
Rida Sughra
Cybersecurity specialist Risk Assessment Expert CCEH CRTOM
Competenze

Consulta i miei servizi

Esperienza lavorativa
Cybersecurity Risk Assessment Specialist
Self Level • Freelance
Jan 2024 - Present • 2 yrs 4 mos
As a Cybersecurity & Ethical Hacking professional (CEH-aligned / CCEH-style expertise), I specialize in risk-based penetration testing, vulnerability assessment, and attack surface analysis for web applications, APIs, networks, and cloud environments. My approach follows CRTOM / red-team methodologies, aligned with OWASP Top 10, NIST, and ISO 27001 security principles, ensuring real-world attack simulation and risk-prioritized reporting. Core Services Risk Assessment & Security Analysis I perform in-depth analysis of your infrastructure to identify threat vectors, attack surfaces, misconfigurations, and business risks, using CVSS scoring, DREAD modeling, and attack chain mapping. Manual Penetration Testing (Web / API / Network) Focused manual testing (not just automated scanning) covering OWASP Top 10 vulnerabilities: Broken Access Control (IDOR, privilege escalation) Cryptographic Failures (weak encryption, insecure storage) Injection Attacks (SQLi, NoSQLi, OS Command Injection, SSTI) Insecure Design & Business Logic Flaws Security Misconfiguration (cloud misconfig, exposed admin panels) Vulnerable & Outdated Components Authentication & Session Management Failures Data Integrity Issues Logging & Monitoring Weaknesses SSRF & API security flaws CRTOM / Red Team Simulation Initial access techniques Privilege escalation Lateral movement Persistence mechanisms Post-exploitation analysis Tools & Methodology (Hybrid Manual + Advanced Tools) I combine manual expertise with industry tools: Burp Suite (Proxy, Repeater, Intruder, Scanner) OWASP ZAP (DAST & manual testing support) Nmap / Masscan (network reconnaissance) Nessus / Nikto (vulnerability scanning) Browser DevTools (DOM, client-side analysis) Custom payloads & exploit validation techniques What You Will Receive Detailed Professional Security Report Executive Summary (for management) Technical Findings with Proof of Concept (PoC) Risk-based prioritization (Critical / High / Medium / Low)