Mohamed Ergawy

Digital Forensic Investigator & Cybersecurity Professional
Evidence-led Analysis
Incident Response
Threat Hunting
Secure Engineering
SECURITY TERMINAL v2.1
[INFO] Initializing security protocols...
[INFO] Scanning network interfaces...
[SUCCESS] Firewall active on all ports
[INFO] Monitoring 127.0.0.1:22
[WARNING] Unusual activity detected
[INFO] Running vulnerability scan...
[SUCCESS] No critical vulnerabilities found
[INFO] Logging to /var/log/security.log
[INFO] System integrity check passed
[INFO] Encryption protocols active
[SUCCESS] All systems operational
[INFO] Monitoring continues...
[INFO] Scanning network interfaces...
[SUCCESS] Firewall active on all ports
[INFO] Monitoring 127.0.0.1:22
[WARNING] Unusual activity detected
[INFO] Running vulnerability scan...
[SUCCESS] No critical vulnerabilities found
[INFO] Logging to /var/log/security.log
[INFO] System integrity check passed
[INFO] Encryption protocols active
[SUCCESS] All systems operational
[INFO] Monitoring continues...
root@security:~# _
Case 001

Origin Dossier

A story, not a résumé. This portfolio reads like a case file because every system tells a story, and every trace has a truth.

Briefing

I investigate what machines whisper when no one is listening. As a cybersecurity student specializing in digital forensics, I connect artifacts, reconstruct timelines, and turn noise into evidence. My approach blends disciplined methodology with hands-on engineering—because strong forensics is built before incidents ever occur.

I care about three things: integrity of evidence, clarity of analysis, and actionable outcomes. Whether it's a breached web app, a rogue process in memory, or a suspicious login trail, I trace the footprint and harden the path.

Vitals

  • Computer & Data Science, Cybersecurity Track
  • Focus:
    • Network & Web Security
    • Digital Forensics & Incident Response
    • Secure App Dev
  • Languages: Arabic (Native), English (Fluent)
Case 002

Forensic Toolkit

Operational capabilities staged as an evidence locker—open each drawer to see what's inside.

Technical Skills

Programming Languages

Python
C
C++
PHP
JavaScript
SQL

Operating Systems

Windows
Linux

Cybersecurity & Security

Network Security
Web Security
Ethical Hacking
Access Control
Encryption
Logging & Audit
Vulnerability Assessment

Tools

OpenVAS
Nmap
Hashcat
Autopsy
Wireshark
OWASP ZAP
Case 003

Interactive Case Files

Each project is packaged as a classified report. Expand a file to inspect scope, methods, and outcomes.

DF-2025-01 Secure Health — Medical Web App with Ethical Hacking
Scope: Multi-role app (Admin, Doctor, Patient) with RBAC enforced at database level.
Methods: Hardened API endpoints, encryption at rest/in-transit, XSS protections, 2FA via Google Authenticator.
Testing: Simulated attacks (SQLi, XSS, Nmap scans, brute-force) and applied mitigations.
Outcome: Reduced attack surface and improved auditability with structured logs.
DF-2025-02 Log Data Analyzer Python_based SIEM Simulator
Scope: Traffic analysis, error detection, and user activity monitoring across logs.
Methods: Temporal pattern discovery, anomaly clustering, actionable recommendations.
Outcome: Faster triage and clearer narratives for incident timelines.
DF-2025-03 Secure File Storage System — Encryption + Digital Signatures
Scope: Encrypted storage with KMS, integrity via HMAC-SHA256, CRC32, RSA-2048 signing.
Methods: Robust authentication, RBAC, audit logging, web vuln mitigations.
Outcome: Integrity preserved and access controlled with verifiable provenance.
Case 004

Clearance Badges

Academic and industry certifications presented as access credentials.

Education

Alexandria National University — Cybersecurity (CGPA 3.6)

Certificates

Digital Forensics — DEPI
CCNA — Introduction to Networks CCNA — Switching, Routing, and Wireless Essentials CCNA — Enterprise Networking, Security, and Automation
AWS — Cloud Foundations AWS — Cloud Security
Case 005

Secure Channel

Reach out via the terminal. Your message becomes the next chapter in the investigation.

$ whoami
> Mohamed Ergawy — Digital Forensic Investigator
$ cat contacts.txt
> Email   : mo.ahmed3704@gmail.com
> LinkedIn: linkedin.com/in/mohamed-ramadan-918088278/
> GitHub  : github.com/Mo3704
> Credly  : credly.com/users/mohamed-ramadan.0f9e4503/badges
> Phone   : +201210052940
$ _