👨‍💻 Bio Professionnelle

Ayi NEDJIMI

Expert Cybersécurité Offensive & Développement IA | Pentester | DFIR Specialist

🔐 CYBERSÉCURITÉ OFFENSIVE & PENTEST

  • Active Directory Security: Attaques avancées (Kerberoasting, DCSync, Golden/Silver Tickets, NTLM Relay, Pass-the-Hash)
  • Tiering Model & Privilege Access Management (PAM)
  • Red Team Operations & Adversary Simulation
  • Web Application Security (OWASP Top 10, API Security)
  • Network Penetration Testing & Lateral Movement
  • Social Engineering & Physical Security Assessments
  • Exploit Development & Vulnerability Research

🔍 DIGITAL FORENSICS & INCIDENT RESPONSE

  • Memory Forensics (Volatility, Rekall)
  • Disk Forensics & Timeline Analysis
  • Network Traffic Analysis (Wireshark, Zeek, Suricata)
  • Malware Analysis (Static & Dynamic)
  • Windows Artifacts Analysis (Registry, Event Logs, Prefetch, $MFT, USN Journal)
  • SIEM Correlation & Threat Hunting
  • Incident Response Procedures & Containment

☁️ CLOUD & INFRASTRUCTURE SECURITY

  • Microsoft 365 / Azure AD / Entra ID Security Audits
  • Kubernetes Security (Pod Security, RBAC, Network Policies)
  • Cloud Security Architecture (AWS, Azure, GCP)
  • Container Security (Docker, Kubernetes, Harbor)
  • Infrastructure as Code Security (Terraform, Ansible)
  • Virtualisation Security (Proxmox, VMware, Hyper-V)

💻 DÉVELOPPEMENT & AUTOMATISATION

  • Python: Scripts d'automatisation sécurité, exploitation, forensics
  • PowerShell: Audits AD, Microsoft 365, Azure, scripts de durcissement
  • Bash/Shell: Automatisation Linux, CI/CD pipelines
  • API Development & Integration (REST, GraphQL, Microsoft Graph API)
  • DevSecOps: Intégration sécurité dans pipelines CI/CD
  • Infrastructure as Code: Terraform, Ansible, CloudFormation

🤖 INTELLIGENCE ARTIFICIELLE & MACHINE LEARNING

  • RAG (Retrieval Augmented Generation) Systems Architecture
  • Vector Databases (Milvus, Qdrant, Weaviate, Pinecone, ChromaDB)
  • Embeddings & Semantic Search (OpenAI, Sentence Transformers)
  • LLM Integration & Prompt Engineering
  • Document Processing & Chunking Strategies
  • AI-Powered Security Analysis & Threat Detection
  • Natural Language Processing pour analyse de logs
  • Machine Learning pour détection d'anomalies

🛠️ STACK TECHNIQUE

Languages

Python, PowerShell, Bash, JavaScript/TypeScript, Go

Frameworks

FastAPI, Flask, Django, React, Vue.js, Tailwind CSS

Databases

PostgreSQL, MongoDB, Redis, Elasticsearch, Vector DBs

Security Tools

Metasploit, Burp Suite, BloodHound, Mimikatz, Rubeus, Impacket

DFIR Tools

Volatility, FTK, EnCase, Autopsy, Sleuth Kit, KAPE

Cloud & AI/ML

Azure, AWS, GCP, M365, K8s, LangChain, OpenAI, Hugging Face

📚 AUTEUR & FORMATEUR

  • Livres blancs techniques (Tiering Model AD, Windows Server 2025)
  • Articles techniques approfondis
  • Guides pratiques et cas d'usage
  • 20K+ mots d'expertise publiés

💼 SERVICES

  • Audits de sécurité (AD, M365, K8s, Cloud)
  • Tests d'intrusion (Web, Réseau, API)
  • Forensics & Réponse aux incidents
  • Développement solutions IA sécurité
  • Formation et sensibilisation

Intéressé par mes services ?

Passionné par la sécurisation des infrastructures critiques, la recherche en sécurité offensive, le forensics avancé et l'innovation en intelligence artificielle appliquée à la cybersécurité.