Ahmed Abdelaziz
@ahmedabdelaziz1
Bug bounty and web application penetration tester focused on finding and fixing critical flaws.
What I'm looking for
I’m a Web Application Penetration Tester & Bug Bounty Hunter with 3+ years of experience identifying and mitigating security vulnerabilities. I’m known for uncovering critical issues through both manual and automated security testing.
My work focuses on exposing risks such as XSS, SQL Injection, CSRF, IDOR, and Broken Access Control. I use tools like Burp Suite, OWASP ZAP, and Nmap to investigate applications and validate impact.
I’ve been recognized in multiple Hall of Fame listings for discoveries in platforms including Stanford University, Alibaba, Fifth Third Bank, Swisscom, and others. I investigate and report findings, then collaborate with developers to understand and remediate the issues.
Experience
Work history, roles, and key accomplishments
Bug Bounty Hunter
HackerOne & Budcrowd
Feb 2023 - Present (3 years 3 months)
With 3+ years of web application penetration testing experience, conducted manual and automated security testing on HackerOne and Budcrowd programs, identifying and reporting vulnerabilities such as XSS, SQL Injection, CSRF, IDOR, and broken access control. Delivered notable findings across platforms including Comcast, Just Eat Takeaway, Dell, HBE Aruba, Under Armour, Canva, and collaborated with
Education
Degrees, certifications, and relevant coursework
Higher Institute of Engineering in Alshorouk Academy
Bachelor of Computer and Control Engineering, Computer and Control Engineering
Pursuing a Bachelor of Computer and Control Engineering at the Higher Institute of Engineering, Alshorouk Academy, expected to graduate in July 2027.
Availability
Location
Authorized to work in
Job categories
Interested in hiring Ahmed?
You can contact Ahmed and 90k+ other talented remote workers on Himalayas.
Message AhmedFind your dream job
Sign up now and join over 100,000 remote workers who receive personalized job alerts, curated job matches, and more for free!
