HimalayasHimalayas logo
aamir UserAU
Open to opportunities

aamir User

@aamiruser

Passionate vulnerability researcher focused on turning CVEs into working PoCs for real-world impact.

United Kingdom
Message

What I'm looking for

I’m looking for a role where I can keep sharpening my vulnerability research skills, publish strong results, and contribute to real-world exploitation. I want mentorship-level rigor and a path to becoming elite—ideally leading toward Pwn2Own.

I’m an exceptionally passionate Vulnerability Researcher committed to overcoming challenges to deliver high-quality results. I ranked in the top 1% of my college class with consistently achieving perfect scores, and I was among the top 100 participants in the UK's Cyber Discovery Challenge.

I’m a proud member of the Cyber Elite program, and I’ve invested time into developing business concepts and systems independently. My goal is to further hone my skills as a Vulnerability Researcher—becoming one of the elite in the industry and taking part in prestigious events such as Pwn2Own.

Professionally, I’ve worked across telecommunications penetration testing and vulnerability research, including web application and infrastructure testing. I build research workflows around emulators, low-level proxying tools, fuzzing (including proprietary fuzzers), and turning public CVEs into working PoCs—then I share findings through documentation, demos, and teaching others.

Experience

Work history, roles, and key accomplishments

NG
Current

Telecommunications Penetration Tester

NCC Group

Jan 2025 - Present (1 year 4 months)

Performed internal/external telecommunications penetration testing, including Kubernetes and Docker assessments and cloud-based testing focused on telecom environments. Developed and used low-level tools for 5G core security analysis and auditing support.

UU

Vulnerability Researcher

UK Telecoms Lab (UKTL)

Jan 2023 - Jan 2025 (2 years)

Conducted vulnerability research and security testing for telecommunications systems, with emphasis on 5G technologies and low-level protocol understanding. Produced documentation and communicated findings through reports and demos.

SL

Penetration Tester

Secarma Ltd

Jan 2022 - Jan 2023 (1 year)

Delivered web application and infrastructure penetration testing, covering internal and external targets. Supported engagement work with reverse engineering, debugging, and structured report writing.

Education

Degrees, certifications, and relevant coursework

UU

UKTelecomsLab (UKTL)

Business Studies, Business Studies

2023 - 2025

Grade: D

Activities and societies: Developed skills related to 5G systems and low-level protocols, including writing auditing tools for 5G core.

Completed a Business Studies component at UKTelecomsLab (UKTL), earning a D grade.

BF

Bolton Sixth Form

BTEC IT, Information Technology

2018 - 2020

Grade: 3 A*

Completed BTEC IT at Bolton Sixth Form, achieving 3 A* grades.

UB

UTC Bolton

Web Application and Infrastructure, Computer Science

2015 - 2018

Grade: Computer Science 7; Maths B; Physics 6; Chemistry 5; Biology C; English Lit & Lang 4

Studied Web Application and Infrastructure at UTC Bolton, completing coursework including Computer Science and Maths with top grades noted in the profile.

Tech stack

Software and tools used professionally

Find your dream job

Sign up now and join over 100,000 remote workers who receive personalized job alerts, curated job matches, and more for free!

Sign up
Himalayas profile for an example user named Frankie Sullivan