Seu plano permite apenas 0 seguidas. Aprimore-o aqui.
Deixou de seguir com sucesso
Ocorreu um erro ao deixar de seguir o usuário.
Você recomendou com sucesso
Ocorreu um erro ao recomendar o usuário.
Algo deu errado. Por favor, atualize a página e tente novamente.
E-mail verificado com sucesso
Muhamed Ali E.
@Gypsy661
0,0
0
0,0
0,0
0%
Penetration Tester/ OSINT expert / Data Analyst
$40 USD / hora
・
Egypt (10:13 AM)
・
Entrou em novembro 9, 2017
$40 USD / hora
・
With expertise in Offensive Cyber Security, HR management, leadership, communication, and problem-solving, I bring a unique blend of skills. Over the past 8 years, I advanced to a managerial role in HR, mastering organizational dynamics, employee relations, and strategic planning. My transition to cybersecurity leverages these skills to approach security from both technical and people/process perspectives. Passionate about identifying vulnerabilities, securing systems, and contributing to organizational resilience, I'm eager to apply my experience in challenging roles in cybersecurity and Business Development Management.
Security Skills:
Field Risk Assessment - Corporate Risk Assessment -Anti industrial Espionage- Threat Detection -Investigation Techniques [Business Development
Management Background]-Interrogation [HR Management Background]-Cybersecurity - Cybersecurity Research - Integrated Security- Integrated Security
Research - Naval Security - Network Security - Linux System Administration - Kali Linux - Linux distributions - Cyber Recon - Cyber Scanning - Network
Administration -Penetration Testing - Vulnerability Analysis - Vulnerability Assessment - Cyber Exploitation [viruses , Trojans , Payloads ]- RAT attacks -
DOS attacks -Onsite Pen Testing - Remote Pen Testing -Remote Naval Pen Testing - Naval Pen Testing - Remote Naval Pen Testing - Post Exploitation -
Webapp Pen testing - MITM Attacks -WIFI Access point cracking -Mobile devices Exploitation -Hacking labs- Mobile Hacking labs - Red Teaming - Red
Teaming Engagements- Dark web - Dark web OSINT - Dark web Investigation - Blockchain OSINT -Block Chain investigation - OSINT - Maltego -Marine
OSINT- Python Scripting - Lua Scripting - C Scripting
Enhancing Security Awareness: Understanding the Threats of S
Enhancing Security Awareness: Understanding the Threats of S
Enhancing Security Awareness: Understanding the Threats of S
Enhancing Security Awareness: Understanding the Threats of S
Enhancing Security Awareness: Understanding the Threats of S
Enhancing Security Awareness: Understanding the Threats of S
Enhancing Security Awareness: Understanding the Threats of S
Enhancing Security Awareness: Understanding the Threats of S
Enhancing Security Awareness: Understanding the Threats of S
Onsite Network Pentest
Onsite Network Pentest
Onsite Network Pentest
Onsite Network Pentest
Onsite Network Pentest
Onsite Network Pentest
Onsite Network Pentest
Onsite Network Pentest
Tor Circuit Implementation for Special Research Client
Tor Circuit Implementation for Special Research Client
Tor Circuit Implementation for Special Research Client
Tor Circuit Implementation for Special Research Client
HR Management [Telecom , IT, BI]
HR Management [Telecom , IT, BI]
HR Management [Telecom , IT, BI]
Enhancing Security Awareness: Understanding the Threats of S
Enhancing Security Awareness: Understanding the Threats of S
Enhancing Security Awareness: Understanding the Threats of S
Enhancing Security Awareness: Understanding the Threats of S
Enhancing Security Awareness: Understanding the Threats of S
Enhancing Security Awareness: Understanding the Threats of S
Enhancing Security Awareness: Understanding the Threats of S
Enhancing Security Awareness: Understanding the Threats of S
Enhancing Security Awareness: Understanding the Threats of S
Onsite Network Pentest
Onsite Network Pentest
Onsite Network Pentest
Onsite Network Pentest
Onsite Network Pentest
Onsite Network Pentest
Onsite Network Pentest
Onsite Network Pentest
Tor Circuit Implementation for Special Research Client
Tor Circuit Implementation for Special Research Client
Tor Circuit Implementation for Special Research Client
Tor Circuit Implementation for Special Research Client
Mudanças salvas
0.0 · 0 Reviews
Avaliações
Nenhuma avaliação aqui!
Experiência
Penetration Tester- Bug Bounty Hunter
dez., 2022 - Presente
•
2 anos
Hackerone
dez., 2022 - Presente
•
2 anos
●Corporate Pen Testing [Integrated Pen Testing]
● IT pen Testing
● Web App Pentest
● Red Teaming
● Cyber Security
● OSINT
● Naval OSINT
● Linux Administration / Linux distributions
● Bug Bounty
dez., 2022 - Presente
•
2 anos
Freelance Penetration Tester:
out., 2019 - Presente
•
5 anos, 2 meses
Client Undisclosed / Location MEA -EU-US
out., 2019 - Presente
•
5 anos, 2 meses
● Corporate Pen Testing [Integrated Pen Testing]
● IT pen Testing
● Web App Pentest
● Red Teaming
● Cyber Security
● OSINT
● Naval OSINT
● Linux Administration / Linux distributions
● Bug Bounty
out., 2019 - Presente
•
5 anos, 2 meses
Freelancer HR Recruiter and Consultant
dez., 2016 - Presente
•
8 anos, 1 mês
Self Employed
dez., 2016 - Presente
•
8 anos, 1 mês
HR Resourcing
HR Strategy
HR BP
HR Consulting
Business equipment and computer applications used:
Taleo- SAP -MS Word-MS Excel -MS
PowerPoint-MS Outlook -MS Windows
Recruiter Job-boards: Bayt-Wuzzuf-LinkedIn-My Own Network and connections
dez., 2016 - Presente
•
8 anos, 1 mês
Educação
Minufiya University
2003 - 2007
•
4 anos
Bachelors In Business Administration
Egypt
2003 - 2007
•
4 anos
Qualificações
Data Analytics Technical Diploma
2019
Institute of Management Professionals
Data Analysis /Advanced Microsoft Excel/ DAX/ Power Query/ Power Pivot / Data Models / SQL Query / SQL Management Studio / Power BI / Data Modeling / Data Visualization / Query Writing / Database Queries / Query Optimization
2019
Convite enviado com sucesso!
Obrigado! Te enviamos um link por e-mail para que você possa reivindicar seu crédito gratuito.
Algo deu errado ao enviar seu e-mail. Por favor, tente novamente.