Ahmed Amhdour

AI Trust & Security Readiness Engineer

Hi, My name is Ahmed Amhdour, an AI Trust & Security Readiness Engineer, I am actively seeking freelance and remote opportunities where I can apply this skill set to help teams build secure, resilient AI solutions.

about me image

About

A Self-Taught AI Trust & Security Readiness Engineer

I’m a self-taught AI Trust & Security Readiness Engineer from Morocco, driven by curiosity and a long habit of turning messy questions into clear answers. I was born on August 10, 1981. Even as a kid, I was one of the top students in my school—not because I memorized more, but because I genuinely loved understanding why things work. That curiosity never left. Since 2005, I’ve taught myself full-stack web development and programming from the ground up, purely through practice, research, and building—no degrees, no certificates, just deep work and consistency. From 2005 to 2017, I ran a cyber café. It wasn’t just a business for me—it became a real-world training ground. I was known for researching topics and helping students at every level find what they needed online. That experience shaped a core skill I still rely on today: I can ask the right question, search with purpose, and extract the right answer quickly. I learned how to navigate uncertainty, validate information, and explain complex ideas in simple terms. Today, I apply that same mindset to AI systems—especially where things can go wrong: misuse, prompt injection, unsafe tool use, data leakage, weak guardrails, and “it works in the demo” deployments that collapse in production. I’m focused on making AI reliable and safe to ship: clear policies, strong controls, evidence-based gates, and security-first design. I also bring a rare advantage: I’m exceptionally good at reading people. That helps me understand intent, spot risk patterns, and communicate security decisions in a way that teams actually adopt. My goal is simple: help teams build AI that’s trustworthy by default—quietly, consistently, and with the kind of readiness that protects users and organizations, even when nobody is watching.

Portfolio

Homemade projects to become the best

Acunetixportfolio image

Acunetix

Acunetix

I use Acunetix to analyse websites for potential vulnerabilities so the website can either be attacked or inform the website owner with security solutions.

Burp Suiteportfolio image

Burp Suite

Burp Suite

I use Burp Suite to find vulnerabilities in websites by using their SQL injections, No-Redirect and SSRF tools.

Nmapportfolio image

Nmap

Nmap

I use Nmap to analyse Website and Server details like Port statuses in order to inform owners about closing ports that can potentially be exploited.

Wiresharkportfolio image

Wireshark

Wireshark

I use Wireshark to analyse incoming network traffic and investigate handshake packets.

SQLMapportfolio image

SQLMap

SQLMap

I use SQLMap to retrieve Database and Admin Panel information of SQL enabled website.

Services

One of my finest specialties

Network Attacks

I'm able to use some powerful set of tools and methods like Airmon-ng, Evil Twin, Bruteforce, Wireshark and Mitm. These allow me to conduct a range of attacks and analysisses on networks, identify vunerabilities and potential entry points for unauthorized access.

Password Attacks

I'm able to use multiple techniques in order to attack passwords like Cryptography, Pass-The-Hash, Bruteforce and Phising attacks. These allow me to intercept accounts with the so called secure passwords.

Website Attacks

I'm able to use vulnerabilities to my advantage like SQL- and XSS injections, SSRF, No-Redirect, Wordpress vulnerabilities and Web Shells. These allow to gain unauthorized access to Databases, Admin panels and Server Backdoors.

Server Attacks

I'm able to use powerful set of tools and methods like DNS Floods, TCP/UDP attacks, Nmap, FTP/SSH attacks and Firewall Bypasses (Nmap). These allow me to gain unauthorized access to servers and clients and put them offline.

Skills

Mastering skills that are beyond legal

Network Mapper90%
Professional
5 years experience
Brute Force Attacks90%
Professional
4 years experience
Linux (Debian)70%
Intermediate
8 years experience
Acunetix70%
Intermediate
2 years experience
Injection Attacks50%
Intermediate
3 years experience
Burp Suite40%
Beginner
1 years experience
Python30%
Beginner
1 years experience

Experiences

Work Experience

2021

Cyber Security Intern

Ecodation

My activities as a Intern Cyber Security Specialist at Ecodation were to research the following sections within Cyber Security:

  • The importance of Cyber Security in organisations.
  • Workgroup & Active Directory.
  • ISO 27001.
  • The current GDPR laws.
  • LAN, WAN & VLAN.
  • VPN, IPSEC-VPN, MPLS-VPN & Site-to-Site VPN Concepts.
  • TCP & UDP ports, Inbound- and Outbound Rules.
Certificates

Experiences

Education

2018 - 2022

International Trade

Necmettin Erbakan University

Even though I already had interests within the Cyber Security field, I wanted to learn the soft skills of International Trading in order to improve myself and keep it as a back-up plan in case we are doomed by Artificial Intelligence.

Experiences

Courses

2021

Ecodation Cyber Security

Ecodation

While taking the Ecodation Cyber Security Course, I was tested on the following sections:

  • The importance of Cyber Security in organisations.
  • Linux OS Virtual Machines.
  • Penetration Testing.
  • Network Analysis.
  • Exploring some Server Services.
  • Cloudcomputing.
Certificates
2022

BTK Academi DDOS

BTK Akademi

While taking the BTK Academi DDOS Course, I was tested on the following sections:

  • DNS Flood.
  • SYN-ACK Flood.
  • Practising DDOS.
Certificates

Contact

Lets drink some coffee and get to know each other better

© Copyright 2026 Rauf Kaya. All Rights Reserved