About Me#

Hi, I’m Ahmed El-Ganainy πŸ‘‹.
I’ve always been curious about how systems work β€” and what happens when they don’t. That curiosity led me into cybersecurity, where I spend my time exploring apps, networks, and cloud systems to find hidden risks and help make them safer.

When I’m not testing systems, I enjoy building labs, learning new tools, and sharing what I know with the community.


What I Do#

  • I break things (ethically) πŸ•΅οΈβ€β™‚οΈ β€” web apps, mobile apps, networks, and even Active Directory setups.
  • I fix things πŸ”§ β€” working closely with developers to explain vulnerabilities and guide secure coding practices.
  • I build things ⚑ β€” custom scripts, labs, and methodologies that make pentesting more efficient and repeatable.

Along the way, I’ve had the chance to work with banks, enterprises, and government organizations across the region, performing red teaming, secure code reviews, and cloud security assessments.


Professional Journey#

Vulnerability Assessment & Penetration Testing Consultant#

2P Perfect Presentation β€” Feb 2025 – Present

Information Security Consultant#

ZINAD IT β€” Feb 2023 – May 2025

Information Security Engineer#

Security-Meter β€” Feb 2022 – Jan 2023


A Few Highlights#

  • Helped organizations find and fix critical vulnerabilities before attackers could.
  • One of my favorite things outside of client work is running CTF competitions and exchanging ideas with the security community in Oman, Qatar, Egypt, and Saudi Arabia.
  • Explored mobile security in depth.
  • Currently leveling up my skills with the OSCP certification.

Certifications#

  • CRTO β€” Certified Red Team Operator
  • CRTE β€” Certified Red Team Expert
  • EMAPT β€” Mobile Application Penetration Tester
  • OSCP β€” Offensive Security Certified Professional (in progress)
  • HTB BlackSky Cloud Security Specialist
    • CYCLONE (Azure)
    • HALISTORM (AWS)
    • BLIZZARD (GCP)

Outside of Work#

When I’m not digging into code or pentesting environments, you’ll probably find me:

  • Reading up on the latest security research.
  • Building small labs to test new attack techniques.
  • Sharing write-ups and learning resources for others starting in the field.

Let’s Connect#