a
adel_ad

Adel

@adel_ad

Vetted Pro

Cybersecurity Professional Services

Arábia Saudita
Inglês, Árabe
Algumas informações são exibidas no idioma inglês.
Verificado pelo Fiverr Pro

Adel foi selecionado pela equipe do Fiverr Pro considerando sua experiência.

Verificado para

  • Segurança Cibernética

Sobre mim
I’m a Senior Consultant at PwC Middle East with over 8 years of hands-on experience in penetration testing and vulnerability assessment, supporting multiple enterprise clients across various industries. As a certified professional (OSCP+, eWPTx, eMAPT, CEH), I deliver advanced security assessments for network infrastructure, web/mobile applications, and thick-client systems. My methodology aligns technical execution with business objectives, ensuring that every engagement produces a strategic, risk-prioritized report with clear, actionable remediation steps. ... Saiba mais

Habilidades

a
adel_ad
Adel
US$ 150/hora
offline • 
Tempo médio de resposta: 1 hora

Conheça meus serviços

Teste de Avaliação e Intrusão
I will perform vapt and find real vulnerabilities in your system
Suporte de TI
I will perform pentesting to find critical vulnerabilities in your network, web, mobile

Quer trabalhar com remuneração por hora?

Diga a Adel o que você precisa.

US$ 150

/

hora

Portfólio

Experiência profissional

PwC

PwC Cybersecurity Senior Consultant

PwC • Período integral

May 2023 - Present3 yrs

I have hands-on experience in cybersecurity with a strong focus on Vulnerability Assessment and Penetration Testing (VAPT). My work involves identifying security weaknesses in web applications, networks, and systems, and providing practical remediation recommendations to enhance overall security posture. Throughout my experience, I have discovered and validated multiple vulnerabilities, including user enumeration issues, exposure of sensitive data through publicly accessible resources, and misconfigurations in application environments. I have also conducted assessments that revealed internal infrastructure details such as backend technologies, hidden endpoints, and system configurations.