// cybersecurity & digital forensics
Mohammed Ayaz Ansari
I am building practical skills in security operations, malware analysis, system protection, and IT support while preparing for entry-level SOC Analyst and IT Support roles.
profile.log
$ ./get_profile.sh
name: Mohammed Ayaz Ansari
role: Cybersecurity & IT student
focus: SOC monitoring, malware analysis, system security
$ cat links.txt
site: mohammedayazansari.com
email: Ayazans07@gmail.com
$
// about
About Me
I am a cybersecurity and IT student at SUNY Broome Community College with a strong focus on security operations, malware analysis, and system protection.
I enjoy working hands-on with real-world systems, analyzing threats, troubleshooting technical issues, and building secure solutions. My goal is to start my career in IT Support or as a SOC Analyst Tier 1, where I can apply my skills in monitoring, detecting, and responding to security incidents while continuing to grow in cybersecurity.
about.js
const developer = {
name: "Mohammed Ayaz Ansari",
school: "SUNY Broome",
focus: ["SOC", "Malware Analysis", "IT Support"],
tools: ["Wireshark", "Splunk", "Wazuh"],
seeking: "SOC Analyst Tier 1 / IT Support"
};
// skills
Technical Skills
Cybersecurity & Analysis
Tools & Technologies
Programming & Networking
// verified learning
Licenses & Certifications
Google Cybersecurity Professional Certificate
Credential ID: LHWO4EOAW3IQ
Strengthened skills in security operations, threat detection, network security, risk management, incident response, SIEM tools, Linux, and security tools.
Generative AI: Prompt Engineering Basics
Credential ID: 0W7U02Y2UI96
Built a stronger understanding of prompt engineering techniques, AI model interaction, and natural language processing basics.
Discover the Art of Prompting
Credential ID: EOQ3U4BLK16I
Maximize Productivity with AI Tools
Credential ID: ZZ7VR7JMRI84
Introduction to AI
Credential ID: QQQWXVLNEWA4
IT Security: Defense Against the Digital Dark Arts
Credential ID: UZCYGSSQH49L
Certifications Summary
I have completed multiple industry-recognized certifications focused on cybersecurity, AI, and IT support. These certifications strengthened my understanding of real-world security practices, including threat detection, system protection, and secure network management.
I actively apply this knowledge in hands-on projects such as SOC labs, malware analysis, AI phishing detection, and secure web development.
// live lab interface
Threat Intel Board
Analyst Feed
00:00:00// practical training
Cybersecurity Practice Platforms
I practice cybersecurity through TryHackMe and Hack The Box to build realistic, hands-on skills outside the classroom.
These platforms help me work through real-world simulations involving network scanning, enumeration, vulnerability analysis, privilege escalation basics, and documentation. I use them to keep improving my process, not to exaggerate my experience: the goal is steady, practical growth.
Additional Work
I continuously practice through labs, simulations, personal projects, DNS log analysis, malware analysis exercises, digital forensics practice, and small security-focused web projects.
// mini blue-team tool
Threat Triage Sandbox
Local Analysis
READYThis lightweight demo checks for common suspicious words and patterns. It is not a real security product, but it shows the kind of thinking used in first-level triage.
// response mindset
Incident Response Playbook
Identify
Review alerts, logs, affected hosts, user reports, and timeline clues to understand what may be happening.
Analyze
Look for indicators such as suspicious domains, unusual processes, failed logins, abnormal traffic, or file changes.
Contain
Limit impact by isolating affected systems, blocking known bad indicators, and preserving useful evidence.
Document
Write clear notes on findings, actions taken, evidence reviewed, and recommendations for improving defenses.
// timeline
Experience
Present
Computer Security & Forensics Student
Studying cybersecurity and digital forensics at SUNY Broome while building practical labs in networking, malware analysis, and incident investigation.
Hands-on Labs
Cybersecurity Practice
Captured packets, reviewed DNS logs, tested analysis workflows, and documented findings using tools such as Wireshark, Nmap, IDA Free, CyberChef, and Autopsy.
Web Project
A1 Grocery & Halal Meat
Built a responsive online pickup website with a dynamic cart, live subtotal, mobile-first layout, and a simple customer ordering flow.
// featured work
Projects
01
SOC Lab: Security Operations Simulation
Created a home lab to simulate suspicious activity, collect logs, monitor alerts, and document investigations using SIEM tools such as Splunk and Wazuh.
Discuss project02
Malware Analysis Report
Performed static and dynamic analysis using IDA Free, Wireshark, and Procmon to identify suspicious strings, imports, process activity, and network behavior.
Discuss project03
AI Phishing Detection System
Developed a Python, Flask, and scikit-learn web app that reviews email characteristics such as links, urgency, and keywords to estimate phishing risk.
Discuss project04
Secure Grocery E-Commerce Website
Designed the A-1 Grocery & Halal Meat ordering site with product categories, smooth UI, QR-based ordering, input validation, and secure structure.
Visit website05
Mosque IT & Website Support
Provide ongoing technical support, website updates, event AV support, connectivity troubleshooting, and user assistance for a local mosque.
Discuss work06
Cafe Website Management
Developed and maintained a modern cafe website for Milano Bean Cafe with a clean interface, interactive menu, and visual product presentation.
Discuss work07
Network Configuration Project
Designed a small-scale network setup with IP addressing, subnetting, basic VLAN structure, firewall rules, connectivity testing, and security checks.
Discuss project08
Python Vulnerability Scanner
Built a practical Python scanner using the requests library to check URLs for basic issues such as missing security headers and input validation concerns.
Discuss project09
DNS Threat Hunting Simulation
Analyzed DNS logs to identify suspicious patterns such as DGA-style domains, spoofed IPs, unusual queries, and possible encoded data exfiltration.
Discuss project10
SEO Optimization Project
Applied keyword optimization, content structure improvements, and performance updates to improve search visibility and user traffic.
Discuss project// career direction
What I Bring
What I Learned
- How to detect and analyze realistic cyber threats.
- How attackers behave in lab environments.
- How to identify vulnerabilities and strengthen systems.
- How to work with logs, alerts, and investigations.
- How to apply cybersecurity concepts in practical scenarios.
Supporting Evidence
- SOC lab dashboard screenshots.
- Malware analysis report in PDF format.
- GitHub repositories with documented code.
- Live website projects and demos.
- Certification verification links.
Professional Focus
I am focused on building a career in cybersecurity, especially Security Operations and threat analysis. My goal is to help organizations monitor systems, detect suspicious behavior, respond to incidents, and improve system security.
I am also open to IT Support roles where I can troubleshoot systems, assist users, support hardware and software setup, and grow toward a cybersecurity analyst path.
Continuous Learning
I focus on building real, practical skills rather than only theoretical knowledge. My approach is to simulate real-world environments, analyze realistic threats, build secure systems, and keep improving through new tools, hands-on projects, certifications, and current cybersecurity trends.
// interactive console
Ask The Terminal
ayaz-console
$ help
Available commands: about, skills, projects, certs, labs, focus, evidence, contact, clear
// contact
Get In Touch
Open to part-time IT support, cybersecurity, and digital forensics opportunities.
The fastest way to reach me is by email. I am interested in roles where I can help troubleshoot systems, analyze security issues, and keep learning through real technical work.