Your membership plan only allows 0 follows. Upgrade here.
Successfully unfollowed
Error unfollowing user.
You have successfully recommended
Error recommending user.
Something went wrong. Please refresh the page and try again.
Email successfully verified.
Muhamed Ali E.
@Gypsy661
0.0
0
0.0
0.0
0%
Penetration Tester/ OSINT expert / Data Analyst
$40 USD / Hour
・
Egypt (7:51 PM)
・
Joined on November 9, 2017
$40 USD / Hour
・
With expertise in Offensive Cyber Security, HR management, leadership, communication, and problem-solving, I bring a unique blend of skills. Over the past 8 years, I advanced to a managerial role in HR, mastering organizational dynamics, employee relations, and strategic planning. My transition to cybersecurity leverages these skills to approach security from both technical and people/process perspectives. Passionate about identifying vulnerabilities, securing systems, and contributing to organizational resilience, I'm eager to apply my experience in challenging roles in cybersecurity and Business Development Management.
Security Skills:
Field Risk Assessment - Corporate Risk Assessment -Anti industrial Espionage- Threat Detection -Investigation Techniques [Business Development
Management Background]-Interrogation [HR Management Background]-Cybersecurity - Cybersecurity Research - Integrated Security- Integrated Security
Research - Naval Security - Network Security - Linux System Administration - Kali Linux - Linux distributions - Cyber Recon - Cyber Scanning - Network
Administration -Penetration Testing - Vulnerability Analysis - Vulnerability Assessment - Cyber Exploitation [viruses , Trojans , Payloads ]- RAT attacks -
DOS attacks -Onsite Pen Testing - Remote Pen Testing -Remote Naval Pen Testing - Naval Pen Testing - Remote Naval Pen Testing - Post Exploitation -
Webapp Pen testing - MITM Attacks -WIFI Access point cracking -Mobile devices Exploitation -Hacking labs- Mobile Hacking labs - Red Teaming - Red
Teaming Engagements- Dark web - Dark web OSINT - Dark web Investigation - Blockchain OSINT -Block Chain investigation - OSINT - Maltego -Marine
OSINT- Python Scripting - Lua Scripting - C Scripting
Enhancing Security Awareness: Understanding the Threats of S
Enhancing Security Awareness: Understanding the Threats of S
Enhancing Security Awareness: Understanding the Threats of S
Enhancing Security Awareness: Understanding the Threats of S
Enhancing Security Awareness: Understanding the Threats of S
Enhancing Security Awareness: Understanding the Threats of S
Enhancing Security Awareness: Understanding the Threats of S
Enhancing Security Awareness: Understanding the Threats of S
Enhancing Security Awareness: Understanding the Threats of S
Onsite Network Pentest
Onsite Network Pentest
Onsite Network Pentest
Onsite Network Pentest
Onsite Network Pentest
Onsite Network Pentest
Onsite Network Pentest
Onsite Network Pentest
Tor Circuit Implementation for Special Research Client
Tor Circuit Implementation for Special Research Client
Tor Circuit Implementation for Special Research Client
Tor Circuit Implementation for Special Research Client
HR Management [Telecom , IT, BI]
HR Management [Telecom , IT, BI]
HR Management [Telecom , IT, BI]
Enhancing Security Awareness: Understanding the Threats of S
Enhancing Security Awareness: Understanding the Threats of S
Enhancing Security Awareness: Understanding the Threats of S
Enhancing Security Awareness: Understanding the Threats of S
Enhancing Security Awareness: Understanding the Threats of S
Enhancing Security Awareness: Understanding the Threats of S
Enhancing Security Awareness: Understanding the Threats of S
Enhancing Security Awareness: Understanding the Threats of S
Enhancing Security Awareness: Understanding the Threats of S
Onsite Network Pentest
Onsite Network Pentest
Onsite Network Pentest
Onsite Network Pentest
Onsite Network Pentest
Onsite Network Pentest
Onsite Network Pentest
Onsite Network Pentest
Tor Circuit Implementation for Special Research Client
Tor Circuit Implementation for Special Research Client
Tor Circuit Implementation for Special Research Client
Tor Circuit Implementation for Special Research Client
Changes saved
0.0 · 0 Reviews
Reviews
No reviews to see here!
Experience
Penetration Tester- Bug Bounty Hunter
Dec, 2022 - Present
•
2 years
Hackerone
Dec, 2022 - Present
•
2 years
●Corporate Pen Testing [Integrated Pen Testing]
● IT pen Testing
● Web App Pentest
● Red Teaming
● Cyber Security
● OSINT
● Naval OSINT
● Linux Administration / Linux distributions
● Bug Bounty
Dec, 2022 - Present
•
2 years
Freelance Penetration Tester:
Oct, 2019 - Present
•
5 years, 2 months
Client Undisclosed / Location MEA -EU-US
Oct, 2019 - Present
•
5 years, 2 months
● Corporate Pen Testing [Integrated Pen Testing]
● IT pen Testing
● Web App Pentest
● Red Teaming
● Cyber Security
● OSINT
● Naval OSINT
● Linux Administration / Linux distributions
● Bug Bounty
Oct, 2019 - Present
•
5 years, 2 months
Freelancer HR Recruiter and Consultant
Dec, 2016 - Present
•
8 years, 1 month
Self Employed
Dec, 2016 - Present
•
8 years, 1 month
HR Resourcing
HR Strategy
HR BP
HR Consulting
Business equipment and computer applications used:
Taleo- SAP -MS Word-MS Excel -MS
PowerPoint-MS Outlook -MS Windows
Recruiter Job-boards: Bayt-Wuzzuf-LinkedIn-My Own Network and connections
Dec, 2016 - Present
•
8 years, 1 month
Education
Minufiya University
2003 - 2007
•
4 years
Bachelors In Business Administration
Egypt
2003 - 2007
•
4 years
Qualifications
Data Analytics Technical Diploma
2019
Institute of Management Professionals
Data Analysis /Advanced Microsoft Excel/ DAX/ Power Query/ Power Pivot / Data Models / SQL Query / SQL Management Studio / Power BI / Data Modeling / Data Visualization / Query Writing / Database Queries / Query Optimization
2019
Invite sent successfully!
Thanks! We’ve emailed you a link to claim your free credit.
Something went wrong while sending your email. Please try again.