Mohamed Ergawy
Origin Dossier
A story, not a résumé. This portfolio reads like a case file because every system tells a story, and every trace has a truth.
Briefing
I investigate what machines whisper when no one is listening. As a cybersecurity student specializing in digital forensics, I connect artifacts, reconstruct timelines, and turn noise into evidence. My approach blends disciplined methodology with hands-on engineering—because strong forensics is built before incidents ever occur.
I care about three things: integrity of evidence, clarity of analysis, and actionable outcomes. Whether it's a breached web app, a rogue process in memory, or a suspicious login trail, I trace the footprint and harden the path.
Vitals
- Computer & Data Science, Cybersecurity Track
- Focus:- Network & Web Security
- Digital Forensics & Incident Response
- Secure App Dev
 
- Languages: Arabic (Native), English (Fluent)
Forensic Toolkit
Operational capabilities staged as an evidence locker—open each drawer to see what's inside.
Technical Skills
Programming Languages
Operating Systems
Cybersecurity & Security
Tools
Interactive Case Files
Each project is packaged as a classified report. Expand a file to inspect scope, methods, and outcomes.
DF-2025-01 Secure Health — Medical Web App with Ethical Hacking
Methods: Hardened API endpoints, encryption at rest/in-transit, XSS protections, 2FA via Google Authenticator.
Testing: Simulated attacks (SQLi, XSS, Nmap scans, brute-force) and applied mitigations.
Outcome: Reduced attack surface and improved auditability with structured logs.
DF-2025-02 Log Data Analyzer Python_based SIEM Simulator
Methods: Temporal pattern discovery, anomaly clustering, actionable recommendations.
Outcome: Faster triage and clearer narratives for incident timelines.
DF-2025-03 Secure File Storage System — Encryption + Digital Signatures
Methods: Robust authentication, RBAC, audit logging, web vuln mitigations.
Outcome: Integrity preserved and access controlled with verifiable provenance.
Clearance Badges
Academic and industry certifications presented as access credentials.
Education
Certificates
Secure Channel
Reach out via the terminal. Your message becomes the next chapter in the investigation.
$ whoami > Mohamed Ergawy — Digital Forensic Investigator $ cat contacts.txt > Email : mo.ahmed3704@gmail.com > LinkedIn: linkedin.com/in/mohamed-ramadan-918088278/ > GitHub : github.com/Mo3704 > Credly : credly.com/users/mohamed-ramadan.0f9e4503/badges > Phone : +201210052940 $ _