Mohsin Habib Osman

Mohsin Habib Osman

Cybersecurity Specialist | Aviation & Infrastructure Security

As a Cybersecurity Professional specializing in threat detection and incident response, I bridge the gap between secure systems development and proactive defense. My background is defined by high-standard environments, having earned the Google Cybersecurity Professional Certificate and completed rigorous training at the Ethiopian Aviation University, where I maintained a 98% grade standard in security awareness.

During my specialized internship at INSA, Ethiopia’s premier digital security agency, I developed a disciplined approach to monitoring and defending critical infrastructure. This experience, combined with hands-on training from ALX and TryHackMe, has equipped me with the analytical skills required for high-stakes **SOC Analyst** roles—including vulnerability assessment, log analysis, and the implementation of robust defensive frameworks.

My objective is to secure the digital landscape in the post-AI era by consolidating and protecting critical data. I leverage technical proficiency in Python, Linux, SQL, and Full-Stack development to automate security tasks and stay ahead of evolving threat vectors.

What I'm Doing

Cybersecurity

I perform ethical hacking and implement defenses to protect critical infrastructure from evolving threats.

Data Security

I specialize in securing sensitive information to ensure privacy and integrity in high-stakes environments[cite: 4].

Penetration Testing

I enjoy simulating attacks and exploiting weaknesses to provide remediation advice for organizations.

Professional Exposure

Ethiopian Airlines Aviation University
INSA National Security Intern

Resume

Weekend Cybersecurity Intern

Remote / Addis Ababa, Ethiopia • 2025 – Present
  • Currently working part-time on weekends in a cybersecurity operations role.
  • Assisting with monitoring, basic incident response, and vulnerability assessment tasks.
  • Gaining practical exposure to real-world security operations and tools in a production environment.
  • Collaborating with team members to document findings and support ongoing security initiatives.

Cybersecurity Intern

INSA (Ethiopian Information Network Security Agency) • Addis Ababa, Ethiopia • Summer 2025
  • Participated in hands-on cybersecurity operations and network security monitoring.
  • Assisted in identifying potential vulnerabilities and analyzing security logs and alerts.
  • Supported incident handling processes and contributed to basic threat detection activities.
  • Learned national-level security practices and Ethiopian cybersecurity frameworks.
  • Worked with industry-standard tools for reconnaissance, scanning, and reporting.

Cybersecurity Trainee / Labs Specialist

Try Hack Me & Self-Study • Remote / Ethiopia • 2024 – Present
  • Completed multiple Try Hack Me learning paths and challenge rooms focused on ethical hacking, web exploitation, network security, and defensive techniques.
  • Gained hands-on proficiency with industry tools: Nmap, Burp Suite, Wireshark, Metasploit, Kali Linux.
  • Developed Python scripts for security automation, log analysis, and custom tooling.
  • Applied secure coding practices from Google Front-End and ALX training to personal projects.

Front-End Development Trainee

ALX Africa & Google Coursera • Remote • 2024 – Present
  • Built responsive web interfaces using HTML, CSS, and JavaScript.
  • Learned secure development fundamentals and basic version control workflows.
  • Created personal projects including a Habit Tracker application in Python.
  • Explored secure coding practices to align with cybersecurity interests.

Education

  • Addis Ababa Science and Technology University | Addis Ababa, Ethiopia | 2021 – 2025
  • Field of study: Bachelor’s Degree in Engineering

Certifications & Non-formal Education

  • Try Hack Me – Various Cybersecurity Paths & Rooms (2024–Present)
  • ALX Africa – Tech & Cybersecurity Foundations (2024–Present)
  • Google Front-End Development Professional Certificate (Coursera, In Progress / Completed 2024)
  • Self-studied: Python programming, Ethical Hacking basics, Network fundamentals

Portfolio & Credentials

Google Cybersecurity Certificate
Google

Google Cybersecurity Professional Certificate

Completed 9 courses covering Python, Linux, SQL, SIEM tools, and IDS. Specialized in identifying risks, threats, and mitigation techniques.

Verify
ALX Cybersecurity
Cybersecurity

ALX Cybersecurity Programme

Completed 13-week intensive training in ethical hacking and threat detection.

Verify
EAU Refresher
Aviation Security

Cyber Security Awareness Refresher

Final Exam Grade: 98.00.

GRADE: 98.00
THM Advent
Badges

THM Advent of Cyber 2025

Successfully completed 24 cybersecurity challenges demonstrating tenacity.

Foundations of Cybersecurity
Google

Foundations of Cybersecurity

Core concepts of security, including the CIA triad and security frameworks.

Verify
Manage Security Risks
Google

Play It Safe: Manage Security Risks

Identifying threats and vulnerabilities through risk management strategies.

Verify
Network Security
Google

Connect and Protect: Network Security

Protecting networks through protocols, firewalls, and secure infrastructure.

Verify
Linux and SQL
Google

Tools of the Trade: Linux and SQL

Hands-on experience with Linux command line and SQL database queries.

Verify
Assets and Threats
Google

Assets, Threats, and Vulnerabilities

Analyzing security posture and classifying sensitive organizational assets.

Verify
Detection and Response
Google

Sound the Alarm: Detection and Response

Using SIEM and IDS tools to monitor and respond to security incidents.

Verify
Python for Security
Google

Automate Security Tasks with Python

Automating repetitive security tasks through custom Python scripts.

Verify
Career Prep
Google

Put It to Work: Prepare for Jobs

Engaging in incident response scenarios and building professional presence.

Verify
AI Job Search
Google

Accelerate Your Job Search with AI

Leveraging AI tools to optimize career development and search strategies.

Verify
Microsoft Frontend
Microsoft

Hotstar Clone Frontend Bootcamp

Completion of HTML, CSS, and JavaScript training.

Google Frontend
Google GDSC

Frontend Development

Built high-fidelity clones using modern web technologies.

AWS Backend
AWS

Backend Web Development

Node.js, JavaScript, and Express fundamentals.

EAU Online
Aviation Security

Cyber Security Awareness Online Course

Completed December 8, 2025 at Ethiopian Aviation University.

Google Backend
Google GDSC

Backend Web Development

Comprehensive training in server-side JavaScript and Node.js.

1.2 BILLION TARGETS

High-Value Data at Risk

Threat Analysis Feb 07, 2026

Africa's Data Gold Rush: Why Hackers Are Already Circling 1.2 Billion Lives

In the age of AI, data is no longer just information — it is the most powerful weapon on earth. With over 1.2 billion people, Africa holds the single largest untapped data reservoir humanity has ever seen. Every birth, transaction, location ping, health record, and conversation is raw fuel for algorithms that can predict, manipulate, and control entire populations.

But here is the brutal reality: our data is already under siege.

Foreign cloud providers, unvetted third-party apps, leaky APIs, and poorly secured national systems mean that African personal and sovereign data is flowing freely into the hands of cybercriminals, state-sponsored hacking groups, and AI-driven threat actors. Once harvested, this data is weaponized — for identity theft at scale, blackmail operations, targeted disinformation campaigns, financial fraud, election interference, and even physical infrastructure sabotage.

As a Cybersecurity Specialist who has trained at INSA, worked in aviation security environments, and hunted vulnerabilities on platforms like TryHackMe, I see the same pattern repeating: speed of exploitation far outpaces speed of defense. Hackers don’t need to break strong encryption — they just need one weak link: a misconfigured S3 bucket, an exposed RDP port, a phishing email that lands in the right inbox.

If we continue outsourcing our digital sovereignty to foreign clouds and untrusted vendors, we are not just risking privacy — we are handing the keys to our future to the highest bidder or the most aggressive state actor.

1.2B+

High-Value Identities

98%

Awareness Gap

Contact

Availability

Open for Opportunities

Direct Reach

Verified Security Specialist at INSA & Ethiopian Aviation University.

Secure Message Terminal

All systems operational
Status Uptime Monitor