a
adel_ad

Adel

@adel_ad

Vetted Pro

Cybersecurity Professional Services

Arabie Saoudite
Anglais, Arabe
Certaines informations sont présentées en anglais.
Certifié par Fiverr Pro

Adel a été sélectionné par l'équipe Fiverr Pro pour son expertise.

Certifié pour

  • Cybersécurité

À propos de moi
I’m a Senior Consultant at PwC Middle East with over 8 years of hands-on experience in penetration testing and vulnerability assessment, supporting multiple enterprise clients across various industries. As a certified professional (OSCP+, eWPTx, eMAPT, CEH), I deliver advanced security assessments for network infrastructure, web/mobile applications, and thick-client systems. My methodology aligns technical execution with business objectives, ensuring that every engagement produces a strategic, risk-prioritized report with clear, actionable remediation steps. ... Plus d’infos

Compétences

a
adel_ad
Adel
150 $US/heure
hors ligne • 
Temps de réponse moyen de 1 heure

Voir mes services

Test d'évaluation et de pénétration
I will perform vapt and find real vulnerabilities in your system
Support informatique
I will perform pentesting to find critical vulnerabilities in your network, web, mobile

Vous souhaitez travailler sur une base horaire ?

Dites à Adel ce dont vous avez besoin.

150 $US

/

heure

Portfolio

Expérience professionnelle

PwC

PwC Cybersecurity Senior Consultant

PwC • Temps plein

May 2023 - Present3 yrs

I have hands-on experience in cybersecurity with a strong focus on Vulnerability Assessment and Penetration Testing (VAPT). My work involves identifying security weaknesses in web applications, networks, and systems, and providing practical remediation recommendations to enhance overall security posture. Throughout my experience, I have discovered and validated multiple vulnerabilities, including user enumeration issues, exposure of sensitive data through publicly accessible resources, and misconfigurations in application environments. I have also conducted assessments that revealed internal infrastructure details such as backend technologies, hidden endpoints, and system configurations.