Default Avatar
Candidate Name
Penetration Tester
Pakistan
Summary

Hi, I’m Asad Iqbal, an Information Security Researcher, Penetration Tester, and Bug Hunter, with deep expertise in Vulnerability Assessment and Ethical Hacking. I hold multiple industry-recognized certifications, including:
🔹 Offsec Certified Security Professional (OSCP)
🔹 Certified Red Team Professional (CRTP)
🔹 Modern Certified Red Team Analyst (MCRTA)
🔹 Certified Red Team Analyst (CRTA)
🔹 Certified Ethical Hacker (CEH)
I actively conduct manual and automated testing of Web Applications, Mobile Applications, and Network Infrastructure. My curiosity-driven mindset and ability to adapt quickly have helped me thrive across various cyber technology stacks and engagement types.

Area of Expertise:
➥ Penetration Testing & Vulnerability Assessment (VAPT)
➥ Red Teaming & Social Engineering
➥ Compromise Assessments & Configuration Reviews
➥ Source Code Reviews (Web, Mobile, APIs)
➥ Windows & Linux Infrastructure Exploitation
➥ Source Code Review
➥ AI Penetration Testing
➥ Security Tools & Frameworks:
🔹Parrot OS – Web & Network Exploitation Tools
🔹Kali Linux – Burp Suite, Nmap, Wireshark, Metasploit, Gobuster, WPScan, etc.
🔹Windows – Sysmon, PowerShell, WSL, Firewall, Registry
➥ Virtualization: VMware, VirtualBox
➥ Strong Reporting, Documentation & Communication Skills
➥ Project & Team Management in Offensive Security

Background:
🔹Cybersecurity Researcher with published research
🔹Holder of multiple CVEs (CVE-2024-51377, CVE-2024-46482)
🔹Proven experience across Red Team Operations, Web/Mobile/API Pentesting.

Work experience
01/05/2023
21/01/2026
Senior Consultant - Penetration Tester
04/04/2022
28/04/2023
Penetration Tester
03/05/2021
31/03/2022
Penetration Tester
Education & certifications
19/10/2020
04/08/2023
Master's Degree
Information Security
01/09/2016
30/09/2020
Bachelor of Science
Telecommunication Engineering
Qualification verified
Open to relocate
Skills
Cybersecurity Information Security Network Security Penetration Testing Ethical Hacking Vulnerability Assessment Incident Response Firewalls Cryptography Security Information and Event Management (SIEM) Cloud Security Application Security Security Operations Center (SOC) NIST Cybersecurity Framework OWASP Top 10 Kali Linux Metasploit Burp Suite Wireshark Nmap Python Blockchain Security Mobile Security CEH Security Assessments Red Team Exercises Nessus Qualys Security Research Vulnerability Management Security Awareness MITRE ATT&CK Framework AWS Security Team Collaboration PowerShell Sysmon Configuration API Security Testing Active Directory Security SQL AWS Azure Google Cloud Platform GCP

You need to log in as an employer to view full candidate details.