
Student Profiles - Fall 2024 MCTI Research
Masters of Cybersecurity and Threat Intelligence Graduate Student Profiles
The importance of robust cybersecurity staffing cannot be understated across all disciplines.
To address this critical need, the Master of Cybersecurity and Threat Intelligence program at the University of Guelph equips graduates with the knowledge and skills to protect organizations from evolving threats.
We invite you review the talented pool of students who are ready to contribute to research opportunities. Visit below to to explore our student profiles.

Banafshe Javaheri Vayghan
Overview: Banafshe is passionate about cybersecurity and protecting digital assets. She specializes in threat analysis, network security, and incident response. Banafshe is dedicated to learning and applying new solutions to keep data safe. Her goal is to help create a secure digital environment for everyone.
Skills/Projects: • Threat Analysis • Network Security • Incident Response • Vulnerability Assessment • Security Auditing • Penetration Testing • Cryptography • Security Information and Event Management (SIEM) • Data Analysis with python • Machine Learning Completed Projects: • Malware classification project • Monoalphabetic substitution cipher solver

Shehryar Malik
Overview:
Shehryar's goal is to leverage cutting-edge technologies to enhance cybersecurity and safeguard the digital environment. With a background in security analysis, cyber threat hunting, and penetration testing, he is dedicated to identifying and mitigating potential threats based on vulnerabilities. His aim is to advance his expertise in cyber threat intelligence, committing to gaining more knowledge about emerging cyber threats and helping companies achieve secure infrastructures.
Skills/Projects:
Digital Forensic, Cryptographic Techniques, Cyber Threat Hunting and Penetration Testing
Key Project: Mitigating Elevator Malfunctions Through Digital Forensic Analysis
Description: The project focused on mitigating elevator malfunctions through digital forensic analysis. By collecting and analyzing logs from the elevator control system and associated systems, we identified software bugs, network issues, and potential cyber-attacks as root causes. Mitigation strategies included applying software patches, enhancing network security, and setting up continuous monitoring. The outcomes were a significant reduction in malfunctions, improved system reliability, and better incident response capabilities.

Vatsal Patel
Overview:
Vatsal is a dedicated enthusiast in the field of cybersecurity, with a keen interest in exploring emerging technologies and evolving threats. His goal is to contribute to creating a safer digital environment by leveraging their expertise in threat detection, incident response, and proactive security measures. With a passion for continuous learning and innovation, Vatsal aims to stay at the forefront of cybersecurity developments and make meaningful contributions to the industry.
Skills/Projects:
Vulnerability Assessment
Network Security
Incident Response
Penetration Testing
Testing and debugging skills
Server management
Monoalphabetic Cipher Implementation - Developed a python program to implement a monoalphabetic cipher for encrypting and decrypting text.

Thomas Tran
Overview:
Excited about cybersecurity and its emerging applications, Thomas aims to place himself at the forefront of new developments in the field. With a strong foundation in computer science and a focus on penetration testing, he aims to leverage his skills to make meaningful contributions to the field. Committed to continuous learning, he is not afraid of uncharted territory and will do what it takes to research, innovate, and succeed. His goal is to learn how new cyber threats arise and how they operate, from both a defensive and offensive side.
Skills/Projects
Penetration Testing - Performed various model penetration test challenges to exploit a machine running a firewall and a vulnerable application. Executed privilege escalation via buffer overflow to gain admin access to the machine, set up persistence via backdoor, and continued reconnaissance to steal passwords and target machine data with the use of metasploit, scrapper tools, and a keylogger.
Malware Analysis - Used both static and dynamic malware analysis techniques on malware samples using tools like Cuckoo Sandbox, Wireshark, and IDA Pro to examine their functionality. Created a malware classification model out of samples by extracting features, forming datasets, and utilizing machine learning techniques to classify them based on features.
Digital Forensics, Network Security
