Othmen Mhiri

Hammam Sousse, Tunisia · +216 56723120 · othmhiri@gmail.com · LinkedIn

I’m an IT student at ISET Sousse specializing in Networks and IT Services.
Currently focusing on Cloud Computing, DevOps, and Cybersecurity while building hands-on projects and strengthening real-world skills through internships.
I’m putting in the work now to grow and build my career internationally.


Experience

Full Stack Web Developer Intern

Ostrix

Designed and developed a user-friendly web app that allows users to create and manage users, products, and clients.
Built using MERN Stack with responsive UI and real-time interactions.
Implemented user authentication and image uploads.

January 2026 – Present

Web Development Intern

Private Company (Ste MainLab)

Built RESTful APIs using Node.js, Express.js, and PostgreSQL.
Collaborated with Git and GitHub for version control.
Handled frontend development using HTML, CSS, and JavaScript.

January 2025 – February 2025

Education

ISET Sousse

Networks & IT Services (RSI)

Applied Bachelor's Degree in Network and IT Services

2024 – Present

Lycée Hammam Sousse

Baccalaureate in Computer Science

Baccalaureate in Computer Science

2021 – 2024

Skills

Cybersecurity

  • SIEM basics, log analysis, security monitoring
  • Incident response, phishing investigation
  • IDS/IPS, security monitoring
  • Privilege escalation (lab environment)

Development

  • REST APIs
  • MERN Stack (MongoDB, Express, React, Node.js)

Systems & Networking

  • Linux CLI
  • TCP/IP fundamentals
  • Wireshark traffic analysis

Tools

  • Git / GitHub

Certifications & Practical Experience

TryHackMe Certifications

  • TryHackMe - Cyber Security 101
  • TryHackMe - SOC Level 1 (Legacy & Updated)
  • TryHackMe - Jr Penetration Tester
  • TryHackMe - Offensive Pentesting

Cybersecurity Labs & Detection Practice

Completed 270+ hands-on cybersecurity labs, ranked in the Top 1% with a 200+ day learning streak.
Practiced SIEM analysis, incident response, phishing investigation, exploitation, privilege escalation, and detection engineering in controlled lab environments.
Documented red- and blue-team findings in structured writeups connecting attacker behavior to logs, alerts, and remediation strategies.

Writeups: github.com/othmen27

TryHackMe Profile:

Projects

Wishify Project Image

Wishify

Full-Stack Wishlist Web Application built with modern web technologies.

Wishify : Turn Dreams Into Reality
Wishify is a modern, user-friendly web app that helps users create, organize, and share digital wishlists. Whether it’s for birthdays, holidays, or personal goals, users can express their dreams and share them with loved ones effortlessly.

Key Features:
Wishlist Creation: Add wishes with images, details, and priority levels
Privacy & Sharing: Private by default, share via link or social media
Discovery & Connection: Explore public wishlists and connect with others
User Profiles: Custom avatars, social features, and public wish showcases

Tech Stack:
Built with the MERN stack (MongoDB, Express.js, React, Node.js)
Frontend: React, responsive design, smooth animations, real-time interactions
Backend: Secure API for auth, wish management, image uploads, and social features

The Difference:
Wishify focuses on human connection, privacy, and simplicity, making gift-giving more personal and joyful.

View on GitHub

Added Real Time that will showcase later on
Working on deploying the website On AWS

Compiler Project Image

Small Private Compiler

C++ Compiler that compiles Tunisian pseudo code into C++ Code.

🇹🇳 Tunisian Algorithm to C++ Translator
A compiler-style C++ program that translates Tunisian pseudocode into clean, compilable C++ source code.
Technologies Used:
- C++ for parsing and code generation
- File I/O for reading .tn pseudocode and writing .cpp output

Key Features:
- Supports variables, control flow, functions, procedures, and I/O
- Generates a complete executable C++ file automatically

Input/Output:
- Input: algo.tn
- Output: translated.cpp

View on GitHub

Raw Pseudocode:

Algo Image

Translation:

Translated Image
SIEM Project Image

Phishing Incident Response (SIEM Simulation) TryHackMe

Simulated detection and analysis of phishing alerts using a SIEM platform. Classified alerts as true or false positives, analyzed headers/URLs/IOCs, and proposed remediation steps.

Key Skills Demonstrated:
SIEM Monitoring & Analysis
Incident Response & Triage
Threat Intelligence & Phishing Analysis
Log & Network Traffic Analysis
False Positive / True Positive Classification
SOC Operations

View on GitHub

Firewall alert:

Firewall Alert

Phishing alert:

Phishing Alert
Offense & Detection Labs

Offense & Detection Labs

Structured red team + blue team writeups linking attacker behavior to logs, detection opportunities, and mitigation in realistic lab environments.

Offense & Detection Labs (Purple Team Writeups)
A structured repository of cybersecurity lab writeups that connect offensive actions to defensive visibility.
Instead of step-by-step walkthroughs, each writeup explains what happened, why it matters, what logs/alerts it produces, and how to detect and mitigate it.
What This Project Demonstrates:
• Attacker mindset: exploitation, privilege escalation, credential abuse, misconfigurations
• Defender mindset: SIEM-style analysis, incident response thinking, detection opportunities, hardening
• Clear documentation: professional writeup structure and evidence-based reasoning

Writeup Structure (Consistent Format):
Context → What Happened → Detection (logs/alerts/IOCs) → Response → Prevention → Key Takeaways

Repository Layout:
Red Team: offensive labs and techniques (multi-step scenarios)
Blue Team: defensive analysis, alerts, and detection logic derived from SOC-oriented labs

Why It’s Different:
This repo focuses on connecting actions to observable signals — bridging the gap between “how an attack works” and “how defenders catch it.”

Ethics & Scope:
All content is based on controlled lab environments only. No real-world targets or sensitive data. View on GitHub

Battlemetrics Project Image

Discord Anti-Cheat Monitor

p.project-description Real-time Discord bot that analyzes player behavior using BattleMetrics API and flags suspicious activity based on detection logic (K/D, playtime, reports, bans).

Discord Anti-Cheat Monitoring System
A real-time monitoring bot that streams players from multiple servers and analyzes their behavior to detect suspicious activity.

What It Does:
• Streams live players across servers using BattleMetrics API
• Analyzes player activity (K/D, kills, deaths, reports)
• Calculates a “hacker probability” score
• Flags suspicious players automatically
• Sends structured alerts to Discord with embeds

Detection Logic:
Combines multiple indicators:
• High K/D vs low playtime
• Reports and ban history
• Recent suspicious activity patterns

Tech Stack:
• Node.js + discord.js
• BattleMetrics API integration
• Modular backend architecture

Features:
• Role ping for high-risk players
• Multi-server monitoring
• Rate-limit safe streaming system

💡 Why It’s Interesting:
Demonstrates detection engineering thinking by connecting raw activity data to actionable security insights.

View on GitHub

Languages

  • English (Fluent)
  • French (Intermediate)
  • German (Basics)
  • Arabic (Native)