Skip to content
View Dynamo2k1's full-sized avatar
🫥
Overthinking
🫥
Overthinking

Block or report Dynamo2k1

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Dynamo2k1/README.md

I'm Rana Uzair Ahmad

🚀 Security Engineer | Cyber Security Specialist | AI Integrator

Typing SVG


👨‍💻 About Me

I am a Security Engineer at Zerox Innovation with a strong academic foundation in Cyber Security from Air University. I specialize in the convergence of offensive & defensive security, digital forensics, and artificial intelligence. My work focuses on building resilient systems, conducting in-depth security analysis, and developing next-generation tools that leverage the power of AI for security applications.

  • 🧪 Digital Forensics: Expertise in developing automated evidence acquisition systems like FEAS and integrating LLMs with forensic tools (e.g., Autopsy, Ollama) for enhanced analysis.
  • 🛡️ SOC & SIEM: Proven experience in deploying, configuring, and managing enterprise-grade SOC environments using Wazuh, Suricata, and the ELK Stack for threat detection and incident response.
  • 🧠 Advanced Computing: Skilled in utilizing parallel computing techniques (MPI, CUDA) for high-performance security tasks such as distributed password cracking.
  • 🚩 CTF Competitor: Active participant in cybersecurity capture-the-flag competitions.

🛠️ Core Expertise

🔴 Offensive Security

Web Pentesting API Security Network Pentesting Mobile Pentesting Recon VAPT Exploitation Post Exploitation

Capabilities:

  • Web, API & Mobile application penetration testing
  • Manual & automated vulnerability assessment
  • Authentication & authorization bypass testing
  • Network exploitation & lateral movement
  • Red Team–style attack simulation & reporting

🔵 Defensive Security

SIEM SOC Suricata pfSense ELK Incident Response Threat Hunting

Capabilities:

  • SIEM deployment, tuning & log correlation (Wazuh)
  • Network traffic inspection & IDS/IPS rule tuning (Suricata)
  • Firewall policy design & segmentation (pfSense)
  • SOC workflows, alert triage & escalation
  • Incident response & threat hunting operations

📊 Skill Statistics

🧪 Security Domains

Web Pentesting API Security Network Pentesting Mobile Pentesting Security Vulnerability Research Recon


💻 Programming & Scripting

Python Bash JavaScript Node.js React C C++ SQL Docker


⚙️ Programming & Scripting


🌟 Featured Projects

Project Description Tech Stack
CortexCLI An intelligent Linux shell that integrates Large Language Models to revolutionize command-line interactions and workflow automation. Python, Bash, AI/LLM
FEAS (Forensic Evidence Acquisition System) A specialized system designed for the automated and secure preservation of digital forensic evidence. Python, Digital Forensics
Enterprise SOC Lab A comprehensive Security Operations Center environment built for real-time threat monitoring and incident response. Wazuh, Suricata, ELK, Networking
ParallelFlow A distributed system utilizing cluster computing for high-performance pcap analysis. MPI, C++

🤝 Connect with Me

"Debugging is like being the detective in a crime movie where you are also the murderer." 🕵️‍♂️

Popular repositories Loading

  1. CyberGuard_agent CyberGuard_agent Public

    C 5

  2. Customizeable-Search-Engine Customizeable-Search-Engine Public

    HTML 5 2

  3. Remote-Control-Management-System Remote-Control-Management-System Public

    JavaScript 5

  4. CortexCLI CortexCLI Public

    C 5 2

  5. Key_logger Key_logger Public

    C++ 4

  6. System-Auditor System-Auditor Public

    C 4