Amal Sayari

Cybersecurity PhD Student at SAMA PARTNERS Business Solutions SARL
  • Claim this Profile
Contact Information
us****@****om
(386) 825-5501
Location
Tunis, Tunisia, TN
Languages
  • Arabic Native or bilingual proficiency
  • French Full professional proficiency
  • English Professional working proficiency
  • German Limited working proficiency

Topline Score

Topline score feature will be out soon.

Bio

Generated by
Topline AI

You need to have a working account to view this content.
You need to have a working account to view this content.

Credentials

  • CCNA Cybersecurity Operations
    Cisco
  • Certificat IEEEXtreme Programming Competition
    IEEE
  • TOEIC
    Amideast/Tunisia
  • Voltaire
    Certificat Voltaire

Experience

    • IT Services and IT Consulting
    • 1 - 100 Employee
    • Cybersecurity PhD Student
      • Dec 2020 - Present

      - A MOBIDOC thesis with cooperation of Communication Networks and Security (CN&S) Research Lab at SUP'COM and SAMA PARTNERS Business Solutions SARL. - Thesis Subject: Towards a Denial and Deception Cybersecurity Model based on an Artificial Intelligence Approach. - Thesis Keywords: Cyber Deception, Cyber Denial, Game Theory, Reinforcement Learning, Attack Modeling, MITRE ATT&CK, MITRE D3FEND. - A MOBIDOC thesis with cooperation of Communication Networks and Security (CN&S) Research Lab at SUP'COM and SAMA PARTNERS Business Solutions SARL. - Thesis Subject: Towards a Denial and Deception Cybersecurity Model based on an Artificial Intelligence Approach. - Thesis Keywords: Cyber Deception, Cyber Denial, Game Theory, Reinforcement Learning, Attack Modeling, MITRE ATT&CK, MITRE D3FEND.

    • Tunisia
    • Telecommunications
    • Supervisor
      • Nov 2022 - Feb 2023

      - Supervision of tutored projects for both Professional Master's and Engineering students (60h).- Projects: - Cyber-attack scenarios generation using Critical Infrastructure Cyberspace Analysis Tool (CICAT).- Deep packet inspection and network traffic analysis.- Vulnerability Management & Remediation.- Audit and Certification of a SOAR.

    • Teacher
      • Nov 2021 - Feb 2023

      - Teaching course and labs on Security Certification CyberOps for both Professional Master's and Engineering students in English and French (84h) at SUP'COM.- Teaching course and labs on Intrusion Detection and Alert Correlation for Engineering students in English and French (21h) at TEK-UP.

    • Germany
    • Research
    • 700 & Above Employee
    • Visiting PHD Student
      • Jun 2022 - Oct 2022

      - A research internship in topics related to cyber deception, reinforcement learning and game theory. - Participation in the 11th International Workshop on Cryptography, Robustness, and Provably Secure Schemes for Female Young Researchers (CrossFyre 2022) in Passau. - Participation in the cybersecurity conference (2022) of SAMA PARTNERS Business Solutions GmbH company in Mannheim. - A research internship in topics related to cyber deception, reinforcement learning and game theory. - Participation in the 11th International Workshop on Cryptography, Robustness, and Provably Secure Schemes for Female Young Researchers (CrossFyre 2022) in Passau. - Participation in the cybersecurity conference (2022) of SAMA PARTNERS Business Solutions GmbH company in Mannheim.

    • Reviewer
      • Jul 2022 - Aug 2022

      - Evaluate international journals and conference papers. - Assess their quality and make a decision on their acceptance or rejection. - Reference: International Journal of Information Security (2022). - Evaluate international journals and conference papers. - Assess their quality and make a decision on their acceptance or rejection. - Reference: International Journal of Information Security (2022).

    • Graduation internship
      • Feb 2020 - Sep 2020

      - Exploiting the artificial intelligence methods, mainly the natural language processing (NLP), in the task of deriving value from unstructured, non-standardized forms of cyber threat data, and putting them in a consumable and structured way such as STIX, and MAEC. - Keywords: Cyber Threat Intelligence, Natural Language Processing, STIX, MAEC, Python. - Exploiting the artificial intelligence methods, mainly the natural language processing (NLP), in the task of deriving value from unstructured, non-standardized forms of cyber threat data, and putting them in a consumable and structured way such as STIX, and MAEC. - Keywords: Cyber Threat Intelligence, Natural Language Processing, STIX, MAEC, Python.

    • France
    • IT Services and IT Consulting
    • Engineer Internship
      • Jul 2019 - Aug 2019

      - Implementation of a GED : computerized process to manage the sources of information and the documents of the company. - Software that guarantees indexing, filing, archiving, research and diffusion documents, business process management and secure access. - Implementation of a GED : computerized process to manage the sources of information and the documents of the company. - Software that guarantees indexing, filing, archiving, research and diffusion documents, business process management and secure access.

    • United Kingdom
    • Leisure, Travel & Tourism
    • A week-long study trip
      • Jun 2019 - Jun 2019

      - Get an overview of the latest technological developments through visits to the companies: Mitakus, Motius, and Siemens. - Get an overview of the latest technological developments through visits to the companies: Mitakus, Motius, and Siemens.

    • Tunisia
    • Telecommunications
    • 700 & Above Employee
    • Internship
      • Jul 2018 - Jul 2018

      - Discover the work environment and the different parts of the communication chain. - Discover the work environment and the different parts of the communication chain.

Education

  • SUP'COM
    Telecommunications Engineering
    2017 - 2020
  • IPEIT - Institut Préparatoire aux Etudes d'Ingénieurs de Tunis
    2015 - 2017

Community

You need to have a working account to view this content. Click here to join now