Akees Portfolio
Secured 100+ Sites

Hi Dear,
I am MOHAMED AKEES

TryHackMe Status

Mohamed Akees
Available for Hire

About Me

I think like an attacker — so you don’t have to. I specialize in uncovering vulnerabilities before they turn into real-world breaches. Working with startups, enterprises, and security teams, I help identify hidden weaknesses across applications, infrastructure, and systems. From bug bounty hunting to red team engagements, I turn complex security risks into clear, actionable solutions. My focus is simple: reduce attack surface, strengthen defenses, and prevent incidents before they happen. Security isn’t just about finding bugs — it’s about building resilience.

Bug Bounty Hunting OSINT Penetration Testing Vulnerability Assessment CTF Technical Writeups

Education & Experience

Education

01/02/2018 - 01/02/2019
Bachelor of Engineering (Hons) in Computer Networking
Bachelor of Engineering (Hons) in Computer Networking, focusing on the design, implementation, and management of modern network infrastructures, with practical experience in…

Experience

01/07/2021 - Current
System Engineer
ADIB - Abu Dhabi Islamic Bank · Contract
01/02/2016 - 06/02/2018
IT Support Engineer
Mega Vision Computers Trading LLC · Full-time

Skills & Tools

A comprehensive collection of technical skills, tools, and technologies I've mastered to deliver secure and efficient solutions.

Linux Linux OWASP Top 10 OWASP Top 10 Snort Snort Sqlmap Sqlmap Gobuster Gobuster Hydra Hydra John the ripper John the ripper tcpdump tcpdump theHarvester theHarvester Shodan Shodan OpenVAS OpenVAS Nessus Nessus Parrot OS Parrot OS Kali Linux Kali Linux Wireshark Wireshark Metasploit Metasploit Nmap Nmap Burp Suite Burp Suite

Certificates

Verified credentials and certifications that validate my expertise in cybersecurity, penetration testing, and related fields.

Certificate of Membership certificate image

Certificate of Membership

Linux Professional Institute (LPI) • February 18, 2026
Microsoft Certified Professional certificate image

Microsoft Certified Professional

Microsoft • February 1, 2018
Microsoft Certified Azure Fundamentals certificate image

Microsoft Certified Azure Fundamentals

Microsoft • December 1, 2021
Microsoft Certified Security Compliance and Identity Fundamentals certificate image

Microsoft Certified Security Compliance and Identity Fundamentals

Microsoft • March 1, 2022
Microsoft Certified Azure AI Fundamentals certificate image

Microsoft Certified Azure AI Fundamentals

Microsoft • March 1, 2022
Linux Essentials certificate image

Linux Essentials

Linux Professional Institute (LPI) • March 1, 2022
LPIC-1 Linux Administrator certificate image

LPIC-1 Linux Administrator

Linux Professional Institute (LPI) • March 1, 2022
Microsoft Certified Security Operations Analyst certificate image

Microsoft Certified Security Operations Analyst

Microsoft • February 18, 2026
Microsoft Certified Azure Data Fundamentals certificate image

Microsoft Certified Azure Data Fundamentals

Microsoft • June 1, 2022
Microsoft Certified: Azure Network Engineer Associate certificate image

Microsoft Certified: Azure Network Engineer Associate

Microsoft • February 18, 2026
Microsoft Certified: Azure Database Administrator Associate certificate image

Microsoft Certified: Azure Database Administrator Associate

Microsoft • February 18, 2026

Awards & Recognitions

Notable achievements and recognition received for outstanding contributions to cybersecurity and professional excellence.

J2 Global – Information Security Team • 2021-12-01

Acknowledged & Rewarded 🇺🇸

Received recognition for responsible disclosure of a security vulnerability.

Eindhoven University of Technology • 2023-08-01

Acknowledged 🇳🇱

Acknowledged for responsible reporting of a security vulnerability.

Royal Netherlands Academy of Arts and Sciences (KNAW) • 2023-08-01

Acknowledged & Honored in Hall of Fame 🇳🇱

Recognized for responsible vulnerability disclosure.

BlackBerry • 2023-12-01

Acknowledged 🇨🇦

Acknowledged for responsible disclosure of a security vulnerability.

PaperCut Software • 2023-11-01

Acknowledged 🇦🇺

Recognized for responsible vulnerability disclosure.

Lufa Farms • 2023-12-01

Acknowledged 🇨🇦

Acknowledged for identifying and responsibly reporting a security vulnerability.

Quicko • 2024-01-01

Acknowledged & Rewarded 🇮🇳

Received recognition for responsible vulnerability disclosure.

Manchester Metropolitan University • 2023-12-01

Acknowledged 🇬🇧

Acknowledged for responsible disclosure of a security vulnerability.

CYSO • 2023-12-01

Acknowledged 🇸🇬

Recognized for responsible vulnerability disclosure.

NTUC Enterprise • 2023-09-01

Acknowledged & Honored in Hall of Fame 🇸🇬

Recognized for responsible vulnerability disclosure.

Department for International Trade (UK) • 2021-11-01

Acknowledged & Rewarded 🇬🇧

Acknowledged for responsible vulnerability disclosure.

Sri Lanka CERT • 2020-05-01

Acknowledged 🇱🇰

Recognized for responsible security vulnerability disclosure.

Events

Conferences, workshops, and speaking engagements where I've shared knowledge and insights with the cybersecurity community.

February 15, 2026

Ethical Hacking Awareness Program at Carmel Fatima College, Kalmunai

On 5th July 2018, we successfully conducted an Ethical Hacking Awareness Program for more than 100 students and…...

February 15, 2026

Cybersecurity & Ethical Hacking Awareness Session at Zahira College, Kalmunai

On 13th July 2018, we conducted a comprehensive Cybersecurity Awareness Program for over 30 students and teachers at…...

February 15, 2026

Cybersecurity & Ethical Hacking Awareness Program at KM-KM-AL-Manar Central College, Maruthamunai

On 4th July 2018, we conducted a Cybersecurity and Ethical Hacking Awareness Program for over 40 students and…...

Blog Posts & Articles

In-depth articles on cybersecurity trends, best practices, vulnerability research, and hands-on security solutions.

No blogs available yet.

Frequently Asked Questions

Quick answers to common questions about my services, methodologies, and professional background.

Do I need a security team to work with you?
No. I can work independently or alongside your internal teams.
Do you work with internal security teams?
Yes. I collaborate with SOCs, development teams, and internal security teams to ensure findings are clear, actionable, and aligned with existing workflows.
What makes your approach different?
I simulate real-world attacks, assess business impact, and provide clear, actionable guidance—not just automated scanning. My goal is to help teams fix issues quickly and strengthen their security posture.

Contact Me

Get in touch for consultations, collaborations, or inquiries about cybersecurity services and expertise.