Summary
Overview
Work History
Education
Skills
Certification
Timeline
Projects
Generic
Amim Mohammad

Amim Mohammad

Help Desk Technician
Oshawa,Ontario

Summary

Versatile Technical Support Representative skilled at offering clients easy-to-understand guidance and actionable advice. Positively impacts all customer interactions and engineering efforts for supported products.

Overview

4
4
years of professional experience
5
5
years of post-secondary education
2
2
Certificates
1
1
Language

Work History

Technology Support and Maintenance

Lazeez
01.2020 - Current
  • Managed and resolved Windows and software challenges, ensuring smooth daily operations
  • Oversaw restaurant's domain and network, emphasizing user permissions and network stability
  • Provided immediate tech support, effectively communicating intricate tech concerns to staff.
  • Translated complex technical issues into digestible language for non-technical users.
  • Resolved diverse range of technical issues across multiple systems and applications for customers and end-users across various time zones.

Trade Algorithm Developer

Bumima Inc.
01.2023 - 05.2023
  • Developed real-time integration system interfacing with 10 cryptocurrency trading APIs using Python
  • Engineered algorithm optimizing for minimal latency to present profitable investment opportunities
  • Collaborated with financial analysts to enhance investment strategy accuracy.

Education

Bachelor of IT Networking Security - IT

University of Ontario Institute of Technology
Oshawa
08.2019 - 08.2024

Skills

CCNAundefined

Certification

CompTIA Security+

Timeline

Trade Algorithm Developer

Bumima Inc.
01.2023 - 05.2023

Technology Support and Maintenance

Lazeez
01.2020 - Current

Bachelor of IT Networking Security - IT

University of Ontario Institute of Technology
08.2019 - 08.2024

Projects

  • Asymmetric Symmetric Encryption - Python , Network Security, Encryption

This project was developed using Python, with Object-Oriented Programming (OOP) principles guiding the input handling
and other implementation aspects. The system first analyzes the user input and adds appropriate padding. The length of
this padding becomes a component of the encryption key. This key, in conjunction with the user input, is fed into the
cipher mechanism, which then generates an encrypted output. This output undergoes a hashing process before being
transmitted as a secure message. The project presentation was well-received; our professor has since requested the
detailed code and algorithms used

  • Gold Price Correlation with major ForEx - Machine Learning

The project was executed in a Pyodide environment, hosted on Google Colab/Jupyter.Leverage machine learning to predict
gold prices by analyzing correlations with other significant financial indicators.The model took into account various global
price indexes, including S&P500, USD, EUR, and SIL.Employed advanced forecasting algorithms to improve the accuracy of
predictions.The dataset was pre-processed to ensure clean and relevant data, which enhanced the overall predictability. A
thorough examination of past gold price fluctuations was conducted to understand the potential influencing
factors.Incorporated sentiment analysis from global financial news to gauge potential impacts on gold prices. The
preliminary results showed promising accuracy, paving the way for more extensive future research in this domain.

  • Penetration Testing and Security Enhancement for Corporate Server

A thorough penetration test was performed on a mirrored corporate server using Kali Linux and Burp Suite for vulnerability
detection. Metasploit was employed for advanced exploit simulations, with OWASP guidelines ensuring a standardized
approach. Post-assessment:
A Threat and Risk Assessment Chart was crafted.
Solutions were devised for each vulnerability.
Security Policies were recommended to bolster defense and promote cybersecurity awareness.

Amim MohammadHelp Desk Technician