Dieser Nutzer erlaubt es nicht, dass andere Nutzer ihm folgen.
Sie folgen diesem Nutzer bereits.
Ihr Mitgliedschaftsplan bietet nur 0 Folgen an. Upgraden Sie hier.
Erfolgreich entfolgt
Fehler beim Nichtfolgen des Nutzers.
Sie haben erfolgreich empfohlen
Fehler beim Empfehlen des Nutzers
Ein Fehler ist aufgetreten. Bitte aktualisieren Sie die Seite und versuchen Sie es erneut.
E-Mail erfolgreich bestätigt.
Muhamed Ali E.
@Gypsy661
0,0
0
0,0
0,0
0%
Penetration Tester/ OSINT expert / Data Analyst
$40 USD / Stunde
・
Egypt (7:53 PM)
・
Joined on November 9, 2017
$40 USD / Stunde
・
With expertise in Offensive Cyber Security, HR management, leadership, communication, and problem-solving, I bring a unique blend of skills. Over the past 8 years, I advanced to a managerial role in HR, mastering organizational dynamics, employee relations, and strategic planning. My transition to cybersecurity leverages these skills to approach security from both technical and people/process perspectives. Passionate about identifying vulnerabilities, securing systems, and contributing to organizational resilience, I'm eager to apply my experience in challenging roles in cybersecurity and Business Development Management.
Security Skills:
Field Risk Assessment - Corporate Risk Assessment -Anti industrial Espionage- Threat Detection -Investigation Techniques [Business Development
Management Background]-Interrogation [HR Management Background]-Cybersecurity - Cybersecurity Research - Integrated Security- Integrated Security
Research - Naval Security - Network Security - Linux System Administration - Kali Linux - Linux distributions - Cyber Recon - Cyber Scanning - Network
Administration -Penetration Testing - Vulnerability Analysis - Vulnerability Assessment - Cyber Exploitation [viruses , Trojans , Payloads ]- RAT attacks -
DOS attacks -Onsite Pen Testing - Remote Pen Testing -Remote Naval Pen Testing - Naval Pen Testing - Remote Naval Pen Testing - Post Exploitation -
Webapp Pen testing - MITM Attacks -WIFI Access point cracking -Mobile devices Exploitation -Hacking labs- Mobile Hacking labs - Red Teaming - Red
Teaming Engagements- Dark web - Dark web OSINT - Dark web Investigation - Blockchain OSINT -Block Chain investigation - OSINT - Maltego -Marine
OSINT- Python Scripting - Lua Scripting - C Scripting
Enhancing Security Awareness: Understanding the Threats of S
Enhancing Security Awareness: Understanding the Threats of S
Enhancing Security Awareness: Understanding the Threats of S
Enhancing Security Awareness: Understanding the Threats of S
Enhancing Security Awareness: Understanding the Threats of S
Enhancing Security Awareness: Understanding the Threats of S
Enhancing Security Awareness: Understanding the Threats of S
Enhancing Security Awareness: Understanding the Threats of S
Enhancing Security Awareness: Understanding the Threats of S
Onsite Network Pentest
Onsite Network Pentest
Onsite Network Pentest
Onsite Network Pentest
Onsite Network Pentest
Onsite Network Pentest
Onsite Network Pentest
Onsite Network Pentest
Tor Circuit Implementation for Special Research Client
Tor Circuit Implementation for Special Research Client
Tor Circuit Implementation for Special Research Client
Tor Circuit Implementation for Special Research Client
HR Management [Telecom , IT, BI]
HR Management [Telecom , IT, BI]
HR Management [Telecom , IT, BI]
Enhancing Security Awareness: Understanding the Threats of S
Enhancing Security Awareness: Understanding the Threats of S
Enhancing Security Awareness: Understanding the Threats of S
Enhancing Security Awareness: Understanding the Threats of S
Enhancing Security Awareness: Understanding the Threats of S
Enhancing Security Awareness: Understanding the Threats of S
Enhancing Security Awareness: Understanding the Threats of S
Enhancing Security Awareness: Understanding the Threats of S
Enhancing Security Awareness: Understanding the Threats of S
Onsite Network Pentest
Onsite Network Pentest
Onsite Network Pentest
Onsite Network Pentest
Onsite Network Pentest
Onsite Network Pentest
Onsite Network Pentest
Onsite Network Pentest
Tor Circuit Implementation for Special Research Client
Tor Circuit Implementation for Special Research Client
Tor Circuit Implementation for Special Research Client
Tor Circuit Implementation for Special Research Client
Änderungen wurden gespeichert
0.0 · 0 Reviews
Bewertungen
Hier keine Bewertungen zu sehen!
Erfahrung
Penetration Tester- Bug Bounty Hunter
Dez., 2022 - Aktuell
•
2 Jahre
Hackerone
Dez., 2022 - Aktuell
•
2 Jahre
●Corporate Pen Testing [Integrated Pen Testing]
● IT pen Testing
● Web App Pentest
● Red Teaming
● Cyber Security
● OSINT
● Naval OSINT
● Linux Administration / Linux distributions
● Bug Bounty
Dez., 2022 - Aktuell
•
2 Jahre
Freelance Penetration Tester:
Okt., 2019 - Aktuell
•
5 Jahre, 2 Monate
Client Undisclosed / Location MEA -EU-US
Okt., 2019 - Aktuell
•
5 Jahre, 2 Monate
● Corporate Pen Testing [Integrated Pen Testing]
● IT pen Testing
● Web App Pentest
● Red Teaming
● Cyber Security
● OSINT
● Naval OSINT
● Linux Administration / Linux distributions
● Bug Bounty
Okt., 2019 - Aktuell
•
5 Jahre, 2 Monate
Freelancer HR Recruiter and Consultant
Dez., 2016 - Aktuell
•
8 Jahre, 1 Monat
Self Employed
Dez., 2016 - Aktuell
•
8 Jahre, 1 Monat
HR Resourcing
HR Strategy
HR BP
HR Consulting
Business equipment and computer applications used:
Taleo- SAP -MS Word-MS Excel -MS
PowerPoint-MS Outlook -MS Windows
Recruiter Job-boards: Bayt-Wuzzuf-LinkedIn-My Own Network and connections
Dez., 2016 - Aktuell
•
8 Jahre, 1 Monat
Bildung
Minufiya University
2003 - 2007
•
4 Jahre
Bachelors In Business Administration
Egypt
2003 - 2007
•
4 Jahre
Qualifikationen
Data Analytics Technical Diploma
2019
Institute of Management Professionals
Data Analysis /Advanced Microsoft Excel/ DAX/ Power Query/ Power Pivot / Data Models / SQL Query / SQL Management Studio / Power BI / Data Modeling / Data Visualization / Query Writing / Database Queries / Query Optimization
2019
Einladung erfolgreich zugesendet!
Danke! Wir haben Ihnen per E-Mail einen Link geschickt, über den Sie Ihr kostenloses Guthaben anfordern können.
Beim Senden Ihrer E-Mail ist ein Fehler aufgetreten. Bitte versuchen Sie es erneut.