Welcome

About Me

I am a Software Engineering graduate passionate about data science, medical imaging, data processing, and cybersecurity. I enjoy solving complex problems and developing innovative solutions across technology and healthcare domains. My experience spans Python, C, Bash, C#, Java, and SQL, as well as Linux, cloud platforms, and security tools. I have worked on projects involving intrusion detection, secure networking, and incident response, and am dedicated to utilizing technology to drive positive impact in both tech and healthcare fields.

Programming Languages & Technologies

C# 53%
Python 79%
SQL 60%
Java 70%
C 60%
JavaScript 40%

Domain Expertise

Linux 55%
Cryptography 83%
Machine Learning 75%
Computer Vision 68%
Data Processing 72%
Digital Forensics and GRC 70%

My Toolkit

Visual Studio VS Code Postman Microsoft Event Viewer Hayabusa AWS Microsoft Azure Cisco Packet Tracer Oracle VM VirtualBox VMware Wireshark Tcpdump Suricata IDS Tcpreplay NetBeans Google Colaboratory Canva Jupyter Notebook Android Studio Unity Engine KNIME GitHub Codepen SQL Server MongoDB Atlas Arduino Proteus Microsoft Office MARS (MIPS Simulator)

Frameworks & Libraries

.NET Framework Entity Framework LINQ jQuery AJAX Bootstrap NIST Cybersecurity Framework Pandas OpenCV BeautifulSoup Scikit-learn TensorFlow Keras Seaborn NumPy Matplotlib Razor Select2 NLTK D-Tale Material UI
  • Bahria University


    Bachelors, Software Engineering

    CGPA: 3.74 out of 4.00
    Oct 2021 - July 2025
  • Aga Khan Higher Secondary School, Karachi


    Intermediate, Pre-Engineering

    Grade: A-1
    July 2019 - Aug 2021
  • Pakistan International School, Jeddah


    Matriculation, Science Group

    Grade: A
    Aug 2016 - May 2019
  • Al-Shoa'a Interational School, Jeddah


    Primary, Science Group

    Apr 2008 - July 2016
  • Security Consultancy and Forensics Intern

    Trillium Information Security Systems

    June 2025 - Present

    During my internship at Trillium Information Security Systems, I gained practical experience in Digital Forensics and Governance, Risk, and Compliance (GRC). I worked on various projects that involved analyzing security incidents, conducting risk assessments, and ensuring compliance with industry standards. This opportunity allowed me to apply my skills in a collaborative environment and contribute to a meaningful project.

    Microsoft Event Viewer ISO 27001 Security+ Network+ Qualys Kaspersky Zircolite Chainsaw CIS Benchmarks Risk Assessments ISO 27005 Hayabusa BCP DRP BIA
  • .NET Intern

    NexinIT

    Nov 2023 - Dec 2023

    During my two-month internship at NexinIT, I gained practical experience in back-end development using .NET Core and MVC architecture while working on a Customer Invoicing Application. I utilized Entity Framework for data management and SQL Server to ensure data integrity and performance. Additionally, I crafted responsive user interfaces with Razor UI, jQuery, AJAX, Bootstrap, HTML, CSS, and JavaScript, enhancing the application's interactivity and overall user experience. This opportunity allowed me to apply my skills in a collaborative environment and contribute to a meaningful project.

    Visual Studio ASP.NET MVC Core 3.1 Postman Microsoft Azure GitHub SQL Server Entity Framework jQuery AJAX Bootstrap Razor Select2

IBM - Application Security for Developers and DevOps Professionals

Issued March 2024
This certification focuses on secure application development and DevOps practices. It covers topics like threat modeling, vulnerability assessment, secure coding, and CI/CD pipeline security. Participants gain hands-on experience with tools and frameworks to enhance application security in modern development environments.
Application Security DevOps Secure Development Threat Modeling Vulnerability Assessment Risk Management OWASP Secure Coding CI/CD Security Cloud Security Penetration Testing Compliance Cybersecurity Docker Kubernetes Jenkins GitHub SonarQube Burp Suite Nmap Wireshark Linux Python Java

ISC2 - Certified in Cybersecurity (CC)

Feb 2025 - Expires Feb 2028
The ISC2 - Certified in Cybersecurity (CC) certification is an entry-level credential designed to validate foundational knowledge in cybersecurity. It covers essential topics such as risk management, network security, incident response, and access controls. This certification is ideal for individuals starting their careers in cybersecurity, providing a strong foundation for roles like Cybersecurity Analyst, SOC Analyst, and more.
Cybersecurity Risk Management Network Security Incident Response Access Controls Threat Analysis Vulnerability Assessment Security Operations SIEM Tools Intrusion Detection Systems (IDS) Cryptography Security Frameworks Compliance Data Protection Information Security

Google Cybersecurity Professional Certificate

Issued Feb 2024
The Google Cybersecurity Professional Certificate is an online program designed to equip learners with essential skills for entry-level roles in cybersecurity. Developed by Google experts, this comprehensive course covers critical topics such as risk management, network security, and incident response, utilizing hands-on learning with industry-standard tools like Python and Linux. No prior experience is required, making it accessible to anyone interested in the field. Graduates will be prepared for various roles, including Cybersecurity Analyst and SOC Analyst, and will have the opportunity to take the CompTIA Security+ exam, enhancing their career prospects in a rapidly growing job market.
NIST Cybersecurity Framework SQL Python Linux Wireshark Tcpdump Oracle VM VirtualBox Incident Response Assets, Threats, and Vulnerabilities Intrusion Detection Systems (IDS) SIEM tools

UNAP x Toyota - Japanese 5S Methodology Training

Issued Dec 2020
The Japanese 5S Methodology Training by Toyota Indus and the United Nations Association of Pakistan (UNAP) focuses on the principles of workplace organization and efficiency. The 5S methodology—Sort, Set in Order, Shine, Standardize, and Sustain—aims to improve productivity, reduce waste, and create a safe and organized work environment. This training equips participants with practical tools to implement the 5S framework in various industries, fostering a culture of continuous improvement and operational excellence.
5S Methodology Workplace Organization Lean Manufacturing Process Improvement Operational Excellence Continuous Improvement Waste Reduction Productivity Safety Standardization Sustainability

My Portfolio


Blog image

Intelligent Cyber Attacks Detection System (ICADS)

Oct 2024 - Jun 2025 | Final Year Project

This project integrates a machine learning-based anomaly detection model with Suricata IDS to enhance real-time detection of sophisticated DDoS attacks. Utilizing pandas, seaborn, and scikit-learn, the Random Forest model is trained on large-scale DDoS datasets (CIC-DDoS2019, LR-HR DDoS 2024) for robust traffic classification. Real-time Suricata logs are processed and visualized via a Streamlit dashboard, enabling actionable analytics and live monitoring for network administrators. The system achieved 99% accuracy in offline testing and 78–94% accuracy in live network environments. By embedding adaptive learning into the IDS, it reduces reliance on static signature rules and manual updates, offering a more dynamic and resilient approach to intrusion detection.

Suricata Python Real-time Random Forest FYDP Cybersecurity Final Year Project Scapy Jupyter Notebook FYP
Blog image

Phishing Emails Detection System

Nov 2024 - Dec 2024

This project is a real-time phishing email detection system developed as part of a Natural Language Processing (NLP) coursework. It leverages a TF-IDF vectorizer to extract textual features from email content and employs a Random Forest classifier to accurately distinguish between phishing and legitimate emails, achieving a 95% accuracy rate. The system is designed to connect to email inboxes using the IMAP protocol, automatically scanning and classifying incoming messages. By integrating machine learning and NLP techniques, the project enhances cybersecurity by providing proactive protection against phishing attacks, reducing the risk of credential theft and data breaches. The application features a user-friendly Streamlit web interface for live monitoring and visualization of detection results, making it accessible for both technical and non-technical users.

Streamlit Python Real-time Random Forest IMAP Cybersecurity Natural Language Processing Web Application Jupyter Notebook TF-IDF
Blog image

Don't Blink Game

May 2024 - Jun 2024

The Don’t Blink Game is an intelligent Android-based game that utilizes computer vision and real-time facial recognition to create an engaging and interactive experience. Players are challenged to keep their eyes open for as long as possible, with the app continuously monitoring eye movements using the device’s camera and Google Vision API. The game logic is seamlessly integrated, automatically detecting blinks and accurately timing each session. Players can compete for the longest streak, track their progress, and view high scores through a user-friendly Material UI interface. Cloud integration with Firebase Realtime Database enables persistent score tracking and multiplayer features, allowing users to challenge friends and compare results globally. Designed for both entertainment and skill development, Don’t Blink offers a unique blend of fun, technology, and competition, making it suitable for all ages.

Android Studio XML Java Material UI 3 Google Vision Firebase Realtime Database Mobile App Dev. Data Mining Cloud Computer Vision
Blog image

Drowsiness Detection System

Dec 2023 - Jan 2024

The DDS is an intelligent safety application designed to reduce road accidents caused by driver fatigue. Using computer vision, the system is trained to recognize facial features, specifically focusing on the eyes.

Python Computer Vision CNN OpenCV Keras NumPy Pandas Pygame Jupyter Notebook Data Science Eye-tracking
Blog image

Enterprise Network Design for Airports

Dec 2023 - Jan 2024

This network design for Dubai Int'l Airport creates a secure, scalable infrastructure using VLANs & access controls to enhance departmental communication & provide guest internet access while isolating internal systems.

Cisco Packet Tracer EIGRP DHCP Server VLANs Access Points Computer Networks
Blog image

Parallel Matrix Operations Application

Jun 2023 - Jun 2023

This Bash Application utilizes multithreading and OpenMP to enhance matrix computations, overcoming the inefficiencies of sequential operations. This project aims to provide faster and more efficient processing for large matrices.

C OpenMP Bash Threads Linux Oracle VM VirtualBox Operating Systems
Blog image

Vehicle Trading System

Apr 2023 - Jun 2023

A state-of-the-art vehicle management system designed to streamline operations and optimize data management. This project focuses on creating a robust database infrastructure for managing critical information, including vehicle details, maintenance logs, repair costs, and profit/loss analysis.

C# Windows Forms SQL Server DBMS .NET Framework Design Patterns
Blog image

Maze Rush Game

Jan 2023 - Feb 2023

Maze Rush is a labyrinth maze game where players race against the clock to navigate through mazes filled with obstacles. Using quick thinking & problem-solving skills, players compete for high scores & unlock achievements in this thrilling maze adventure featuring multiple levels of increasing difficulty.

C# Filing Windows Forms A* algorithm Data Structures & Algorithms
Blog image

Space Battle Game

Dec 2022 - Jan 2023

SPACE BATTLE is a single-player strategy game developed in assembly language, inspired by classic arcade games. Players navigate through obstacles, improve their logical thinking, and enhance reaction times while aiming for high scores. The game features engaging visuals, player and enemy mechanics, and is compatible with all Windows devices.

MARS MIPS Assembly Game Computer Architecture Logic Design
Blog image

Color Mania Game

Jun 2022 - Jul 2022

COLOR MANIA is a single-player strategy game inspired by classic puzzle games like Candy Crush developed on Unity Engine, while focusing on logical thinking and planning. Players match colorful dots to clear the board, enhancing their reaction time while enjoying engaging visuals and multiple game modes that are Timer mode & Moves mode.

C# Unity Candy Crush Object Oriented Programming Game Dev.
Blog image

CUBRO Game

Jan 2022 - Feb 2022

CUBRO is a single-player strategy game inspired by Subway Surfers, where players navigate through obstacles to achieve the highest score without collisions. This game emphasizes logical thinking and reaction time, providing an engaging experience for players.

C# Unity Game Dev. Computer Programming Subway Surfers
Blog image

Karachi Tour Guide

Jan 2022 - Jan 2022

Karachi Tour Guide is a Mobile Application developed using no-code/drag-and-drop platform 'Thunkable', and is compatible with both Android and iOS devices. It provides all the information about landmarks to explore in Karachi.

Drag-and-Drop No-code Thunkable Mobile Application iOS/Android

Contact Me

mzainjed@gmail.com

+92-331-3471072