Real-time Network Traffic Anomaly Detection System
Summary
Developed a system capable of identifying anomalies in network traffic in real-time.
Highly motivated Master's in Cybersecurity graduate with robust practical experience in Windows/Linux administration, network management, and information system security. Adept at managing systems, workstations, virtualization, and network protocols, leveraging advanced scripting tools like PowerShell and Bash. Seeking to apply rigorous analytical skills, C1 level bilingualism (French/English), and a passion for emerging technologies to enhance IT infrastructure performance and security within a dynamic international environment.
Network Instructor – Cisco Instructor
Brazzaville, Congo, Congo
→
Summary
Currently serving as a Network Instructor and Cisco Instructor, delivering comprehensive IT education and practical training to students and professionals.
Highlights
Delivered comprehensive networking courses, covering fundamental and advanced concepts to diverse student groups.
Trained over 50 students and professionals for Cisco (CCNA) certifications, significantly improving their career readiness and technical proficiency.
Designed and led practical workshops on network protocols and system administration, enhancing hands-on skills for complex IT environments.
Mentored students on technical projects, providing pedagogical support and guidance to ensure successful project completion and skill development.
System, Network, and Security Intern
Douala, Cameroon, Cameroon
→
Summary
Administered and secured critical IT infrastructures, including Windows and Linux systems, networks, and implemented virtualization solutions.
Highlights
Administered and secured Windows Server (2016/2019/2022) and Linux systems (Ubuntu, Debian), ensuring operational integrity and data protection.
Managed and monitored network infrastructures (TCP/IP, DNS, DHCP, routing), maintaining high availability and optimal performance.
Implemented virtualization solutions and automated administrative tasks, boosting system efficiency and reducing manual effort.
Contributed to IT audits and system security assessments, identifying vulnerabilities and recommending mitigation strategies to enhance security posture.
IT Risk Analysis Intern
Douala, Cameroon, Cameroon
→
Summary
Conducted comprehensive IT risk analysis and vulnerability management, contributing to enhanced information system security and compliance.
Highlights
Conducted IT risk analysis for business processes using the EBIOS methodology, providing actionable insights for risk mitigation.
Identified and mitigated critical information system vulnerabilities, enhancing overall security posture and reducing potential threats.
Participated actively in IT governance and compliance projects, ensuring adherence to regulatory standards and best practices.
Provided technical support and performed preventive maintenance on IT systems, minimizing downtime and ensuring continuous operation.
→
Master
Cybersecurity
→
Bachelor
Mathematics
Awarded By
Université Libre de Bruxelles
Awarded an excellence scholarship for Master's studies in Cybersecurity, recognizing academic achievement and potential.
Issued By
Cisco
Issued By
Cisco
Issued By
EMA School
Issued By
Cisco
Issued By
Issued By
Cympa School
Issued By
Arising Fire Training
MongoDB, Oracle, MySQL, PostgreSQL, Data Protection and Security.
Pack Office, Microsoft Office (Excel, Word, PowerPoint, Outlook), PowerBI.
Windows 10/11, Windows Server (2016/2019/2022), Linux (Debian, Ubuntu), Active Directory, GPO Management, Image Deployment (MDT, WDS, Clonezilla).
VMware ESXi/Workstation, Hyper-V, Microsoft Azure (VM management, storage, virtual networks), Citrix Server (XenApp).
TCP/IP, DNS, DHCP, VPN, Routing (OSPF, BGP), Switch/Router Configuration, Network Monitoring, Firewall, IDS/IPS.
PowerShell (advanced), Bash, Python, Administrative Task Automation.
Secure Administration, Incident Management, Penetration Testing, Cryptography, IT Governance, Compliance (EBIOS), Vulnerability Identification, Vulnerability Mitigation, IT Audits.
Metasploit, Burp Suite, Wireshark, Nmap, Log Analysis.
Complex Technical Problem Solving, Team Spirit, Multicultural Collaboration, Rigor, Autonomy, Responsibility, IT Project Management, Knowledge Transfer, Pedagogy, Rapid Adaptation to New Technologies, International Mobility.
Big Data Engineer, New Zealand | pouya.ataei.7@gmail.com
Professor in Cybersecurity, Université de Bamenda | emmanuelfouotsa@yahoo.fr
Summary
Developed a system capable of identifying anomalies in network traffic in real-time.
Summary
Created a system to identify and classify system vulnerabilities based on their criticality.
Summary
Implemented an anonymous voting system using Zero-Knowledge Proof and group signature technologies.
Summary
Designed a system for authenticating administrative documents using cryptographic signatures and QR codes.