Chiheb C.

Cyber Defense Specialist at Intellisec Solutions
  • Claim this Profile
Contact Information
us****@****om
(386) 825-5501
Location
CA
Languages
  • Arabe Native or bilingual proficiency
  • Français Full professional proficiency
  • Anglais Full professional proficiency

Topline Score

Topline score feature will be out soon.

Bio

Generated by
Topline AI

You need to have a working account to view this content.
You need to have a working account to view this content.

Credentials

  • Microsoft Certified Cybersecurity Architect Expert
    Microsoft
    Oct, 2022
    - Nov, 2024
  • Microsoft Certified Security Operation Analyst
    Microsoft
    Dec, 2021
    - Nov, 2024
  • MITRE ATT&CK Cyber Threat Intelligence (CTI)
    MITRE
    Jun, 2021
    - Nov, 2024
  • MITRE ATT&CK DEFENDER™ (MAD)
    MITRE
    Jun, 2021
    - Nov, 2024
  • MITRE ATT&CK Security Operations Center (SOC) Assessments
    MITRE
    Jun, 2021
    - Nov, 2024
  • Microsoft Certified: Azure Security Engineer Associate
    Microsoft
    Sep, 2022
    - Nov, 2024
  • Microsoft Certified: Identity and Access Administrator Associate
    Microsoft
    Aug, 2022
    - Nov, 2024

Experience

    • Canada
    • Computer and Network Security
    • 1 - 100 Employee
    • Cyber Defense Specialist
      • May 2021 - Present

    • Independant Security Operations Specialist
      • Jan 2019 - May 2021

      - Incident Response - Security Operations - Threat Analysis - Threat intelligence - Malware Analysis - Incident Response - Security Operations - Threat Analysis - Threat intelligence - Malware Analysis

    • United Kingdom
    • E-Learning Providers
    • 500 - 600 Employee
    • Technical reviewer: Hands-On Unsupervised Learning with Python
      • Feb 2019 - Feb 2019

      This book starts with the key differences between supervised, unsupervised, and semi-supervised learning. You will be introduced to the best-used libraries and frameworks from the Python ecosystem and address unsupervised learning in both the machine learning and deep learning domains. You will explore various algorithms, techniques that are used to implement unsupervised learning in real-world use cases. You will learn a variety of unsupervised learning approaches, including randomized optimization, clustering, feature selection and transformation, and information theory.

    • Technical Reviewer: Machine Learning Quick Reference
      • Jan 2019 - Jan 2019

      Machine learning makes it possible to learn about the unknowns and gain hidden insights into your datasets by mastering many tools and techniques. This book guides you to do just that in a very compact manner.After giving a quick overview of what machine learning is all about, Machine Learning Quick Reference jumps right into its core algorithms and demonstrates how they can be applied to real-world scenarios. From model evaluation to optimizing their performance, this book will introduce you to the best practices in machine learning. Furthermore, you will also look at the more advanced aspects such as training neural networks and work with different kinds of data, such as text, time-series, and sequential data. Advanced methods and techniques such as causal inference, deep Gaussian processes, and more are also covered.

    • Technical Reviewer: Hands-On Machine Learning for Cybersecurity
      • Dec 2018 - Dec 2018

      Cyber threats today are one of the costliest losses that an organization can face. In this book, we use the most efficient tool to solve the big problems that exist in the cybersecurity domain.The book begins by giving you the basics of ML in cybersecurity using Python and its libraries. You will explore various ML domains (such as time series analysis and ensemble modeling) to get your foundations right. You will implement various examples such as building system to identify malicious URLs, and building a program to detect fraudulent emails and spam. Later, you will learn how to make effective use of K-means algorithm to develop a solution to detect and alert you to any malicious activity in the network. Also learn how to implement biometrics and fingerprint to validate whether the user is a legitimate user or not.

    • United Kingdom
    • E-Learning Providers
    • 500 - 600 Employee
    • Technical Reviewer: Mastering Reverse Engineering
      • Oct 2018 - Oct 2018

      If you want to analyze software in order to exploit its weaknesses and strengthen its defenses, then you should explore reverse engineering. Reverse Engineering is a hacker friendly tool used to expose security flaws and questionable privacy practices. In this book, you will learn how to analyse software even without having access to its source code or design documents. You will start off by learning the low-level language used to communicate with the computer and then move on to covering reverse engineering techniques.

    • United States
    • Software Development
    • 700 & Above Employee
    • Software Engineering Internship
      • 2014 - Jul 2015

      Optimazing Mobile Applications

    • Microsoft Student Partner
      • 2012 - 2014

    • Germany
    • Automation Machinery Manufacturing
    • 700 & Above Employee
    • Industrial Automation and Control
      • Jul 2013 - Aug 2013

Education

  • TEK-UP
    Bachelor's degree, Computer Science
    2014 - 2018

Community

You need to have a working account to view this content. Click here to join now