Abdullah Al Siam
Cybersecurity Professional and Researcher

orcid.org

ORCID

About Me
Abdullah Al Siam is a cybersecurity professional and researcher specializing in AI-driven cybersecurity. He has expertise in SOC operations, SIEM-based security monitoring, AI-driven threat detection, and cybersecurity analytics. He holds a Bachelor of Science in Software Engineering (major in Cybersecurity) and began his research career at the Cyber Security Centre of Daffodil International University, working on AI-based threat detection and secure data processing.

He has hands-on experience in SIEM-based monitoring, incident investigation, and response, and has worked as a Cyber Security Engineer at Enterprise InfoSec Consultants (EIC). He is currently an Associate Security Operator in the Fintech Engineering department at Digital Payments Limited (Pathao Pay), contributing to the security of large-scale digital payment systems.

Siam has authored multiple peer-reviewed publications, including Q1 IEEE Access, and serves as a reviewer for the IEEE Access journal. His research interests include AI for cybersecurity, malicious IP detection, encrypted traffic analysis, and intrusion detection systems. and is focused on bridging hands-on cybersecurity operations with advanced AI-driven research to enhance next-generation cyber defense systems.
Current Roles and Responsibilities
Strengthened Threat Detection
Optimized SIEM alert tuning, improving anomaly detection accuracy and reducing false positives.
Enhanced SOC Efficiency
Led incident triaging, cutting average response time for faster threat containment.
Coordinated Critical Incident Responses
Collaborated with teams to resolve high-priority security events with minimal downtime.
Advanced Threat Hunting
Identified and mitigated IoCs through proactive log analysis, preventing potential breaches.
Research Focus
AI-Driven Threat Detection
Designed ML models for malicious IP detection, anomaly identification, and real-time zero-day threat response.
Secure Medical Data Handling
Developed algorithms for DICOM image encryption and format conversion for confidentiality in AI/ML medical imaging.
Cyber Threat Intelligence
Investigated advanced techniques for analyzing threat landscapes, malicious behaviors, and attacker TTPs.
Defensive Security Automation
Built scalable SOC automation frameworks integrating SIEM/EDR tools with intelligent alert handling.
Research and Publications
Journal Articles (4)
  • AI’s Impact and Future Prospects in Cybersecurity (IEEE Access Q1)
  • IP SafeGuard – AI-Driven Malicious IP Detection (IEEE Access Q1)
  • Diegif: Efficient DICOM to EGIF Conversion (Results in Control and Optimization Q2)
  • Securing the Unseen: A Comprehensive Exploration Review of AI‐Powered Models for Zero‐Day Attack Detection
Conference Articles (10)
  • Secure Medical Imaging: DICOM to JPEG 2000 Conversion (ICAIC-2025)
  • Artificial Intelligence for Cybersecurity: State of the Art (ICAIC-2025)
  • AI-Driven Secure Semantic Communication with Dynamic Encryption
  • AI in Nanotechnology: Methodologies and Impact (RTCSE-2025)
  • Robust Algorithm for Identifying Malicious IPs (RTCSE-2025)
Tools & Technologies
Cybersecurity Tools
SIEM: ArcSight, Wazuh, Kibana, Elasticsearch
EDR: CrowdStrike Falcon
IPS: Trellix IPS
Vulnerability Assessment: Nessus, Burp Suite, Metasploit
Network Analysis: Wireshark
Operating Systems & Admin
Linux (Ubuntu, Red Hat): Configuration, hardening, troubleshooting
Windows Server: Basic administration, log analysis
Programming & Scripting
Languages: Python, Bash, C, C++
Automation: Bash scripts, custom SIEM rules
Data Visualization
Kibana dashboards
SIEM alert tuning, log correlation
Report writing, incident documentation
Projects
1
Wazuh Malware Detection Lab
Custom rule set and alert dashboard for testing Linux-based malware.
2
Insider Threat Simulation Toolkit
Log generation toolkit for SOC analysts to simulate insider behavior.
3
Threat Intel Feed Integrator
Python tool to ingest, parse, and enrich OpenCTI/MISP feeds.
4
Brute Force Detection Dashboard
Brute force login activity visualization using OpenSearch.
5
OWASP Top 10 Scanner Toolkit
Scripted exploitation and detection logging for educational labs.
Awards and Achievements
1
9th Position in DIU Take Off Programming Contest, Fall 2019
Organized by Daffodil International University – Department of Software Engineering.
2
Published 7 Research Papers
In reputed journals and conferences, including IEEE Access (Q1), Results in Control and Optimization (Q2), ICAIC-2025, and RTCSE-2025.
3
Graduated with Distinction
From Daffodil International University with a GPA of 3.88/4.00 in Software Engineering.
4
Peer Reviewer for IEEE Access Journal
Reviewed 12 research papers in cybersecurity and AI.
Photo Gallery
Convocation
Bsc in Software Engineering at Daffodil International University
IEEE 2nd International Conference
on Computing, Applications and Systems (𝘾𝙊𝙈𝙋𝘼𝙎 2025), held at 𝗜𝘀𝗹𝗮𝗺𝗶𝗰 𝗨𝗻𝗶𝘃𝗲𝗿𝘀𝗶𝘁𝘆, 𝗞𝘂𝘀𝗵𝘁𝗶𝗮, 𝗕𝗮𝗻𝗴𝗹𝗮𝗱𝗲𝘀𝗵
Take off programming contest
at Daffodil International University
Innovation Challenge 2023
at Banglalink HQ
Profiles & Research
Certifications
  • CEH – Certified Ethical Hacker (EC-Council)
  • NDE – Network Defense Essentials (EC-Council)
  • SOC – Security Operations Center Analyst (Coursera)
  • EHE – Ethical Hacking Essentials (EC-Council)
  • CTI 101 – Cyber Threat Intelligence 101 (arcX)
Contract
📞 +8801776333900
Made with