Copied!

Mohamed Alkhamisy

CyberSecurity Specialist

Certified Ethical Hacker • Digital Forensics Engineer • GRC Operations

View my CV

About Me

Hello! I'm Mohamed.

My friends and colleagues call me Kudo. I am a Cybersecurity Engineer based in Cairo, Egypt, dedicated to building secure foundations for modern businesses.

My work sits at the intersection of offensive security, digital forensics, and strategic governance. As a Certified Ethical Hacker, I have a deep understanding of the threat landscape, and I am driven to leverage this knowledge to secure organizations from every angle.

I'm not just about the code, though. My background in business and web development means I understand the full lifecycle of the projects I'm securing. I've led multiple teams, and I pride myself on being a versatile teammate who knows how to read the room: I match that energy to get the job done.

Whether I am conducting penetration tests, analyzing forensic data, or advising on GRC frameworks, my goal remains the same: to deliver practical, robust security solutions that protect data and enable business growth.

Mohamed Alkhamisy

Services

🔒

Penetration Testing

Comprehensive security testing to identify vulnerabilities before attackers do.

🔎

Incident Forensics

Specialized post-breach analysis and evidence recovery to identify threat actor patterns and secure critical assets.

📊

Security Auditing

In-depth security assessments and compliance audits for regulatory requirements.

🎓

Security Training

Custom security awareness training and technical workshops for development teams.

Technical Expertise

Skills

Offensive Security

  • Penetration Testing
  • Vulnerability Assessment
  • Network Enumeration

Digital Forensics

  • Evidence Acquisition
  • Incident Response
  • Log Analysis (SIEM)

GRC Operations

  • Risk Management
  • Regulatory Compliance
  • Policy Development

Programming & Scripting

  • C, C++, Assembly
  • Python, bash
  • PHP, MySQL, JavaScript

Tools & Frameworks

🛠️

Penetration Testing Tools

Nmap
Burp Suite
Metasploit
Kali Linux
Acunetix
Nessus
🔬

Digital Forensics Tools

Autopsy
FTK Imager
Wireshark
Volatility
Splunk
📋

GRC Frameworks

ISO 27001
NIST
GDPR
PCI DSS
HIPAA

Experience

Specialized Training

Dec – Present 2025

Digital Forensics Training

DEPI - Global Knowledge

Studied the comprehensive CHFI curriculum with a heavy focus on practical execution. Completed Intensive hands-on labs to simulate real-world forensic scenarios, mastering Industry-Standard Toolkit for evidence recovery and incident response.

View Certificate
Jul - Aug 2025

GRC Bootcamp

WE Innovate - ZeroSploit

Completed an intensive 120-hour deep dive into the full GRC landscape. The program focused heavily on real-world scenarios, through comprehensive scenario-based tasks, simulating real-world governance, risk, and compliance challenges.

View Certificate
Jan - Jun 2024

Web Developer Internship

Eye Advertising

Developed and maintained multiple web applications alongside expert teams, with a specific focus on implementing security controls and optimizing performance.

View Certificate

Projects

Crypto

Ransomware PoC

Encryption / Decryption hidden software that works in Windows and Linux using XOR algorithm

C++ Assembly
View on Github

Keylogger

Server-Client Keylogger

Hidden Server-Client Keylogger that logs and saves pressed keys into a file then send the data to the server

Certificates

CEH Logo

Certified Ethical Hacker

EC-Council

Verify
CC Logo

Certified In Cybersecurity

ISC2

Verify
CFB Logo

Cybersecurity for beginners

MaharaTech - ITI

Verify