Skip to content
View zizigoloo's full-sized avatar

Highlights

  • Pro

Block or report zizigoloo

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
zizigoloo/README.md

πŸ›‘οΈ Zeinab Ramezan Ali

πŸ‘¨β€πŸ’» SECURITY ENGINEER | Cloud & Network Security | Problem Solver

LinkedIn GitHub Email


πŸ‘‹ About Me

Passionate Security Engineer with a focus on cloud security, network defense, and threat detection.
I design, secure, and automate systems to ensure business continuity and data protection.

I enjoy solving complex security challenges, building detection pipelines, and creating automated responses to evolving cyber threats. My approach blends both the offensive and defensive sides of cybersecurity β€” from identifying misconfigurations to engineering secure architectures.

Currently advancing my expertise in cloud-native security, zero trust frameworks, and threat hunting. My long-term goal is to become a Cloud Security Architect, helping organizations implement scalable, secure, and compliant infrastructures.


🧠 Technical Skills

My Skills

Core Competencies

  • Cloud Security (AWS | Azure | GCP)
  • SIEM & Threat Detection (Splunk | Wazuh)
  • Network Defense & Firewall Management (pfSense | Suricata | Snort)
  • Incident Response & Digital Forensics
  • Security Automation (Python, Bash, PowerShell)
  • Identity & Access Management (IAM, SSO, MFA)

Certifications
In progress: CompTIA Security+ CCNA AWS Security Specialty Microsoft Certified


🎯 Featured Projects

Skills: Cloud SOC Architecture, AWS Security (GuardDuty, Security Hub), Automated Incident Response, Threat Hunting, MITRE ATT&CK, Compliance (HIPAA/GxP), AWS Organizations

Designed a multi-account AWS architecture (using AWS Organizations) to isolate production ("Ground Zero"), SOC tools ("Containment Lab"), and log archive ("Archive Ward") environments for a biotech firm. Architected a cloud-native detection pipeline to aggregate findings from AWS GuardDuty, Security Hub, and Inspector into a central SOC account. Planned automated containment playbooks using AWS Lambda and EventBridge to quarantine EC2 instances and respond to ransomware-style threats in real-time.

Key Achievements:

  • Developed domain-aware detection logic mapped to MITRE ATT&CK for biotech-specific threats (e.g., anomalous genomic data access, research database exfiltration).
  • Integrated HIPAA and FDA/GxP compliance requirements directly into the SOC architecture, logging standards, and automated response playbooks.
  • Designed a centralized logging and threat-hunting solution using S3, CloudTrail, and Amazon Athena to query for adversary TTPs.
  • Produced a complete project charter, 6-sprint roadmap, RACI matrix, and detailed service topology for the SOCaaS build-out.

Tools: AWS Organizations, GuardDuty, Security Hub, Inspector, Detective, Lambda, Step Functions, EventBridge, Athena, S3, CloudTrail, MITRE ATT&CK, NIST, Terraform (planned)


Skills: Network Security Monitoring (NSM), Intrusion Detection (IDS), pfSense Configuration, Virtualization, Red Team (Scanning), Blue Team (Alert Analysis)

Built an isolated, multi-VM lab (Attacker, Target, Firewall) using Oracle VirtualBox and an internal-only network. Deployed and configured pfSense as the network firewall/gateway and integrated Snort as a package for intrusion detection on the LAN interface. Executed simulated attacks from a Kali Linux machine (using Nmap and Nikto) against a Metasploitable2 target to test the defensive monitoring setup.

Key Achievements:

  • Successfully configured the network to route all attacker (Kali) and victim (Metasloitable2) traffic through the pfSense IDS for complete inspection.
  • Generated and validated real-time Snort alerts that correctly identified Nmap TCP scans and Nikto web vulnerability scanning patterns.
  • Created a reusable lab to demonstrate the practical application of network topology, DHCP, routing, and interpreting IDS alerts.

Tools: Oracle VirtualBox, pfSense, Snort, Kali Linux, Nmap, Nikto, Metasploitable2


Skills: Terraform (IaC), AWS GuardDuty, Security Hub, EC2, VPC, CloudWatch

Designed and deployed a multi-account AWS lab environment using Terraform to simulate EC2 compromise scenarios. Integrated AWS GuardDuty for automated threat detection and AWS Security Hub for centralized security finding analysis. Developed automation scripts (PowerShell/Bash) to simulate attacks and configure the lab environment.

Highlights:

  • Built a reusable, fully automated lab (Infrastructure as Code) for hands-on security training and demonstrations.
  • Configured real-time threat alerting by forwarding GuardDuty findings to SNS notifications.

Tools: Terraform, AWS GuardDuty, AWS Security Hub, AWS EC2, AWS VPC, AWS IAM, CloudWatch, SNS, PowerShell, Bash


πŸ› οΈ Additional Skills

Security Tools & Platforms

  • SOC Tools: Wazuh, Splunk, Security Onion
  • Pen Testing: Nmap, Metasploit, Burp Suite

Scripting & Infrastructure

  • Languages: Python, Bash, PowerShell
  • Automation: Terraform, GitHub Actions
  • Cloud Services: EC2, S3, IAM, CloudTrail, Azure Defender

πŸ† Achievements

  • Built secure AWS infrastructure with GuardDuty and Config monitoring
  • Cybersecurity Fellowship Graduate

πŸŽ“ Continuous Learning

Currently Exploring:

  • Zero Trust Security Architecture
  • SOC Automation with SOAR tools
  • AWS Detective & CloudTrail Lake
  • Reverse Engineering & Malware Analysis

Recent Training:

  • Coursera – Google Cybersecurity Professional Certificate
  • TryHackMe – Cloud Security Engineer Path

πŸ“ž Contact & Links

πŸ“§ Email: [email protected]
πŸ’Ό LinkedIn: linkedin.com/in/rmaliz
πŸ’» GitHub: github.com/zizigoloo


πŸ—’οΈ Disclaimer

All research, labs, and tests showcased here were conducted in authorized lab environments following ethical hacking practices and compliance standards.


Last Updated: November 2025

"Security is not about perfectionβ€”it’s about resilience." β€”

Popular repositories Loading

  1. zizigoloo.github.io zizigoloo.github.io Public

    CSS

  2. cyber cyber Public

    Forked from emiliedionisio/tech-portfolios

  3. aws-lab-scripts aws-lab-scripts Public

    Shell

  4. zizigoloo zizigoloo Public