Languages
- Arabic: Native
- English: Professional Working Proficiency (C1)

Computer Science student and SOC/IR analyst with 10+ trainings and 200+ simulated alerts. Strong in SIEM/EDR investigations, alert triage, IOC analysis, and incident response.
Best next step: share your goal and receive a tailored response within 24 hours.
SOC and Incident Response analyst with hands-on experience from 10+ trainings and 200+ simulated alerts. Focused on SIEM/EDR investigations, alert triage, IOC analysis, and faster incident handling.
8k+
LinkedIn Followers
200+
Simulated SOC Alerts Investigated
35+
Cybersecurity Sessions Delivered
120+
Learners Trained in Security Topics
10+
SOC / DFIR Trainings & Bootcamps
15+
Validated Vulnerabilities in Labs
4.9/5
Average Training Feedback Score
Top 5/360
National University CTF Ranking
Top 10%
Class Rank (InfoSec & DFIR)
3.7/4.0
Computer Science GPA
95%
eJPT v2 Score
98%
CCNA 200-301 Score
“Ahmed helped us reduce noisy detections and made our SOC triage flow much clearer.”
Blue Team Lead • SOC Alert Tuning Sprint
“Sessions were practical and structured. Our team improved lab outcomes in a short time.”
Training Coordinator • Security Training Program
“Strong investigation mindset with clear reporting and actionable recommendations.”
Incident Response Mentor • DFIR Mentorship
GitHub-backed work, grouped by security focus so the right examples are easier to scan.
Real work snapshots with practical outcomes across SOC, DFIR, and training.
Problem: Alert overload made daily triage noisy and delayed response to high-priority events.
Action: Mapped noisy detections, tuned correlation logic, and introduced severity-first triage flow.
Result: Reduced false positives by 25% in lab SOC operations and improved investigation focus.
Problem: Detection coverage had blind spots for stealthy behaviors not captured by baseline rules.
Action: Built hypothesis-driven hunt queries and validated signatures against expected telemetry.
Result: Increased practical detection coverage and improved analyst confidence in hunt outcomes.
Problem: Malware investigations took too long due to inconsistent IOC extraction and reporting.
Action: Created a controlled analysis flow with IOC packaging and behavior mapping templates.
Result: Cut investigation time by 20% and improved containment readiness for follow-up actions.
Problem: Teams needed practical security skills beyond theoretical knowledge.
Action: Delivered 35+ structured sessions with guided labs and measurable skill checkpoints.
Result: Reached 120+ learners, average feedback 4.9/5, and improved lab performance by 40%.
Uploaded case files from LetsDefend and simulation assignments.
13 items shown
Clear answers for scope, delivery, and collaboration before we start.
Most scopes can start within 24-48 hours after confirming access, goals, and communication flow.
Yes. I can tune and optimize existing Wazuh, ELK, and Splunk setups without requiring a full rebuild.
Yes. Delivery is remote-first with structured updates, clear milestones, and documented outcomes.
Each service has a starting price, and final scope is based on complexity, timeline, and expected deliverables.
You receive a concise report, prioritized action items, and practical technical outputs that your team can use immediately.
Yes. Follow-up guidance is available to help with implementation, tuning, and clarification.
Clear service paths, measurable outcomes, and direct next steps.
ahmed.em.nasr@gmail.com
+20 101 816 6445
Cairo, Egypt