GG George Girgis

Toronto, ON

George Girgis

Cybersecurity, Network Operations, and Automation

I work at the intersection of cybersecurity, network operations, and automation. My recent work includes customer network readiness support at Nokia, malware signature research, IT support in security-conscious environments, Power BI reporting, and Python tools that make operational workflows easier to repeat.

Highlights

Credentials and technical focus

A snapshot of the education, certifications, and hands-on areas I bring into network and security work.

B.C.S. with High Distinction Carleton University, Computer Science
Nokia Cloud RAN Solution Certification Completed Oct 14, 2025
Generative AI and LLMs Nokia beginner achievement View badge
Malware analysis and Snort/MITRE Static, dynamic, passive analysis and signature development
Power BI and Python automation Dashboards, Power Query, DAX, workbook/reporting workflows

Featured Work

Selected projects and workstreams

A few examples of how I approach automation, analytics, and security problems in practical environments.

Automation project

Nokia RTU Report Builder

I worked on a Python desktop application that turns a repetitive Excel reporting process into a more consistent guided workflow.

  • Designed around real reporting pain points: repeated filtering, workbook preparation, and output consistency
  • Helped turn a manual process into a tool-driven workflow that is easier to rerun
  • Packaged the app for desktop use so non-developers could use the workflow without touching the code
PythonWorkbook processingDesktop packagingWorkflow design
Analytics project

Network Latency Dashboard

I built Power BI views to compare application-level network behavior, focusing on throughput, RTT, user counts, and data volume patterns.

  • Shaped raw operational data into dashboard-ready metrics
  • Compared latency and throughput signals across regional datasets
  • Used visual analysis to make performance patterns easier to explain
Power BIPower QueryDAXExcelNetwork KPIs
Security research

Malware Signature Research

At Nokia, I researched malware behavior and supported signature quality through Snort rule work, MITRE ATT&CK mapping, and analysis workflows.

  • Developed and modified signatures for emerging malware activity
  • Mapped behaviors to MITRE ATT&CK tactics and techniques
  • Used static, dynamic, and passive analysis to support detection quality
SnortMITRE ATT&CKOSINTPCAPMalware analysis

Experience Timeline

Recent roles

A concise view of the roles that shaped my cybersecurity, network operations, automation, and IT support experience.

Aug 2025 - Present | Toronto, ON

Jr. Customer Service Specialist

Nokia

  • Validated subnet allocations, gateway addressing, and overlap risks during customer network deployment readiness reviews
  • Collected KPI and log data through secure remote access and supported troubleshooting and escalation workflows
  • Built Power BI dashboards and collaborated on Python automation for Excel-based reporting

Nov 2024 - Apr 2025 | Ottawa, ON

IT Specialist

Kongsberg Geospatial

  • Delivered front-line IT support for hardware, software, identity, and connectivity issues
  • Supported disaster recovery and business continuity by migrating data and applying access controls
  • Monitored security alerts and supported compliance-aligned tooling research for CMMC and NIST 800-171

Jan 2023 - Apr 2024 | Ottawa, ON

Malware Research Assistant

Nokia

  • Developed Snort signatures aligned with MITRE ATT&CK TTPs for malware and APT detection
  • Conducted passive, static, and dynamic analysis on malware samples across multiple operating systems
  • Reviewed signatures for accuracy, false positives, and Command and Control activity

Sep 2021 - Apr 2022 | Ottawa, ON

IT Programmer Analyst

Canada Revenue Agency

  • Worked on front-end and documentation tasks for an Event Driven Architecture ePayroll proof of concept
  • Used Azure CLI, OpenShift, ARO, Gitea, Jira, and Agile delivery practices
  • Documented technical setup steps to help others reproduce development workflows

Skills

Technical toolkit

Grouped around the kinds of problems I enjoy working on: secure networks, operational tooling, and repeatable analysis.

Cybersecurity

SnortMITRE ATT&CKOSINTIOC/TTP researchStatic analysisDynamic analysisPassive analysisField Effect MDRSecurity alert reviewFirewall managementCMMC/NIST 800-171 awareness

Networking

VLANs/802.1Q802.1XOSPFEIGRPBGPHSRP/VRRPACLsNATDHCP relayDNSIPsec/VPNPCAP analysis

Scripting & Automation

PythonPowerShellBashReport automationWorkbook processing

Data & Reporting

Power BIPower QueryDAXExcelPivotTablesKPI dashboards

Platforms & Virtualization

Azure DevOpsOpenShift/AROKubernetes fundamentalsVMwareESXiHyper-VVirtualBox

Systems & Identity

Active DirectoryMicrosoft 365ExchangeEvent Viewer

Collaboration & Delivery

Git/GiteaJiraMicrosoft TeamsAgile/ScrumTechnical documentationTriage

Profiles

Where to verify and explore more

These links collect my public technical footprint separately from direct contact.

Early Technical Demo

Where the curiosity started

This older demo shows an early stage of my technical curiosity: using Cheat Engine to inspect and modify in-game memory values, understand how software state changes at runtime, and see how those values can sometimes be manipulated for gameplay advantage.

Resume + Contact

Let us make the next conversation easy.

Download my current resume or reach me directly by email.

Download Resume

georgesameh01@outlook.com