## ABOUT
Diligent and security-focused VAPT professional with hands-on experience assessing, validating, and mitigating security risks across enterprise and regulated environments. Strong command of the full VAPT life cycle — scoping, vulnerability discovery, manual exploitation, impact analysis, reporting, and remediation verification.
Experienced in compliance-driven assessments and security assurance engagements, delivering clear, risk-based findings aligned with industry and regulatory requirements (SAMA CSF). Certified in OSCP, eMAPT, eCPPTv2, and eJPTv2 — supporting the security posture of organizations such as SecurEyes, Cyber Gain Center, and Resecurity across financial and enterprise sectors.
## SKILLS
// Offensive Security
- Penetration Testing (Black/Gray/White Box)
- Red Teaming & Attack Simulation
- Vulnerability Assessment
- Network Pivoting
- Privilege Escalation (Win/Linux)
- Active Directory Attacks
// Application Security
- Web Application Security
- Mobile Application Security
- Vulnerability Research
- Information Gathering
- Report Writing
// VA Tooling & Platforms
- Tenable Security Center
- Tenable Nessus
- Tenable Cloud
- Configuration & Compliance Review
- Firewall Review
- Image Certification
// Engineering & Tech
- Kali Linux
- Python
- Linux / Windows
- Network Security
- Server Commissioning
- Security Controls
- CTF Development (Win / Linux / AD / Android)
// Compliance & Frameworks
- SAMA Inspection Visits
- Security Control Review & Enhancement
- Security Assurance Engagements
- Risk-Based Reporting
- Remediation Verification
// Soft Skills
- Team Management
- Team Player & Collaboration
- Rapid Learning
- Patience
- Client-Facing Communication
// Languages
- Arabic — Native
- English — C2 (Proficient)
- Turkish — A2 (Speaking)
## EXPERIENCE
VAPT Consultant — SecurEyes
- Operating Tenable Security Center & Nessus for VA activities at BSF, SAMA and other clients — covering Server Commissioning, Image Certification, Configuration Review, Attack Simulation, Security Control Review & Enhancement, Firewall Review, and Compliance.
- Leading the revalidation team for 20+ Financial Technology companies under the SAMA Inspection Visits Project.
- Delivered security assessments for 15+ companies (Black Box, Gray Box, Red Teaming).
Cybersecurity Developer — Cyber Gain Center
- Built vulnerable machines across Windows, Linux, joint-domain AD, and Android targets
- Designed realistic CTF challenges for trainee & client programs
- Hosted training sessions on offensive techniques and tradecraft
Cybersecurity Researcher Intern — Resecurity
- Completed advanced training tracks via INE
- Earned the eCPPTv2 certification during the program
- Vulnerability assessment & penetration testing engagements
- Reporting and remediation guidance for client findings
## CERTIFICATIONS
Offensive Security Certified Professional
OffSec · APR 2024
Info Gathering · AD · PrivEsc · Pivoting · Reporting
eLearnSecurity Mobile App Pentester
INE / eLearnSecurity · JAN 2025
Mobile PT · App Security · Networking
Certified Professional Penetration Tester
INE / eLearnSecurity · AUG 2023
Network Sec · PT · Network Admin
Junior Penetration Tester
INE / eLearnSecurity · MAR 2023
Ethical Hacking · Hacking · PT
## EDUCATION & TRAINING
BSc, Computer Science
Sudan University of Science and Technology
Khartoum, Sudan
Graduation Project: Digital SUD — E-Government Authentication Service
PEN-200 / PWK — OSCP Preparation
Offensive Security — Online
Information Gathering, Win/Linux PrivEsc, Active Directory, Networking, Reporting.
Erasmus+ Training
European Union · University of The Republic
Sivas, Türkiye
Field of study: Networking.
## CONFERENCES
BHMEA — CTF
Black Hat MEA Conference
Participated in the Capture-the-Flag competitions.
## VOLUNTEERING
CEO / Executive Director
Next Sudan Initiative
Overall leadership, strategic direction, and decision-making.
Head of Information Technology
Next Sudan Initiative
Owned the initiative’s website uptime and intake-form infrastructure.
Webmaster
GCC-Region IVAO
Maintained the GCC website & built a hub for staff and non-staff usage.
## CONTACT
$ ./establish_connection.sh
[+] handshake complete — secure channel open
$ cat contact.json
{
"name": "Mazin Ahmed",
"role": "VAPT Consultant @ SecurEyes",
"location": "Riyadh, Saudi Arabia",
"email": "mazin.ahmed@mrehacker.com",
"linkedin": "linkedin.com/in/mazin-ahmed-Ibrahim"
}
$ _