
Student Profiles - Fall 2024 MCTI
Masters of Cybersecurity and Threat Intelligence Graduate Student Profiles
The importance of robust cybersecurity staffing cannot be understated.
To address this critical need, the Master of Cybersecurity and Threat Intelligence program at the University of Guelph equips graduates with the knowledge and skills to protect organizations from evolving threats.
We invite you treview the talented pool of students who are ready to contribute to the security of your company via Mitacs. Visit below to to explore our student profiles.

Banafshe Javaheri Vayghan
Overview: Banafshe is passionate about cybersecurity and protecting digital assets. She specializes in threat analysis, network security, and incident response. Banafshe is dedicated to learning and applying new solutions to keep data safe. Her goal is to help create a secure digital environment for everyone.
Skills/Projects: • Threat Analysis • Network Security • Incident Response • Vulnerability Assessment • Security Auditing • Penetration Testing • Cryptography • Security Information and Event Management (SIEM) • Data Analysis with python • Machine Learning Completed Projects: • Malware classification project • Monoalphabetic substitution cipher solver

Sarina Dastgerdy
Overview:
Passionate about cryptography, algorithm development, and the application of machine learning in cybersecurity. With a robust background in computer engineering and extensive experience in both theoretical and applied cryptographic techniques, she aims to develop innovative cryptographic solutions and enhance security protocols. Additionally, she leverages machine learning to improve threat detection and analysis. Her goal is to contribute to the cybersecurity field by designing secure algorithms and utilizing machine learning to protect sensitive data and communication.
Skills/Projects:
During the cryptography course, applied number theory concepts for cryptography and cryptanalysis. Developed a web-based Galois field calculator to bridge gaps in existing tools and conducted a presentation on quantum computing and data transmission security, assessing the BB84 protocol.
In the Cyber Threat Intelligence and Adversarial Risk Analysis course, conducted static and dynamic malware analysis using tools like PEStudio, Procmon, Regshot, and Wireshark, as well as IDA Pro and OllyDbg for deeper malware functionalities. For the final project, participated in the Google Malware Classification Competition, developing a malware classification model using XGBoost with 99.8% accuracy on a subset of a 0.5 terabyte dataset. Additionally, analyzed malware and goodware samples using the Cuckoo sandbox, extracted features with a Python script, and generated datasets for machine learning, focusing on feature extraction
Shari-Ann Smith-Haynes
Overview:
Driven by a deep passion for technology and an innate investigative nature, Shari-Ann aims to become an expert in the cybersecurity industry. She embarked on this career path to leverage her skills in identifying and mitigating security threats. Committed to continuous learning, Shari-Ann strives to protect organizations from cyber threats and vulnerabilities. Her goal is to advance cybersecurity through innovative solutions and diligent research, making a significant impact in the field.
Skills/Projects:
Shari-Ann acquired a comprehensive set of skills through her experience in various areas of cybersecurity. She gained a better understanding of Malware Analysis and Threat Detection, mastering reverse engineering techniques and developing a deep understanding of different types of malware. Proficient in both dynamic and static analysis of malicious software, she utilizes tools such as IDA Pro, OllyDbg, and Wireshark. One of her notable projects includes analyzing a piece of malware to identify its behavior, extracting Indicators of Compromise (IoCs), and creating a detailed report on its potential impact.
In the field of Basic Cryptography, Shari-Ann developed a solid understanding of fundamental cryptographic principles and techniques. She worked on projects involving encrypting and decrypting data using various algorithms and understanding the implementation of cryptographic protocols. This knowledge helps her ensure data confidentiality, integrity, and security in different cybersecurity scenarios.
Additionally, Shari-Ann applied machine learning algorithms to cybersecurity problems, mastering processes such as data preprocessing, feature selection, model training, and evaluation. With experience in tools like Python and Scikit-Learn, she created a phishing detection model as part of her projects, demonstrating her ability to effectively classify malware families. Through these diverse experiences, she continues to enhance her skills and contribute significantly to the field of cybersecurity.

Krutarth Chauhan
Overview:
Krutarth Chauhan is dedicated to safeguarding digital landscapes and ensuring data integrity. With a focus on threat analysis and vulnerability assessment, he specializes in ethical hacking and penetration testing to identify and mitigate security risks. His goal is to protect critical infrastructure and enhance organizational security using advanced technologies and innovative solutions. Krutarth is committed to continuous learning and staying current with the latest cybersecurity trends and techniques.
Skills/Projects:
Penetration Testing
Social Engineering
Phishing Awareness
Virtualization Security and Management
Malware Analysis
Network Security
Hardware Management
1.Penetration testing
Conducted a penetration test to identify critical vulnerabilities including SQL injection, Cross-site scripting, OS command injection, Clickjacking etc. Successfully exploited vulnerabilities to gain access level and compromised the system. Delivered a comprehensive report detailing findings, remediation steps, and security recommendations.
2.Malware Analysis Project
Analyzed a collection of malware samples using a combination of static and dynamic analysis techniques. Employed tools like Cuckoo Sandbox, VirusTotal, IDA Free to identify characteristics, functionality, and potential impact. Documented findings in a comprehensive report including mitigation strategies.
3.Set up a Virtual Network Lab
Utilized tools like VMware to create a virtual network lab environment. Experimented with various security tools and techniques in a safe and controlled setting.

Shehryar Malik
Overview:
Shehryar's goal is to leverage cutting-edge technologies to enhance cybersecurity and safeguard the digital environment. With a background in security analysis, cyber threat hunting, and penetration testing, he is dedicated to identifying and mitigating potential threats based on vulnerabilities. His aim is to advance his expertise in cyber threat intelligence, committing to gaining more knowledge about emerging cyber threats and helping companies achieve secure infrastructures.
Skills/Projects:
Digital Forensic, Cryptographic Techniques, Cyber Threat Hunting and Penetration Testing
Key Project: Mitigating Elevator Malfunctions Through Digital Forensic Analysis
Description: The project focused on mitigating elevator malfunctions through digital forensic analysis. By collecting and analyzing logs from the elevator control system and associated systems, we identified software bugs, network issues, and potential cyber-attacks as root causes. Mitigation strategies included applying software patches, enhancing network security, and setting up continuous monitoring. The outcomes were a significant reduction in malfunctions, improved system reliability, and better incident response capabilities.

Vatsal Patel
Overview:
Vatsal is a dedicated enthusiast in the field of cybersecurity, with a keen interest in exploring emerging technologies and evolving threats. His goal is to contribute to creating a safer digital environment by leveraging their expertise in threat detection, incident response, and proactive security measures. With a passion for continuous learning and innovation, Vatsal aims to stay at the forefront of cybersecurity developments and make meaningful contributions to the industry.
Skills/Projects:
Vulnerability Assessment
Network Security
Incident Response
Penetration Testing
Testing and debugging skills
Server management
Monoalphabetic Cipher Implementation - Developed a python program to implement a monoalphabetic cipher for encrypting and decrypting text.
