • How to work with logs, alerts, and investigations.
    • How to apply cybersecurity concepts in practical scenarios.

    Supporting Evidence

    • SOC lab dashboard screenshots.
    • Malware analysis report in PDF format.
    • GitHub repositories with documented code.
    • Live website projects and demos.
    • Certification verification links.

    Professional Focus

    I am focused on building a career in cybersecurity, especially Security Operations and threat analysis. My goal is to help organizations monitor systems, detect suspicious behavior, respond to incidents, and improve system security.

    I am also open to IT Support roles where I can troubleshoot systems, assist users, support hardware and software setup, and grow toward a cybersecurity analyst path.

    Continuous Learning

    I focus on building real, practical skills rather than only theoretical knowledge. My approach is to simulate real-world environments, analyze realistic threats, build secure systems, and keep improving through new tools, hands-on projects, certifications, and current cybersecurity trends.

    // interactive console

    Ask The Terminal

    ayaz-console

    $ help

    Available commands: about, skills, projects, certs, labs, focus, evidence, contact, clear

    $

    // contact

    Get In Touch

    Open to part-time IT support, cybersecurity, and digital forensics opportunities.

    The fastest way to reach me is by email. I am interested in roles where I can help troubleshoot systems, analyze security issues, and keep learning through real technical work.

    ^