Mubark B Jedh
*** ****** ** *** **, Des Moines, Iowa *****@*******.*** 312-***-****
EDUCATION
Iowa State University, Ames, IA Expect Graduation December 2022 Ph.D. Candidate in Secure and Reliable GPA 3.87/4.0 Iowa State University, Ames, IA Graduated: December 2020 Master of Science in Information Assurance GPA 3.92/4.0 Norther Illinois University, DeKalb, IL Graduated: May 2017 Bachelor of Science, Chemistry and Biochemistry and minor in Biology GPA 3.49/4.0 WORK & RESEARCH EXPERIENCE
Graduated Research Jan 2021- Present
• Researched and developed a real time IDS system for anomalous detection.
• Improved in-vehicle cyber resilience using Deep Learning Model.
• Simulated vehicle Adaptive Curies Control using Python. Master thesis detection of injections attack in-vehicles network Feb 2020-Dec 2020
• Researched and developed a Deep Learning model for anomalous detection on the graph
• Collaborated in building effective techniques for attack detection
• Used machine learning & statistical modeling to detect an ongoing attack in connected vehicles data Wright Service Corp West Des Moines, IA
Information Security analysist Intern June 2020 – Jan 2021
• Assisted with vulnerability assessments and penetration testing for specific application
• Assisted with compliance audits against institutionally accepted security controls
• Reviewed, created, and updated documentation for policies, procedures, standards, and guidelines Information Assurance Capstone Design: INFAS 632 December 2020
• Implemented small network for an average corporation: mail server, web server, file upload server, primary and secondary DNS server, Active Directory, Pfsense firewall, and Kali Linux.
• Performed risks and vulnerabilities assessment for the internal network servers.
• Performed penetration testing and network analysis against my network and other student’s networks.
• Created written reports, detailing assessment, findings, and recommendations. TECHNICAL SKILLS
Computer & Programing: C, Unix, Git, Python, HTML, Docker, Neural Network, Data Structure, Analysis Vulnerabilities assessment tools: Nessus, Nmap, Nikto, OpenVAS, Tripwire, Wireshark, Burp Suite Publication
• Jedh, Mubark, "Using messages precedence similarity to detect message injection in in-vehicle network" (2020). Creative Components. 651. https://lib.dr.iastate.edu/creativecomponents/651
• M. Jedh, L. Ben Othmane, N. Ahmed and B. Bhargava, "Detection of Message Injection Attacks Onto the CAN Bus Using Similarities of Successive Messages-Sequence Graphs," in IEEE Transactions on Information Forensics and Security, vol. 16, pp. 4133-4146, 2021, doi: 10.1109/TIFS.2021.3098162. https://ieeexplore.ieee.org/document/9490207 .
EXTRACURRICLUAR
• Active member of the National Society of Black engineers at ISU January 2019-Persent
• Active member of the Information Assurance Student Group January 2019-Persent