Amira Hassan
Khartoum, Nile Street 42
+249 912 445 678 | amira.hassan@email.com
linkedin.com/in/amirahassancybersecurity

PROFESSIONAL EXPERIENCE

Director of Cyber Threat Intelligence
SecureNet Solutions, Khartoum
January 2021 – Present

Lead enterprise-wide cyber threat intelligence program protecting critical infrastructure and sensitive data assets across global operations. Direct a team of 12 threat analysts and researchers responsible for identifying, analyzing, and mitigating advanced persistent threats and emerging attack vectors. Established strategic intelligence sharing partnerships with government agencies, industry consortiums, and peer organizations resulting in 40% improvement in threat detection capabilities. Developed and implemented threat intelligence platform integrating OSINT, HUMINT, and technical indicators to provide actionable intelligence to security operations and executive leadership. Reduced mean time to detect sophisticated threats by 55% through implementation of predictive analytics and machine learning models. Brief C-suite executives and board members on threat landscape trends, risk exposure, and recommended security investments.

Senior Cyber Threat Intelligence Manager
Cipher Technologies, Khartoum
March 2018 – December 2020

Managed team of 8 threat intelligence analysts supporting 24/7 security operations center and incident response activities. Designed and operationalized threat hunting program that identified 23 previously undetected intrusions and prevented estimated $8.5M in potential damages. Collaborated with red team and penetration testing groups to validate threat intelligence and improve defensive capabilities. Produced strategic intelligence assessments on nation-state actors, cybercriminal organizations, and hacktivist groups targeting the financial services sector. Established threat intelligence sharing protocols with FBI, DHS, and FS-ISAC resulting in enhanced situational awareness.

Cyber Threat Intelligence Analyst
Digital Defense Corp, Khartoum
June 2015 – February 2018

Conducted in-depth analysis of malware samples, attack campaigns, and adversary tactics, techniques, and procedures (TTPs) using MITRE ATT&CK framework. Monitored dark web forums, underground marketplaces, and closed-source intelligence channels to identify emerging threats and compromised credentials. Developed custom YARA rules and threat signatures deployed across endpoint detection and network security infrastructure. Produced 150+ tactical and operational intelligence reports distributed to security teams and business stakeholders. Supported incident response investigations by providing threat actor attribution and recommended remediation actions.

IT Security Engineer
InfoGuard Systems, Khartoum
August 2012 – May 2015

Implemented and maintained security infrastructure including firewalls, intrusion detection systems, SIEM platforms, and endpoint protection solutions. Conducted vulnerability assessments and penetration testing to identify security weaknesses in applications and network architecture. Responded to security incidents and performed forensic analysis to determine root cause and scope of compromise. Developed security hardening standards and configuration baselines for Windows and Linux systems. Collaborated with IT operations teams to integrate security controls into cloud migration initiatives.

EDUCATION

Master of Science in Cybersecurity
University of Khartoum, Khartoum
Graduated: May 2012

Bachelor of Science in Computer Science
Sudan University of Science and Technology, Khartoum
Graduated: May 2010

CERTIFICATIONS

GIAC Cyber Threat Intelligence (GCTI)
Certified Information Systems Security Professional (CISSP)
Certified Ethical Hacker (CEH)
GIAC Certified Incident Handler (GCIH)

SKILLS

Cyber Threat Intelligence | Threat Hunting | Malware Analysis | Incident Response | MITRE ATT&CK Framework | STIX/TAXII | Threat Intelligence Platforms | Security Information and Event Management (SIEM) | Intrusion Detection Systems | Digital Forensics | Vulnerability Assessment | Penetration Testing | Risk Assessment | Security Architecture | Python | PowerShell | Network Security | Endpoint Security | Cloud Security | Intelligence Analysis | Strategic Planning | Team Leadership

PROFESSIONAL AFFILIATIONS

Member, Information Systems Security Association (ISSA)
Member, SANS Cyber Threat Intelligence Summit Advisory Board
Speaker, RSA Conference and Black Hat USA