Saeed Ahmed Profile Picture

Saeed Ahmed

Cybersecurity Specialist & Researcher

About Me

I am a First Class Honours Cybersecurity graduate from the University of South Wales with certified expertise in security operations, cloud infrastructure, and technical support with 4+ years experience in a customer facing role and as an IT technician. The practical understanding of both the technical and human-centric aspects of cybersecurity I posses allowed me to author a crypto scam prevention framework due for publishcation in November and presented at an international cybersecuirty conference in August. All of this makes me a versatile and forward-thinking security professional.

Professional Memberships

As a dedicated cybersecurity professional, I am committed to upholding the highest standards of ethics and conduct in the industry. I am a member of the British Computer Society (BCS), which provides me with access to a wealth of resources, networking opportunities, and professional development programs.

Skills & Expertise

A collection of technologies and methodologies I have gained expertise in, validated through professional experience and certifications.

Cybersecurity & Defence

  • Cybersecurity
  • Network Security
  • Incident Response
  • Cyber Defense
  • Data Security
  • Penetration Testing
  • Ethical Hacking
  • Threat Detection & Assessment
  • Vulnerability Assessment & Scanning
  • Malware Analysis
  • Phishing & Social Engineering
  • SIEM & Event Monitoring
  • Firewalls

Governance, Risk, Compliance & IAM

  • Information Security
  • Risk Assessment & Management
  • Security Policies
  • Information Assurance
  • Identity & Access Management (IAM)
  • Authentication
  • Security Breach Analysis
  • Information Security Analysis

Cloud, Infrastructure & Technical Skills

  • Cloud Security
  • Cloud Computing (GCP)
  • Linux
  • System Administration
  • Python
  • Scripting
  • IT Infrastructure Management
  • Operating Systems
  • Internet Of Things (IoT)
  • Information Systems (IS)

Professional & Business Competencies

  • Problem Solving
  • Teamwork
  • Customer Support
  • Professional Services
  • Dealing With Enquiries
  • Operational Reporting
  • Computer Literacy

Education

BSc (Hons) Applied Cybersecurity

University of South Wales Logo

University of South Wales

Completed
2022 - 2025

Award Date: 17 June 2025

Final Grade: First Class Honours

Description:

The BSc (Hons) Applied Cybersecurity programme is designed to equip students with the knowledge and skills necessary to protect organisations from cyber threats. The curriculum covers a wide range of topics, including network security, cryptography, ethical hacking, digital forensics, and risk management. Students will also gain practical experience through hands-on labs and real-world projects, preparing them for careers in cybersecurity.

View Detailed Module Breakdown

Final Year (2024/2025) – Level 6

This year demonstrates a high level of specialisation and academic excellence, culminating in a First Class Honours classification.

  • Secure Operations And Incident Management (IY3U001) 76%
  • Security Operations & Penetration Testing (IY3D607) 75%
  • Cyber Dissertation Project (IY3D610) 68%
  • Cyber Professional In Practice (IY3H001) 58%

Second Year (2023/2024) – Level 5

  • Compliance And Risk Management (IY25510) 61%
  • Cyber Crime Research Project (IY2H511) 58%
  • Web Applications And Cloud Security (IY25507) 50%
  • Digital Crime Scene Management (IY25508) 50%
  • Critical Systems Infrastructure (IY25512) 48%
  • Secure Systems (IY2T509) 46%

First Year (2022/2023) – Level 4

  • Network Configuration (IY1S407) 52%
  • Cyber Security Tools And Practices (IY1S402) 49%
  • Information Security And Governance (IY1S409) 47%
  • Computer Systems & Security (IY15403) 46%
  • Programming (IY1S408) 44%
  • Professional Practice And Employability (IY1S401) 35% (Compensated Pass)

BTEC Level 3 Extended Diploma in Computing

Coleg Gwent Logo

Coleg Gwent

(Completed)
2020 - 2022

Award Date: 15 August 2022

Final Grade: DMM (Equivalent to 3 A-Levels)

Description:

The BTEC Level 3 Extended Diploma in Computing is a comprehensive programme that provides students with a solid foundation in various aspects of computing. The curriculum covers a wide range of topics, including programming, database management, networking, web development, and systems analysis. The course is designed to equip students with both theoretical knowledge and practical skills, preparing them for further education or careers in the IT industry.

View Detailed Module Breakdown

Distinction

  • Business Applications of Social Media
  • The Impact of Computing

Merit

  • Principles of Computer Science
  • Fundamentals of Computer Systems
  • IT Systems Security and Encryption
  • Digital Graphics and Animation
  • Website Development
  • Relational Database Development
  • Systems Analysis and Design

Pass

  • Planning and Management of Computing Projects
  • Computer Networking
  • Systems Methodology

Other

  • Software Design and Development Project: Near Pass

Credentials & Badges

My certifications and achievements validate my expertise across a range of IT and cybersecurity disciplines.

TryHackMe Profile

About TryHackMe

TryHackMe is a leading online platform for hands-on cybersecurity training that allows users to learn and test their skills in real-world scenarios. For a candidate such as myself, an active TryHackMe profile serves as a dynamic portfolio, demonstrating my practical abilities in areas like penetration testing, digital forensics, and defensive security. It shows a recruiter that the individual is a proactive, self-motivated learner who has moved beyond theoretical knowledge to gain tangible, applicable skills, evidencing a genuine passion for the cybersecurity field and a commitment to continuous professional development.

View More Badges

Work Experience

Cybersecurity Open-Day Volunteer

University of South Wales Logo

University of South Wales

Role Duration: July 2025

Key Responsibilities:

  • Facilitated interactive cybersecurity activities for secondary school visitors, focusing on practical applications of OSINT (Open-Source Intelligence) and critical thinking.
  • Guided students through engaging challenges designed to develop analytical reasoning and problem-solving skills in a cybersecurity context.
  • Translated complex cybersecurity concepts into accessible and engaging content for a younger audience, fostering an early interest in the field.

Cyber Clinic Volunteer

University of South Wales Logo

University of South Wales

Role Duration: October 2022 - May 2024

Key Responsibilities:

  • Provided pro-bono cybersecurity advice to members of the public on a range of personal security topics.
  • Educated individuals on best practices for password security, phishing awareness, and safe online behaviour.
  • Assessed personal security risks and recommended clear, actionable steps for improvement.

Mastercard Cybersecurity virtual experience

Mastercard Logo

Mastercard

Role Duration: July - August 2024

Key Responsibilities:

  • Completed a job simulation where I served as an analyst on Mastercard’s Security Awareness Team.
  • Helped identify and report security threats such as phishing.
  • Analyzed and identified which areas of the business needed more robust security training and implemented training courses and procedures for those teams.

JPMorgan Chase & Co. Cybersecurity virtual experience

JPMorgan Chase & Co. Logo

JPMorgan Chase & Co.

Role Duration: August - September 2024

Key Responsibilities:

  • Financial Fraud Analysis: The first task involved analysing a large dataset of fraudulent transactions in financial payment services. This required applying data analysis techniques to identify patterns and anomalies indicative of financial crime. This activity directly relates to the risk management component of GRC, as identifying such patterns is crucial for protecting sensitive financial data and preventing breaches.
  • Application Security Implementation: I was tasked with learning and applying fundamental application security principles to a website. This involved identifying common vulnerabilities (such as those on the OWASP Top 10) and implementing corrective measures, demonstrating practical skills in proactive security and the principle of Privacy by Design.
  • Threat Intelligence & Machine Learning: The final module required building "Spam or Ham?" email classifier. This practical task involved using data science principles to develop a tool that could intelligently distinguish between legitimate emails and potential phishing threats. This showcases skills in applying technology to mitigate social engineering attacks, a primary vector for data breaches and a key concern under GDPR.

IT Support Technician (Volunteer)

Clwb Ffoto logo

Clwb Ffoto

Role Duration: March 2025 - Present

Key Responsibilities:

  • Provided technical support to end-users, resolving hardware and software issues efficiently.
  • Assisted in the installation, configuration, and maintenance of computer systems and networks.
  • Troubleshot and resolved IT-related problems, ensuring minimal downtime for users.
  • Maintained accurate records of support requests and resolutions using ticketing systems.
  • Collaborated with team members to improve IT processes and enhance service delivery.

IT Support Technician (Volunteer)

Ffoto Newport logo

Ffoto Newport

Role Duration: November 2021 - December 2024

Key Responsibilities:

  • Provided technical support to end-users, resolving hardware and software issues efficiently.
  • Assisted in the installation, configuration, and maintenance of computer systems and networks.
  • Troubleshot and resolved IT-related problems, ensuring minimal downtime for users.
  • Maintained accurate records of support requests and resolutions using ticketing systems.
  • Collaborated with team members to improve IT processes and enhance service delivery.

IT Support Technician (Volunteer)

35mm Creative Agency logo

35mm Creative Agency

Role Duration: February 2022 - December 2024

Key Responsibilities:

  • Provided technical support to end-users, resolving hardware and software issues efficiently.
  • Assisted in the installation, configuration, and maintenance of computer systems and networks.
  • Troubleshot and resolved IT-related problems, ensuring minimal downtime for users.
  • Maintained accurate records of support requests and resolutions using ticketing systems.
  • Collaborated with team members to improve IT processes and enhance service delivery.

Customer Assistant

B&Q Logo

B&Q

Role Duration: July 2021 - Present

Key Responsibilities:

  • One of the largest home improvement retailers in the UK
  • Known for its wide range of products and competitive pricing
  • Handled all IoT DIY, AV equipment and networking enquiries and support
  • Provided exceptional customer service in a fast-paced retail environment

Research & Projects

Here is my research output and case studies that demonstrate my skills and expertise.

Metaverse & Exposure of Children to the Dark Corners of the Internet

Currently Researching

The metaverse, an expanding network of persistent, immersive virtual worlds, presents novel challenges for child safety. While platforms such as VRChat offer unprecedented social interaction, their open and often unmoderated nature creates significant risks. These environments can expose minors to harmful content, grooming, and simulated sexual assault, mirroring the dangers of the internet's most unregulated spaces. This research investigates the specific vulnerabilities inherent in such platforms, analyses the mechanisms through which harm occurs, and evaluates potential technological and policy-based safeguards to protect children in these nascent digital territories.

Expected Completion: TBD

Feast on the Desperate

Release Date:

The Challenge: This paper addresses the escalating threat of cryptocurrency scams by examining the social engineering and psychological tactics that exploit individuals. We identify a critical gap in public awareness and expose how social media, leveraging platforms, influencers, and targeted advertising, is a primary vector for these sophisticated schemes. The research highlights that these scams succeed not just through technical means, but by preying on human vulnerabilities like FoMo (Fear of Missing Out) and other emotional manipulations.

Methodology & Analysis: Through a detailed analysis of scam victimisation and real-world testimonies, this work delves into the psychological underpinnings of why individuals fall prey to these schemes. The paper synthesises elements from disparate fields, phishing prevention, the SCAMS Checklist, the I-PACE model, and insights from parasocial relationships to develop a new, comprehensive framework for scam prevention. This interdisciplinary approach provides a more holistic defence strategy.

The Key Findings & Contributions:The study's findings confirm that scammers systematically exploit financial fears and parasocial trust to bypass logical decision making. Our primary contribution is the proposed comprehensive framework, which empowers individuals with a combined set of tools to identify and avoid fraudulent cryptocurrency schemes. This framework's novelty lies in its integration of psychological and social factors with established technical prevention methods.

Implications & Conclusion: The implications of this research are significant for both individuals and organisations. By understanding the psychological tactics employed by scammers, we can better equip ourselves to resist these manipulative strategies. The proposed framework serves as a valuable resource for developing targeted educational initiatives and preventive measures in the fight against cryptocurrency scams.

View Presentation Paper Release Soon

Cyber Drill: Incident Investigation of a Compromised System

Release Date:

FCB Bank PLC was the target of a sophisticated cyberattack that resulted in a data breach and the theft of sensitive customer information. The multi-stage attack involved gaining initial access, reconnaissance, tool deployment, internal network penetration, data collection and exfiltration, and attempts to destroy evidence. The breach has exposed FCB Bank PLC to potential legal, regulatory and reputational damage. Immediate action is required to contain the breach, fully investigate its extent and implement robust preventative measures to prevent future incidents.

View Report Details

Code Red for Healthcare: Why the NHS is Losing the War on Ransomware

The National Health Service (NHS) is in a state of perpetual crisis, grappling with understaffing, overcrowding, and systemic delays. This operational fragility is being dangerously amplified by a relentless wave of cyberattacks. Ransomware, in particular, has proven to be a uniquely devastating threat, capable of crippling hospital operations, compromising patient data, and putting lives at risk.

This analysis argues that the NHS's vulnerability is not just a matter of insufficient funding but a fundamental flaw in its technological foundation. Its deep-seated reliance on traditional, high-maintenance operating systems like Windows creates an attack surface that is simply too vast to defend. The solution lies in a strategic pivot to a modern, secure-by-design platform. By adopting a 'Zero Trust' architecture, exemplified by ChromeOS, the NHS can build a more resilient, manageable, and inherently secure infrastructure fit for the challenges of the 21st century.

View White Paper

Snort Challenge - Live Attack

This report details a cybersecurity exercise focused on using the Snort Intrusion Detection and Prevention System (IDS/IPS) to neutralise two distinct threats within a simulated corporate network. The project successfully demonstrated the process of traffic analysis, signature creation, and rule deployment to mitigate both an external brute-force attack and an internal reverse-shell compromise.

View Report Details

JPMorgan-Transaction - Detecting Financial Fraud with Machine Learning

This project tackles the critical challenge of fraud in the burgeoning world of mobile money. By analysing a large-scale dataset from a financial services provider, I uncovered the subtle behavioural patterns that distinguish legitimate customers from fraudulent actors.

The core of this work involved moving beyond existing detection flags to engineer a highly accurate predictive model. The result is a set of actionable insights and a robust machine-learning framework designed to help organisations pre-emptively identify and stop fraud, enhancing system security and protecting customer assets.

View Project Details
View All Projects

Contact

If you would like to get in touch, please feel free to reach out via email or connect with me on LinkedIn.