0% found this document useful (0 votes)
107 views1 page

Michelle Pantelouris: Contact Profile

Michelle Pantelouris is an AI engineer and cyber security penetration testing intern with experience developing AI tools for cybersecurity. She has expertise in machine learning, penetration testing, and digital forensics. Currently, she is interning as a penetration tester and previously worked as an AI engineer developing threat detection solutions. She holds an MEng in Cyber Security and BEng(Hons) in Cyber Security from the University of the West of Scotland.

Uploaded by

gourav Gupta
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
107 views1 page

Michelle Pantelouris: Contact Profile

Michelle Pantelouris is an AI engineer and cyber security penetration testing intern with experience developing AI tools for cybersecurity. She has expertise in machine learning, penetration testing, and digital forensics. Currently, she is interning as a penetration tester and previously worked as an AI engineer developing threat detection solutions. She holds an MEng in Cyber Security and BEng(Hons) in Cyber Security from the University of the West of Scotland.

Uploaded by

gourav Gupta
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

MICHELLE PANTELOURIS

CYBER SECURITY AI ENGINEER/PENETRATION TESTING INTERN

CONTACT PROFILE
Experienced in both AI and cyber sectors, specialization lies in developing AI tools tailored
0585898943 for cybersecurity applications. Expertise as an AI Engineer for Cyber Security involves
utilizing advanced analytical skills and specialized knowledge to develop AI-driven solutions
[email protected] for cybersecurity challenges. As part of a penetration testing internship, abilities to
recognize vulnerabilities and assess security risks are being refined. Enthusiastic
https://www.linkedin.com/in/michelle-pantelouris/ contribution to cutting-edge cybersecurity initiatives reflects a commitment to staying ahead
of emerging threats.
Abu Dhabi

WORK EXPERIENCE

Penetration Testing Intern Scotland


SKILLS
HackersForYou Feb-2024 - Present
Linux
Assist senior penetration testers in security assessments.
Cryptography Create legal documents for clients.
Learn and apply penetration testing methodologies and tools (e.g., Nmap, Burp Suite,
Machine Learning Metasploit).
Conduct vulnerability research and analysis on assigned targets.
Penetration Testing Develop and document exploit proof-of-concepts.
Prepare concise and informative penetration testing reports.
Digital Forensics

Java AI Engineer Scotland


Conatix Dec 2022-Present
Python
Build scalable data pipelines using Apache Spark and other distributed computing
C/C++ technologies to efficiently process over 1000 GB of structured and semi-structured
network data.
SQL Skilled in Neural Networks, Anomalies, ETL, Apache Spark, Kafka, Python, PostgreSQL,
Malware Analysis Docker, Kubernetes, Cloud services, Azure (ADLS, Data Factory), VMs, Jenkins, Ansible,
Git, Agile, Linux scripting
Web Application Security Testing Developed real-time monitoring dashboard with Grafana/Power BI for threat detection
Enhanced PostgreSQL queries for improved threat detection efficiency
Docker Leader of testing team, guiding co-workers through testing procedures and working with
them to fix any problems that arise.
Azure

Teamwork
EDUCATION
Leadership
MEng Cyber Security
Analytical
University of the West of Scotland 2022-2023

Master's Dissertation: The objective of this project was to gain a deeper understanding of
COMMUNITY how Advanced Persistent Threat (APTs) infiltrate their victim's infrastructure. To achieve
this, the ELK Stack was set up and Elasticsearch was utilised, which can read this type of
An active member of the cyber security community, data. Built-in tools and Machine Learning were used to analyse how these threat actors
participating in forums and attending online events target protocols, services, and end-users in their campaign.
to improve their skills and knowledge. Recently
participated my first Capture the Flag event to test
my practical security skills and identify areas for
improvement. BEng(Hons) Cyber Security

University of the West of Scotland 2021-2022


REFERENCE
Honours Dissertation: The objective of this project was to create and train three malware
Upon Request
detection models that used three different machine learning algorithms (Random Forest,
Decision Tree and Sklearn), to determine the most accurate approach through the whole
process. Random Forest and Decision Tree predicted over 90% whereas Sklearn only
predicted at 60%.

You might also like