Certified Ethical Hacker • Digital Forensics Engineer • GRC Operations
View my CVHello! I'm Mohamed.
My friends and colleagues call me Kudo. I am a Cybersecurity Engineer based in Cairo, Egypt, dedicated to building secure foundations for modern businesses.
My work sits at the intersection of offensive security, digital forensics, and strategic governance. As a Certified Ethical Hacker, I have a deep understanding of the threat landscape, and I am driven to leverage this knowledge to secure organizations from every angle.
I'm not just about the code, though. My background in business and web development means I understand the full lifecycle of the projects I'm securing. I've led multiple teams, and I pride myself on being a versatile teammate who knows how to read the room: I match that energy to get the job done.
Whether I am conducting penetration tests, analyzing forensic data, or advising on GRC frameworks, my goal remains the same: to deliver practical, robust security solutions that protect data and enable business growth.
Comprehensive security testing to identify vulnerabilities before attackers do.
Specialized post-breach analysis and evidence recovery to identify threat actor patterns and secure critical assets.
In-depth security assessments and compliance audits for regulatory requirements.
Custom security awareness training and technical workshops for development teams.
Studied the comprehensive CHFI curriculum with a heavy focus on practical execution. Completed Intensive hands-on labs to simulate real-world forensic scenarios, mastering Industry-Standard Toolkit for evidence recovery and incident response.
View CertificateCompleted an intensive 120-hour deep dive into the full GRC landscape. The program focused heavily on real-world scenarios, through comprehensive scenario-based tasks, simulating real-world governance, risk, and compliance challenges.
View CertificateDeveloped and maintained multiple web applications alongside expert teams, with a specific focus on implementing security controls and optimizing performance.
View CertificateEncryption / Decryption hidden software that works in Windows and Linux using XOR algorithm
Hidden Server-Client Keylogger that logs and saves pressed keys into a file then send the data to the server