Osama Akram Amin Metwally Hussien

Cybersecurity Professional & Academic Researcher

IT Consultant | AWS & (ISC)² Certified | Master degree holder from Northumbria University

Google Scholar Metrics
53
Citations
4
h-index
2
i10-index
ResearchGate Metrics
63
Citations
6
h-index
57.2
RG Score
15+
Publications
Google Scholar ResearchGate

About Me

Bridging Industry Practice with Academic Excellence

Osama Hussien

I am a cybersecurity professional and academic researcher with a passion for solving complex security challenges at the intersection of emerging technologies and practical implementation. Currently working as an SAP Technical Consultant at EPI-USE Labs in Manchester, I bridge the gap between enterprise IT operations and cutting-edge security research.

My journey in cybersecurity began at The German University in Cairo, where I earned my BSc in Information Engineering & Technology with First Class Honours (Distinction), specializing in Network Engineering. I continued this path at Northumbria University London, completing my MSc in Cybersecurity with Advanced Practice with Distinction (83% first year average). My dissertation focused on designing and implementing post-quantum secure network protocols—research that addresses the looming threat quantum computers pose to today's encryption systems.

Beyond my day-to-day work in SAP consulting and technical support, I maintain an active research profile with 15+ publications across Springer and MDPI journals, including contributions to high-impact books on Cybersecurity & AI. My work has received 63 citations with an h-index of 6 and a Research Interest Score of 57.2. My research interests span post-quantum cryptography, 5G/6G network security, blockchain technology, AI ethics and governance, and secure space communications.

I've had the privilege of working with industry-leading organizations including Pearson PLC (Security Analyst), The Egyptian Banks Company (Cyber Security Trainee), and IBM (Technical Support Engineer). These experiences, combined with my academic research, have shaped my practical approach to cybersecurity—one that balances theoretical rigor with real-world applicability.

I'm proud to be an ISACA and IET Council member, and my team's first-place win at the ISACA London Cybersecurity Competition remains one of my most rewarding experiences. I was also selected to represent Northumbria University at the prestigious NCSC Innovators Challenge, where I worked on developing space governance frameworks—a project that combined my interests in policy, quantum computing, and satellite security.

I hold certifications as an AWS Solutions Architect Associate, AWS Cloud Practitioner, and (ISC)² Certified Cybersecurity Professional. I've also studied towards Cisco CCNA during my bachelor degree and am currently working towards Red Hat certification. When I'm not working or researching, I'm likely participating in CTF competitions, exploring new security tools, or contributing to the cybersecurity community through teaching and mentorship.

AWS Solutions Architect Associate AWS Cloud Practitioner (ISC)² Certified Cybersecurity

Research Interests

Advancing the Frontiers of Cybersecurity

Cryptography & Security

Applied Cryptography Post-Quantum Security Quantum-Resistant Protocols Blockchain Technology

Network Security

5G/6G Security Space Communications IoT Security Network Protocols

AI & Ethics

AI Ethics AI Governance Machine Learning Security AI-driven Cybersecurity

Professional Experience

Building Secure Solutions Across Industries

Sep 2024 - Present
SAP Technical Consultant
EPI-USE Labs, Manchester, UK
Provide technical expertise to clients and colleagues, delivering operational technical support to help clients get the full benefit of EPI-USE Labs software including DSM products on their systems. Develop ABAP programs to address client needs, and work closely with the operations team to support clients and realize new business opportunities.
Aug 2023 - Jun 2024
Security Researcher
Northumbria University London
As part of my master's degree, completed advanced practice in publishing and researching research papers in Cyber Security, 5G and 6G, Quantum Computing and AI, publishing in MDPI and Springer.
Jun 2023 - Aug 2023
Security Analyst Internship
Pearson PLC, London, UK
Tasks included but not limited to PCI DSS Version 4 mapping, Third Party Vendor Risk Assessments, vulnerability management with Qualys and AWS Cloud Engineering certification exam (AWS Certified Cloud Practitioner).
Jan 2023 - Jun 2023
Research Fellow - IoT Security & Blockchain
Northumbria University London (Funded Project)
Architected cost-effective IoT smartwatch with ESP32 microcontroller for healthcare applications. Implemented Haraka v2 Hash algorithm-based blockchain as decentralized PKI infrastructure. Deployed machine learning models on edge devices for real-time health diagnosis.
Nov 2022 - Jun 2023
Network Specialist (Part Time)
Holland Bazaar, London & Peterborough, UK
Tasks included maintaining and operating company's servers, maintaining Windows Active Directory Servers, providing Technical Support, setting and configuring VPN Service between different branches in London (Croydon, Edmonton, Enfield) and Peterborough, managing Office 365 Services and Email server, and solving networking and server problems.
May 2022 - Aug 2022
Cyber Security Trainee
The Egyptian Banks Company, Egypt
Managed regular performance checks and audits, ensuring storage and archiving procedures were functioning correctly. Firewall configuration review and management (FortiGate, Cisco, Palo-Alto), and CIS Benchmarks audits. Vulnerability assessments with Tenable Nessus and security configuration and auditing according to the PCI-DSS compliance and policies. Training on Cyber Threat Intelligence analysis and malware assessment and planning and prepared timely threat reports and briefings and user access and permissions review and policies management.
Sep 2021 - Mar 2022
Technical Support Engineer Trainee
IBM, Egypt
Provided a professional first technical support for Spectrum Protect Servers customer and provided updates to the customer to meet performance objectives as well as diagnosing fault-related cases by utilizing software diagnostics and other network/product utility for Spectrum Protect Server.

Teaching & Academic Service

Developing the Next Generation of Cybersecurity Professionals

Aug 2023
Programme Facilitator - NCSC Cyber First Programme
QA Ltd, Bristol, UK
Facilitated intensive 1-week cybersecurity bootcamp for high-achieving secondary school students. Designed and delivered hands-on cybersecurity laboratories covering network security and cryptography. Contributed to national cybersecurity talent pipeline development through NCSC partnership.
Feb 2023 - May 2023
Teaching Assistant - Advanced Ethical Hacking
Northumbria University London
Co-developed curriculum for advanced ethical hacking and penetration testing methodologies. Delivered specialized lectures on SQL injection techniques, digital forensics, and Metasploitable framework. Supervised practical cybersecurity laboratories, mentoring students in hands-on security testing.

Freelance & Contract Projects

Independent Cybersecurity Consulting

NETWORK SECURITY
Enterprise Network Security Overhaul
Designed and overhauled 100% of network security infrastructure including WAN connectivity, Site-to-Site VPN Tunnels, ACLs, enterprise firewalls, BYOD Network, and IOS-based IPS. Implemented Host Based IDS, Antivirus, and SIEM Tools. Configured internal routing with OSPF, Site Administration Server, Mail & DNS Servers, DHCP, and IPsec VPNs site-to-site. Performed device hardenings to secure organization's LAN and robots multipath infrastructure. Developed secure network design with Cisco Routers, switches & Firewalls with redundancy. Implemented enterprise security documents (policies, standards, and procedures) while defining, planning, and upgrading security measures. Conducted threat assessment, threat modelling, architecture auditing, vulnerability and risk analysis with CVSS, and developed mitigation plans.
INCIDENT RESPONSE
Security Hardening and Breach Investigation
Responded to security incident involving a confidential company's Linux server acting as gateway for internal connections where sensitive data breach occurred. Detected and stopped brute force password attempts on employee account. Analyzed the compromised system to identify and eliminate threats. Implemented comprehensive server hardening measures to prevent future attacks and secured the gateway infrastructure.
VULNERABILITY ASSESSMENT
Post-Breach Security Assessment
Investigated claimed system breach to determine attacker access vectors and detect additional security flaws. Reviewed program code to identify and prioritize vulnerabilities. Provided comprehensive mitigation recommendations. Tested vulnerable software platform for all potential flaws and generated detailed report to assist developers in code remediation.
COMPLIANCE & INTEGRATION
Infrastructure Assessment for Corporate Merger
Assessed systems compatibility for 100% systems merger between two companies. Evaluated whether Company B's systems could be integrated into Company A's infrastructure and network. Checked all equipment and operating systems against CIS Benchmarks. Conducted vulnerability assessment utilizing Nmap and Tenable Nessus. Generated comprehensive report including all necessary CIS Benchmarks and discovered vulnerabilities. Provided security recommendations for safe migration and network integration.
CLOUD ARCHITECTURE
AWS Cloud Formation Implementation
Designed and deployed Virtual Private Cloud with pair of public & private subnets spread across 2 Availability Zones. Deployed Internet Gateway with default route on public subnets. Implemented pair of NAT Gateways (one in each AZ) with default routes in private subnets. Configured load balancer between subnets to balance 50% of traffic. Implemented autoscaling group to handle growing traffic demand, ensuring high availability and scalability.

Selected Publications

Contributing to Cutting-Edge Research

Below is a selection of my recent publications. For my complete publication list with full-text access and citation metrics, please visit:

View Full List on Google Scholar View Full List on ResearchGate
JOURNAL
Microfluidic lab-on-chip design for efficient relative humidity sensing using a capacitive transducer
Abdelghani, M., Hussien, O.
Scientific Reports (Nature Portfolio), 2025. Vol 15(1), 25964
CONFERENCE
DTLS-Trust: A Blockchain-Enhanced Security Framework with AI Based Trust Scoring for UDP Communications
Hussien, O., Jahankhani, H.
IRASET'2025 - 5th International Conference on Innovative Research in Applied Science, Engineering and Technology, Fez, Morocco (IEEE Xplore & Scopus)
JOURNAL
Optimizing 5G Resource Allocation in PSO with Machine Learning Approach to Open RAN Architectures
Hussien, O., Jahankhani, H.
Journal of Next-Generation Research 5.0, 2025
BOOK CHAPTER
Designing a Decentralized Ecosystem for 6G Smart Cities
Hussien, O., Kaya, A., Tajbel, S., Jahankhani, H.
Cybersecurity and Human Capabilities Through Symbiotic Artificial Intelligence, Springer, 2025
BOOK CHAPTER
QRNG-Powered Quantum-resistant Blockchain for Secure and Scalable IoT Healthcare Machine Learning models
Hussien, O., Kaya, A., Jahankhani, H., Salih, A.
Springer, October 2025
EDITED BOOK
Cybersecurity and Artificial Intelligence: Transformational Strategies and Disruptive Innovation
Jahankhani, H., Bowen, G., Sharif, S., Hussien, O.
Springer (Advanced Sciences and Technologies for Security Applications Series), 2024
JOURNAL (In Press)
The Design and Implementation of Post-Quantum Secure TCP Protocol (OssLayer)
Jahankhani, H., Hussien, O.
International Journal of Electronic Security and Digital Forensics, Accepted October 2024
JOURNAL
Predicting the Impact of Data Poisoning Attacks in Blockchain-Enabled Supply Chain Networks
Butt, U., Hussien, O., Hasanaj, K., Shaalan, K., Hassan, B., al-Khateeb, H.
Algorithms Journal, MDPI, 2023. DOI: 10.3390/a16120549
BOOK CHAPTER
Secure and Resilient IP-Satellite Communication Infrastructure
Hasanaj, K., Hussien, O., Jahankhani, H.
Space Law and Policy Series, Springer Cham, 2024. DOI: 10.1007/978-3-031-62228-1_5
BOOK CHAPTER
Strengthening Security Mechanisms of Satellites and UAVs Against Quantum Computer Attacks
Hussien, O., Arachchige, I., Jahankhani, H.
Advanced Sciences and Technologies for Security Applications, Springer Cham, 2024. DOI: 10.1007/978-3-031-47594-8_1
CONFERENCE
DTLS-Trust: A Blockchain-Enhanced Security Framework with AI Based Trust Scoring for UDP Communications
Hussien, O. et al.
IRASET'2025 Conference, Fez, Morocco (Accepted - IEEE Xplore & Scopus)
BOOK CHAPTER
Approaches and Methods for Regulation of Security Risks in 5G and 6G
Jahankhani, H., Kendzierskyj, S., Hussien, O.
Advanced Sciences and Technologies for Security Applications, Springer Cham, 2023. DOI: 10.1007/978-3-031-33631-7_2
THESIS
Enhancing Network Security through Post-Quantum Secure Network Protocol
Hussien, O.
MSc Dissertation, Northumbria University London Campus, UK, 2024 (Grade: Distinction)

Technical Skills

Comprehensive Technical Expertise

Programming & Development

Python Java Dart ABAP MIPS Assembly SDLC

Cloud & DevOps

AWS Solutions Architect Microsoft Azure Firebase CI/CD Ansible CloudFormation Docker Kubernetes

Cybersecurity Frameworks

PCI-DSS NIST SP800-53 ISO27001 MITRE ATT&CK CVSS CIS Benchmarks OWASP

Network & Security

CCNA OSPF BGP VPN Technologies Cisco Firewalls FortiGate Palo Alto Wireshark

Database Technologies

MongoDB MySQL MariaDB Amazon Aurora Database Security

Emerging Technologies

AI/ML TensorFlow Scikit-learn Quantum Computing IoT Security Blockchain

Security Tools

Tenable Nessus Qualys Digital Forensics Penetration Testing Threat Intelligence Incident Response

Infrastructure

VMware vSphere ESXi Hypervisor Tech GNS3 Enterprise Storage

Certifications & Digital Badges

Industry-Recognized Credentials

View all my verified credentials and digital badges on Credly:

View All Badges on Credly
AWS Solutions Architect
AWS Certified Solutions Architect – Associate
Amazon Web Services
Expires Oct 27, 2026
AWS Cloud Practitioner
AWS Certified Cloud Practitioner
Amazon Web Services
Expires Oct 27, 2026
ISC2 CC
Certified in Cybersecurity (CC)
ISC2
Expires Dec 31, 2025
SAP S/4HANA
Administrating SAP S/4HANA Cloud, Public Edition
SAP
Issued Mar 2024
SAP Cybersecurity
Introducing Cybersecurity
SAP
Issued Mar 2024
SAP BTP
Exploring SAP Business Technology Platform
SAP
Issued Mar 2024
AWS Cloud Quest Solutions Architect
AWS Cloud Quest: Solutions Architect
AWS Training and Certification
Issued Sep 2023
AWS Cloud Quest Cloud Practitioner
AWS Cloud Quest: Cloud Practitioner
AWS Training and Certification
Issued Jun 2023
Networking Devices and Initial Configuration
Cisco
Issued Oct 2022
Cisco Networking Basics
Networking Basics
Cisco
Issued Oct 2022
Cisco Intro to Cybersecurity
Introduction to Cybersecurity
Cisco
Issued Oct 2022
IBM Agile Explorer
IBM Agile Explorer
IBM
Issued Sep 2021
IBM Virtual Collaborator
IBM Virtual Collaborator
IBM
Issued Dec 2021
AIX Systems Administrator
AIX Systems Administrator - Experienced
IBM
Issued Nov 2021
IBM Cloud Essentials
IBM Cloud Essentials
IBM
Issued Sep 2021
Pearson Intern
Pearson Intern
Pearson UK
Issued Aug 2023

Education

Academic Excellence in Cybersecurity & Engineering

Northumbria University
Master of Science in Cybersecurity & Advanced Practice
Northumbria University London Campus
Sep 2022 - Jun 2024
Grade: 1st Class Honours (Distinction), First Year: 83%
Dissertation: "Enhancing Network Security through the Design and Implementation of Post-Quantum Secure Network Protocol" - Advanced research in post-quantum cryptography, satellite security, and AI-driven cybersecurity
German University in Cairo
Bachelor of Science in Information Engineering & Technology
The German University in Cairo
Sep 2016 - Aug 2021
Grade: 1st Class Honours (Distinction), GPA: 2.28/0.7 German Scale
Specialization: Network Engineering - Thesis: "Smart City - Car Movement Analysis using Machine Learning Model" (Grade: Excellent) - Specialized in network protocols, cybersecurity, and machine learning applications

Honors & Awards

Recognition for Excellence

ISACA London Cybersecurity Competition - Champion
February 2024 | ISACA London Chapter
First Place winner representing Northumbria University against 8 teams from 4 prestigious UK universities. Led comprehensive cyber-attack case study analysis of Capita LTD breach. Presented findings at Queen Elizabeth II Centre to industry leaders and cybersecurity executives.
NCSC Innovators Challenge - University Representative
March 2023 | UK National Cyber Security Centre
Selected as sole representative for Northumbria University in prestigious 3-day national cybersecurity innovation challenge. Competed against top students from 15+ leading UK universities. Developed novel Space Governance Framework addressing critical issues in satellite and space security infrastructure.

Get In Touch

Let's Connect and Collaborate