Mohamed Kamel Bouzekria, Senior Security Engineer- Lead Penetration Tester

Mohamed Kamel Bouzekria

Senior Security Engineer- Lead Penetration Tester

SII

Location
France - Alfortville
Education
Diploma, Computer Security | Reverse Engineering
Experience
7 years, 8 Months

Share My Profile

Block User


Work Experience

Total years of experience :7 years, 8 Months

Senior Security Engineer- Lead Penetration Tester at SII
  • France - Paris
  • My current job since May 2023

• Perform manual and automated Web Application Penetration Testing (DAST), Network Penetration Testing.
• Adhere to the security standards and all policies and procedures identified for the project specified by the organization.
• Conduct comprehensive security testing of mobile applications, develop testing methodologies, and provide actionable recommendations for
vulnerability remediation.
• Prepare and present detailed, written technical information for internal and external audiences.
• Summarize and document results of testing for management reporting including proper disposition of test exceptions

Cyber Security Specialist - Lead Penetration Tester at Realistic Security
  • Algeria - Algiers
  • April 2020 to April 2023

• Conducting targeted penetration testing of exercise and test events with the application of targeted sophisticated attacks as a simulated adversary
• Participating in event planning stages to develop cyber assessment plans and conducting no-notice penetration tests
• Creating Red Team support materials (e.g. Probabilistic Attack Graphs, Cyber Exercise Playbooks etc.)
• Assisting with the on-boarding of new members of the Red Team through work shadowing and knowledge transfer sessions
• Supporting the identification of controls to remediate and/or mitigate identified security weaknesses of systems, applications, processes, and procedures.
• Assists the audit engagement product owner in determining audit program customization requirements and respective program steps.
• Conduct dynamic application security testing using both manual and automated testing tools
• Deliver a complex range of application, code review, mobile and infrastructure related security assessments.
• Summarize and document results of testing for management reporting including proper disposition of test exceptions

Project Manager- Cyber Security at G22 REI
  • Algeria - Algiers
  • September 2019 to September 2020

• Provide leadership, guidance, and mentoring to less experienced software engineers
• Write, review, and revise product requirements and specifications
• Lead architecture discussions and help drive technical decisions
• Review and influence existing practices and behavior of software engineering teams
• Conduct regular security reviews of both software and processes. Review and create threat models.
• Conduct security code reviews and educate the engineering teams on best practices for writing secure code.
• Implement Secure Software Development Lifecycle (SSDLC) practices

Software Security Engineer at RedFabriQ
  • France - Paris
  • September 2019 to February 2020

• Develop system requirements and system architecture for new functionality to support updating a connected vehicle
• Develop methodologies to automate the testing from cloud to vehicle.
• Developed reports and presentations for both technical and executive audiences
• Technically lead and collaborate with team colleagues locally and remotely, e.g. design new functions and perform code reviews.

Cyber Security Engineer at CEVITAL SPA
  • Algeria - Algiers
  • January 2019 to August 2019

• Identify software security design and architectural risks, and develop mitigation plans
• Identify, evaluate, and help implement technical security controls to continuously improve the organization’s security posture.
• Perform security assessments on native, managed, and interpreted software using static and dynamic analysis techniques
• Mentor software engineers on how to abate security vulnerabilities and threats in applications
• Participate in company level security compliance efforts.

Software Engineer at SIRUS NET - VEHIZEN
  • France - Montpellier
  • June 2016 to December 2017

• Develop software solutions following established development standards.
• Develop software that integrates with other systems.
• Unit test each software component to ensure business requirements are fulfilled.

MALWARE RESEARCHER INTERN at LRI Lab, University of Science and Technology Houari Boumediene
  • Algeria - Algiers
  • September 2015 to July 2016

• Analyze suspicious files (executables, scripts, office documents)
• Analyze malware statically and dynamically
• Contribute to the development and maintenance of malware classification automation, analysis platforms and tools.

Education

Diploma, Computer Security | Reverse Engineering
  • at Pentester Academy | SecurityTube
  • January 2019

- Course Introduction and Debugging Basics. - What's Up With The Symbol Files? - Analyzing Symbols With Nm. - System Call Tracing With Strace. - Breakpoints, Examining Registers And Memory. - Modifying Registers And Memory. - GDB Convenience Variables And Calling Routines - Cracking A Simple Binary With Debug Symbols. - Disassembling And Cracking A Simple Binary. - Conditional Breakpoints Using Variables And Registers. - Setting Up Debian Armel In Qemu. - Cracking Programs On Arm Architectures. - iPhone Application Reversing And Cracking With GDB. - GDB On 64 Bit Systems.

Diploma, Network Pentesting Training
  • at Pentester Academy | Security Tube
  • December 2018

The SecurityTube | Pentester Academy is a set of online courses and certifications for Computer Security and Penetration Testing. These courses are ideal for penetration testers, security enthusiasts. The courses leading to the certification exams are entirely practical and hands-on in nature. The final certification exam is fully practical as well and tests the student’s ability to think out of the box and is based on the application of knowledge in practical real-life scenarios. Pentesting Routers Attacking SSH with Metasploit, Nmap, Medusa, Hydra, Ncrack SNMP attacks Bypassing Firewalls Payloads and Shells HTTP/HTTPS tunneling Port Forwaring, Pivoting, Reverse Connects Privilege Escalation and UAC bypass Hash Dumping and Mimikatz Windows Sessions, Stations and Desktops Impersonation attacks WMIC post exploitation Hidden bind shells Bitsadmin Browser Password Recovery PAC Attacks DNS Poisoning Veil Framework and AV Evasion Metasploit Loader 32/64-bit DLL Hijacking basics DLL Hijacking and Meterpreter Privilege Escalation via DLL Hijacking DLL Injection using Appinit_DLLs Stripping Manifest Files for DLL Hijacking Attacking with DLL Forwarding Anti-Forensics techniques Memory Dumping and Analysis

Master's degree, Computer security
  • at USTHB (University of Sciences and Technology Houari Boumediene)
  • July 2016

Option : Computer Security. Thesis about an Automated Framework for Malware Analysis using Machine Learning Technologies used: .NET, C#, Python, Malware analysis, Weka, AI, Machine learning, IDA PRO, Anubis, Entity Framework, WPF.

Bachelor's degree, Software Engineering
  • at USTHB (University of Sciences and Technology Houari Boumediene)
  • July 2014

Option : Software Engineering and information systems. Thesis about The implementation of a synchronous MAC protocol for Wireless Sensor Network. Technologies used: .NET, C, GloMoSim

Bayt Tests

IQ Test
IQ Test
Score 82%

Specialties & Skills

IT Security
Security
Computer Security
ACTIVE DIRECTORY
risk management
cyber security

Languages

Arabic
Native Speaker
English
Expert
French
Native Speaker

Training and Certifications

Professional Scrum Master™ I (PSM I) (Certificate)
Date Attended:
July 2021
eLearnSecurity Junior Penetration Tester (Certificate)
Date Attended:
March 2021
Certified Red Team Expert (CRTE) (Certificate)
Date Attended:
July 2022
Certified Red Team Professional (CRTP) (Certificate)
Date Attended:
February 2022
Offensive Security Web Expert (OSWE) (Certificate)
Date Attended:
August 2021
OffSec Certified Professional (OSCP) (Certificate)
Date Attended:
February 2023
Computer Security | Reverse Engineering (Training)
Training Institute:
Pentester Academy | Security Tube
Date Attended:
December 2018
Duration:
100 hours
Network Pentesting Training (Training)
Training Institute:
Pentester Academy | Security Tube
Date Attended:
September 2018
Duration:
80 hours

Hobbies

  • Technology
  • Soccer
  • Wrestling