I am a Master’s student in Computer Science at the University of Waterloo, and most of my work sits at the intersection of systems, security, and data. I currently work in the Software Analytics Group Lab, building and analyzing large dependency graphs for Maven Central and PyPI (containing millions of nodes and edges that have to be ingested and queried reliably and efficiently). I have owned the end-to-end pipeline: iterating on design, analytics and performance strategies with my supervisors, deploying the service on lab servers with tests and monitoring to support reliable analysis and generate actionable insights for the open-source community. Before this, I worked in the Security Lab at UWaterloo on an end-to-end pipeline for extracting vendor Android ROMs (with different compression schemes), precisely modeling their call chains and uncovering hidden and vulnerable framework APIs. I have also worked in intrusion detection: in one project, I reviewed complex open source IDS codebases to surface ML and systems flaws and highlight better implementation practices which lead to a co-authored publication; in another, I extended a DL based detector to improve detection performance on high-volume streams of audit logs. In parallel, I have been interested in handling data reliably at scale: I have implemented the Raft consensus protocol for a distributed key-value store, and worked with Hadoop and Spark on big-data algorithms (and now TA the data-intensive distributed computing course). I have also built several team projects in hackathons and courses, and really enjoy collaborating with others to break problems down, debate tradeoffs, and implement solutions together.

Mohammad Jaffer Iqbal

I am a Master’s student in Computer Science at the University of Waterloo, and most of my work sits at the intersection of systems, security, and data. I currently work in the Software Analytics Group Lab, building and analyzing large dependency graphs for Maven Central and PyPI (containing millions of nodes and edges that have to be ingested and queried reliably and efficiently). I have owned the end-to-end pipeline: iterating on design, analytics and performance strategies with my supervisors, deploying the service on lab servers with tests and monitoring to support reliable analysis and generate actionable insights for the open-source community. Before this, I worked in the Security Lab at UWaterloo on an end-to-end pipeline for extracting vendor Android ROMs (with different compression schemes), precisely modeling their call chains and uncovering hidden and vulnerable framework APIs. I have also worked in intrusion detection: in one project, I reviewed complex open source IDS codebases to surface ML and systems flaws and highlight better implementation practices which lead to a co-authored publication; in another, I extended a DL based detector to improve detection performance on high-volume streams of audit logs. In parallel, I have been interested in handling data reliably at scale: I have implemented the Raft consensus protocol for a distributed key-value store, and worked with Hadoop and Spark on big-data algorithms (and now TA the data-intensive distributed computing course). I have also built several team projects in hackathons and courses, and really enjoy collaborating with others to break problems down, debate tradeoffs, and implement solutions together.

Available to hire

I am a Master’s student in Computer Science at the University of Waterloo, and most of my work sits at the intersection of systems, security, and data. I currently work in the Software Analytics Group Lab, building and analyzing large dependency graphs for Maven Central and PyPI (containing millions of nodes and edges that have to be ingested and queried reliably and efficiently). I have owned the end-to-end pipeline: iterating on design, analytics and performance strategies with my supervisors, deploying the service on lab servers with tests and monitoring to support reliable analysis and generate actionable insights for the open-source community. Before this, I worked in the Security Lab at UWaterloo on an end-to-end pipeline for extracting vendor Android ROMs (with different compression schemes), precisely modeling their call chains and uncovering hidden and vulnerable framework APIs.
I have also worked in intrusion detection: in one project, I reviewed complex open source IDS codebases to surface ML and systems flaws and highlight better implementation practices which lead to a co-authored publication; in another, I extended a DL based detector to improve detection performance on high-volume streams of audit logs. In parallel, I have been interested in handling data reliably at scale: I have implemented the Raft consensus protocol for a distributed key-value store, and worked with Hadoop and Spark on big-data algorithms (and now TA the data-intensive distributed computing course). I have also built several team projects in hackathons and courses, and really enjoy collaborating with others to break problems down, debate tradeoffs, and implement solutions together.

See more

Experience Level

Expert
Expert
Expert
Expert
Expert
Expert
Expert
Expert
Expert
Expert
Expert
Expert
Expert
Expert
Intermediate
See more

Language

English
Fluent

Work Experience

Software Engineer | Research Assistant at Software Analytics Group (SWAG) Lab - University of Waterloo
September 1, 2025 - Present
Designed and implemented Neo4j-backed dependency graph services for Maven Central and PyPI that ingest package metadata at scale and model transitive dependencies and version conflicts across millions of package relationships. Mined PRs, commits, and version histories at scale to analyze Dependabot's ecosystem impact on dependency freshness, vulnerability exposure, and release dynamics of Maven Central. Owned the end-to-end lifecycle of these analysis tools: design documentation, implementation, deployment on lab servers, throughput optimization, and monitoring/logging to ensure reliability.
Software Engineer | Research Assistant at Cryptography, Security, and Privacy Lab - University of Waterloo
September 1, 2024 - August 31, 2025
Developed a static analysis tool to identify hidden Android Framework APIs and access control (AC) inconsistencies in vendor-modified Android ROMs at scale, reducing manual analysis time by 70% and enabling end-to-end handler resolution of asynchronous IPC calls. Built a differential analysis pipeline to extract and statically compare standard vs. kids' Android tablet ROMs, uncovering and confirming 11 hidden vulnerable APIs through proof-of-concept exploits.
Software Engineer | Research Assistant at Internet Security and Privacy Lab - LUMS
July 1, 2023 - August 31, 2024
Audited 9 open-source provenance-based intrusion detection systems, identifying ML/systems flaws and validating detection performance and reproducibility. Led a team of 3 undergraduates in code reviews. Work published in peer-reviewed conference. Developed a provenance-based enrichment pipeline using data-flow slicing and lineage queries to inject semantic context into audit logs, improving Precision by 9.4% and Recall by 11.2% in a BERT-based intrusion detection model.
Research Assistant at Networks and Systems Group - LUMS
January 1, 2023 - June 30, 2023
Developed a Selenium-based automation pipeline to simulate child viewer sessions and scrape 24k ads served on child-oriented YouTube videos across 10 countries. Performed a quantitative and qualitative analysis of ad content to reveal frequent exposure of inappropriate content toward children, contrary to YouTube's declared ad policies. Work published in peer-reviewed conference.

Education

Master of Mathematics in Computer Science at University of Waterloo
September 1, 2024 - May 1, 2026
Bachelor of Science in Computer Science at Lahore University of Management Sciences
August 1, 2020 - June 1, 2024

Qualifications

International Master’s Award of Excellence (IMAE)
January 11, 2030 - December 9, 2025

Industry Experience

Computers & Electronics, Software & Internet, Education, Media & Entertainment, Professional Services