Skip to content
View FilAmine's full-sized avatar

Block or report FilAmine

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
FilAmine/README.md

LinkedIn GitHub


πŸ›‘οΈ About Me

"Security is not a product, but a process." β€” Bruce Schneier

I am a Cybersecurity Engineer specializing in Risk Management, GRC (Governance, Risk & Compliance), and AI-powered threat detection. My work bridges traditional security frameworks with cutting-edge machine learning approaches to tackle modern cyber threats.

  • πŸ” Specialization: EBIOS Risk Manager | ISO 27001/27005 | NIS2 | DORA
  • πŸ€– Research: AI/ML for Cybersecurity β€” IoT Malware Detection, Anomaly Detection
  • ☁️ Cloud Security: Azure Security Architecture, DevSecOps
  • πŸ“Š GRC: Risk Assessment, Compliance Automation, Security Governance

πŸš€ Featured Projects

Applied EBIOS Risk Manager methodology across multiple critical sectors

Case Study Sector Framework Focus
AXA Cloud Azure Insurance / Finance EBIOS RM + CSP Cloud Risk Assessment
Banque SPI DORA Banking EBIOS RM + DORA Digital Operational Resilience
TransRail SupplyChain Transport EBIOS RM Supply Chain Attack Scenarios

Comparative study of supervised vs self-supervised approaches on CICIoT2023 dataset

# Key Results β€” IoT Malware Detection Performance
models = {
    "Supervised CNN":         {"accuracy": 0.982, "F1": 0.981},
    "ViT Supervised":         {"accuracy": 0.979, "F1": 0.977},
    "Self-Supervised SimCLR": {"accuracy": 0.961, "F1": 0.958},
    "Random Forest Baseline": {"accuracy": 0.945, "F1": 0.944},
}

Cloud Governance, Risk & Compliance automation platform


πŸ› οΈ Technical Arsenal

πŸ” Security & GRC

EBIOS RM ISO 27001 DORA NIS2

πŸ€– AI / Machine Learning

Python TensorFlow PyTorch Scikit-Learn

☁️ Cloud & DevSecOps

Azure Docker GitHub Actions


πŸ“Š GitHub Analytics


🎯 Cybersecurity Expertise

╔══════════════════════════════════════════════════════════════╗
β•‘               CYBERSECURITY EXPERTISE MAP                    β•‘
╠══════════════════════════════════════════════════════════════╣
β•‘  GRC & Risk Management                                       β•‘
β•‘  β”œβ”€β”€ EBIOS Risk Manager (ANSSI)        β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆ 95%     β•‘
β•‘  β”œβ”€β”€ ISO 27001/27005                   β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–‘ 90%     β•‘
β•‘  β”œβ”€β”€ DORA (Digital Operational Res.)   β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–‘β–‘ 85%      β•‘
β•‘  └── NIS2 Directive                    β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–‘β–‘β–‘ 80%     β•‘
β•‘                                                              β•‘
β•‘  AI for Cybersecurity                                        β•‘
β•‘  β”œβ”€β”€ Malware Detection (ML/DL)         β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–‘ 90%     β•‘
β•‘  β”œβ”€β”€ Anomaly Detection                 β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–‘β–‘ 85%      β•‘
β•‘  β”œβ”€β”€ Vision Transformers (ViT)         β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–‘β–‘β–‘ 80%     β•‘
β•‘  └── Self-Supervised Learning          β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–‘β–‘β–‘β–‘ 70%     β•‘
β•‘                                                              β•‘
β•‘  Cloud Security                                              β•‘
β•‘  β”œβ”€β”€ Azure Security Architecture       β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–‘β–‘ 85%      β•‘
β•‘  β”œβ”€β”€ DevSecOps / CI-CD Security        β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–‘β–‘β–‘ 80%     β•‘
β•‘  └── Supply Chain Security             β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–‘β–‘β–‘ 80%     β•‘
β•šβ•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•

πŸ”¬ Research β€” IoT Malware Detection Results

Dataset: CICIoT2023 | Attack Types: DDoS, DoS, Recon, Mirai, Spoofing, Web Attacks + Benign

Model Accuracy F1-Score Approach
CNN 98.2% 98.1% Supervised
ViT 97.9% 97.7% Supervised
SimCLR 96.1% 95.8% Self-Supervised
Random Forest 94.5% 94.4% Baseline

Key Insight: Self-supervised methods achieve competitive performance (~96%) without requiring fully labeled data β€” critical for real-world deployments where labeled IoT traffic is scarce.


"Securing the digital future, one risk assessment at a time."

Popular repositories Loading

  1. FilAmine FilAmine Public

    Config files for my GitHub profile.

  2. DevOps DevOps Public

    Azure

  3. pipelines-java pipelines-java Public

    Forked from MicrosoftDocs/pipelines-java

    Sample Java application referred to by Azure Pipelines documentation

    Java

  4. python-sample-vscode-flask-tutorial python-sample-vscode-flask-tutorial Public

    Forked from microsoft/python-sample-vscode-flask-tutorial

    Sample code for the Flask tutorial in the VS Code documentation

    HTML

  5. pipelines-dotnet-core pipelines-dotnet-core Public

    Forked from MicrosoftDocs/pipelines-dotnet-core

    A simple ASP.NET Core MVC app for Azure Pipelines docs

    HTML

  6. adodemo adodemo Public

    Forked from shuklatechsoft/adodemo

    adodemo

    C#