Alyssa's Resume
.01

ABOUT

PERSONAL DETAILS
Ariana, Gouvernorat de l'Ariana
alyssa.berriche@digitalys-mag.net
www.digitalys-mag.net
Hello. I am a Cyber Security Engineer Security Researcher Geek Dreamer Leader
I am passionate about CyberSecurity.
Welcome to my Personal profile
Currently works as Cyber Threat Analyst

BIO

ABOUT ME

I am recently graduated from the National Institute of Applied Sciences and Technologies.

I am always seeking new challenges where I can best improve my working capacities, my technical skills and share my knowledge while interacting with others.

My various experiences within companies as EY , OOREDOO and associations as SECURINETS and JCI, gave me varied skills and the ability to work with many different types of people.

I work currently as an Cyber Security Consultant on the IT Advisory Services of Ernst & Young.

HOBBIES

INTERESTS

I like writing articles about plenty of topics like pets, movies, culture, books, tutorials, security and hi-tech news, covering cultural and technological events. I used to write my articles in INSAT-press and other sites. Now, I publish my articles in my personal website www.digitalys-mag.net

I love exploring and researching the latest technologies (virtualization, smartphones, cloud, softwares,...)and security news (new vulnerabilities, new security solutions, tools, ...).

I used to play piano to more than 10 years then I switched to cello. Other than this, I learnt music for 7 years and i got the Oriental Music Diploma in 2009.

I love pets very much, I like playing with them and taking care of them. I adopted many stray animals like cats and birds.

I am a book worm. I'm keen on reading books in english, french or arabic. I read scientific, cultural, psychological books and detective novels.

For many years, I've been fan of the asian culture especially Japanese culture. Reading Manga (comics in Japanese) is among my favorite hobbies. I also have done few cosplays of anime characters.

FACTS

NUMBERS ABOUT ME

13
YEARS OF MUSIC PLAYING
28
PROJECTS COMPLETED
7
WEBSITES DONE
2
VLOGS
3
COSPLAYS
34
ADOPTED PETS

.02

RESUME

  • EDUCATION
  • 2016
    2013
    Tunisia

    Networking and Telecommunications Engineering

    INSAT

    3 years: studying computer networks and telecommunications engineering with IT Security specialty.
  • 2013
    2011
    Tunisia

    Engineer foundation studies Mathematics, Physics and Computer Science

    INSAT

    2 years: studying scientific preparation: Mathematics, Physics and Computer Science.
  • 2011
    2010
    Tunisia

    High school (or bac) diploma, Mathematics

    Khaireddine Pacha High School

    I Obtained my baccalaureate with grade A pass.
  • 2010
    2009
    Tunisia

    Early baccalaureate exams

    PIERRE MANDES FRANCE

    I passed the written and oral tests.
  • EXPERIENCE
  • Sep2016
    Now
    Tunisia

    Cyber Security Consultant

    EY (ERNST & YOUNG)

    Performing multiple internal and external Penetration testing missions for web and mobile applications and networks.

    Performing IT related risk assessments.

    Analysis of security incidents to investigate any potential breach.

    Contributing in a data Analytics & Data mining project dedicated to Healthcare.

  • June2016
    Feb 2016
    Tunisia

    Cyber Threat Intelligence Trainee

    EY (ERNST & YOUNG)

    The Implementation of Cyber Threat Intelligence Management system based on open source frameworks and feeds.
  • Aug 2015
    July 2015
    Tunisia

    Penetration Tester Trainee

    EY (ERNST & YOUNG)

    Performing multiple external Penetration testing missions for web and mobile applications using OWASP methodolody.
  • July 2014
    July 2014
    Tunisia

    IT Security Trainee

    Tunisie Telecom

    The implementation of architecture operating the various types of VPN: Site-to-site, client-to-site (IPsec, SSL).
  • Aug 2013
    Aug 2013
    Tunisia

    IT Trainee

    OOREDOO

    The development of Business Intelligence (BI) android application.
.03

SKILLS

SECURITY
I've been keen on searching in the security field since the year of my baccalaureate.
LEVEL : ADVANCED
Threat IntelligencePenetration TestingHigh AvailabilityIDS/IPS
Reverse EngineeringFirewallingVPNVulnerability Scanning
Networking
I began learning about networks since the 2nd year in INSAT. Then, on 2015, I got my CCNA certifications.
LEVEL : ADVANCED
Router & switchs configPacket AnalysisNetwork Administration
Programming
I've been programming for around 7 to 8 years. I started with basic concept then I learnt OOP and designing patterns.
LEVEL : INTERMEDIATE
C/C++Java/J2EEphpAndroidPythonShell Scripting
PhoneGapwordpressdrupalmeteor frameworkGoogle AppEngine
Other Technical SKILLS
Virtualization
LEVEL : INTERMEDIATE
VMWare (workstation, esxi)VirtualBoxDocker
OS
LEVEL : ADVANCED
Windows XP,7Windows Server 2008Linux
Databases
LEVEL : INTERMEDIATE
MySQLSQL Server 2008SQL LiteSQL Lite
OFFICE I have been using office suite for many years. Now, I fully mastered it.
LEVEL : ADVANCED
Ms officeOpen officeLatex
Languages
Since my early age I learnt different languages. Now, I can talk fluently in Arabic, french, English and I can hold a simple conversation in Japanese. Arabic
LEVEL : ADVANCED
ReadingWritingSpeakingListening
French
LEVEL : ADVANCED
ReadingWritingSpeakingListening
English
LEVEL : ADVANCED
ReadingWritingSpeakingListening
Japanese
LEVEL : BEGINNER
SpeakingListening
.04

CERTIFICATIONS

MY CERTIFICATIONS

ISO 27001 PI

The participants gain the necessary expertise to support an organization in implementing and managing an ISMS based on ISO/IEC 27001:2013.

  • Introduction to ISMS concepts as required by ISO/IEC 27001; Initiating an ISMS
  • Planning the implementation of ISMS based on ISO/IEC 27001
  • Implementing ISMS based on ISO/IEC 27001
  • Controlling, monitoring, measuring and improving an ISMS; certification audit of the ISMS

CloudU

CloudU is designed for technical professionals who want to boost their knowledge of the fundamentals of Cloud Computing.

  • Revolution Not Evolution
  • Cloudonomics
  • The Cloud Computing Stack SaaS, PaaS, IaaS
  • Say Goodbye to DIY Data Centers
  • Planning a Move to the Cloud
  • Running a Business on the Cloud
  • Creative Configurations
  • You Want to Put My Database Where

CCNA Security 2.0

CCNA Security demonstrates the skills required to develop a security infrastructure, recognize threats and vulnerabilities, and mitigate security threats.

  • Modern Network Security Threats
  • Securing Network Devices
  • AAA
  • Implementing Firewalls
  • Implementing IPS
  • Securing the LAN
  • Cryptographic Systems
  • Implementing VPN
  • Implementing the Cisco ASA
  • Managing a Secure Network

CCNA Exploration

The CCNA Routing and Switching programme can be completed as four separate modules.

Modules

  • CCNA 1: Introduction to Networks
  • CCNA 2: Routing and Switching Essentials
  • CCNA 3: Scaling Networks
  • CCNA 4: Connecting Networks

TOIEC

On May 2016, I got a gold colored TOIEC certification with the score of 890 out of 990.

  • Listening
  • Part 1: Photographs
  • Part 2: Question-Response
  • Part 3: Conversations
  • Part 4: Short Talks
  • Reading
  • Part 5: Incomplete Sentences
  • Part 6: Error Recognition or Text Completion
  • Part 7: Reading Comprehension
.05

TEAMWORKS

I worked with many teams such as:

Securinets

IT Security Club

I worked with securinets club from 2011 to 2016. I worked with different staff each year. On 2014, I was technical lead and, on 2015, I was the club president.

JCI INSAT

ONG

I was an active member in JCI INSAT during 2013-2014. I participated in the organization of two actions Multicultural Day and the day dedicated to the Integration of new members.

INSAT-press

press club

During 2013-2014, I was used to write some articles (events coverage) in INSAT-press.

Tunirobots

National Robotics Day

For two years (2012 to 2014), I worked with Tunirobots Team for the organization of two editions. I was part of the mediatization team.

Japanese Events in Tunisia (JET)

Japanese cultural organization

From 2014 up to 2016, I was the webmaster of the JET organization. I developped several websites for the organizations' events such as Japanimason 2014 or Banzai 2014, 2015.

I participated in big events such as:

Jam Session

INSAT Cine-radio club

On March 2014, I participated in the Jam Session of Cine-radio club. I was the cellist of my team.

217 Event

IT Day

On February 2015, I participated in 217Event as Cyber-criminality and forensics speaker.

Hackfest

National Cybersecurity Day

I participated with the team securinets in the first edition of Tunisian Hackfest. We got 2nd place in the CTF(Capture the Flag).

Hackparty I

National Cybersecurity Day

On 7th March 2015, I participated in the first edition of the hack-party as Cybercriminality speaker.

For more details about the event.

All Stars Challenge

IT Day

On 21st February 2016, I participated in All Stars Challenge as Cryptography lecturer.

.06

PROJECTS

img11
Android Dev

SeQRinets

img

SeQRinets

The project consists of developping an ANDROID application for the automation of our club members' presence via a QR scanner and a CLOUD database accessible only by staff members.

img11
dev, scripting

Securilive 4.0

img

Securilive 4.0


Securilive is a Linux distribution, that focus on security and INSAT's students needs, based on the Ubuntu Linux distribution. In April 2014, the version 4.0 is released.

img11
Security

Security Policy

img

Implementing of Security Policy for a Bank

During our academic cursus, we were driven to establish a security policy for a virtual organization. As for our group, we chose a bank case.

img11
web dev

Japanimason Website

img

Japanimason Website

The website was created to give detailed information about the Japanimason 2014 Event.

img11
web dev

JET Website

img

JET Website

The official website of the Japanese Events in Tunisia (JET) organization. The website available in two different languages (fr/en).

img11
web dev

Banzai Website

img

Banzai Website

The website was created to give detailed information about Banzai event. It also manages the different inscriptions for the event's activities.

img11
web dev

Fatalys-mag

img

Fatalys-mag

This webmag is created to write articles in several fields such as culture, philosophy, litterature, tourism,...

img11
web dev

Digitalys-mag

img

Digitalys-mag

This is my personal webmag, which is created in order to publish articles that deal with many topics especially HI-tech, security, media coverage of scientific events but also entertaining subjects.

Other Projects

Setting up a recovery plan for an SME (PRA).

Implementation of high availability solution based on open source tools (heartbeat).

Detection of Peer-to-peer Botnets using network traffic mining (supervised data-mining algorithms).

.07

PUBLICATIONS

img11
Security

Cyber Threat Intelligence Project Presentation

My internship presentation

img11
Security

Cyber Security Trends for 2016

Cyber Security Trends for 2016

img11
Security

Cryptography

Cryptography

img11
Security

Cyber-criminality

Cyber-criminality

img11
Security

Bypassing Windows authentication

Bypassing Windows authentication

img11
Security

Introduction to Steganography

Introduction to Steganography