a
adel_ad

Adel

@adel_ad

Vetted Pro

Cybersecurity Professional Services

Arabia Saudita
Inglese, Arabo
Alcune informazioni sono riportate in lingua inglese.
Selezionato da Fiverr Pro

Adel selezionato dal team Fiverr Pro per la sua esperienza.

Selezionato per

  • Sicurezza informatica

Chi sono
I’m a Senior Consultant at PwC Middle East with over 8 years of hands-on experience in penetration testing and vulnerability assessment, supporting multiple enterprise clients across various industries. As a certified professional (OSCP+, eWPTx, eMAPT, CEH), I deliver advanced security assessments for network infrastructure, web/mobile applications, and thick-client systems. My methodology aligns technical execution with business objectives, ensuring that every engagement produces a strategic, risk-prioritized report with clear, actionable remediation steps. ... Continua a leggere

Competenze

a
adel_ad
Adel
150 USD/ora
offline • 
Tempo di risposta medio: 1 ora

Consulta i miei servizi

Valutazione e Test di penetrazione
I will perform vapt and find real vulnerabilities in your system
Assistenza e IT
I will perform pentesting to find critical vulnerabilities in your network, web, mobile

Vuoi lavorare su base oraria?

Spiega a Adel cosa ti serve.

150 USD

/

ora

Portfolio

Esperienza lavorativa

PwC

PwC Cybersecurity Senior Consultant

PwC • Full time

May 2023 - Present3 yrs

I have hands-on experience in cybersecurity with a strong focus on Vulnerability Assessment and Penetration Testing (VAPT). My work involves identifying security weaknesses in web applications, networks, and systems, and providing practical remediation recommendations to enhance overall security posture. Throughout my experience, I have discovered and validated multiple vulnerabilities, including user enumeration issues, exposure of sensitive data through publicly accessible resources, and misconfigurations in application environments. I have also conducted assessments that revealed internal infrastructure details such as backend technologies, hidden endpoints, and system configurations.