Yazeed Alewah

Yazeed Alewah

Penetration Tester
1 yrs experience
Jordan In 2 weeks
Summary

No summary provided.

Overview

Yazeed Alewah is a dedicated Penetration Tester and Bug Bounty Hunter with strong expertise in offensive security, red teaming, and vulnerability research. He has a proven track record of identifying critical security flaws across complex environments, with impactful disclosures to well-known organizations such as Amazon, BMW, Ubisoft, Unity, and Lululemon. Backed by industry-recognized certifications including eWPTX and eCPPT, Yazeed specializes in web application security, network penetration testing, and adversary simulation. His work focuses on improving organizational security posture through real-world attack emulation, deep technical analysis, and responsible vulnerability disclosure.

Experience Highlights
  • Successfully reported vulnerabilities to major enterprises including Amazon, BMW, Ubisoft, Unity, Lululemon.
  • Performed network and web application penetration testing, including internal/external assessments, privilege escalation, and attack path discovery
  • Contributed to real-world adversary simulation and red team–style assessments, replicating threat actor techniques and post-exploitation behavior.
  • Authored impactful security reports and remediation guidance to help organizations strengthen their defensive posture.
  • Discovered CVE-2025-50475, a critical OS command injection vulnerability affecting embedded systems.
Core Strengths
Penetration Tester Red Teaming API Security Web Application Security , AI Security , Network/AD security
Deliverables
Comprehensive Security Assessment
Attack path discovery, privilege escalation, and lateral movement
Mapping findings to realistic threat scenarios and business impact
Actionable & Professional Reporting
Improved security posture through realistic attack emulation
Tools & Frameworks
Burp Suite Metasploit Nmap Nessus OWASP ZAP BloodHound privilege escalation techniques lateral movement AD abuse WAF bypass authentication bypass business logic testing OWASP Top 10 adversary simulation vulnerability research responsible disclosure