}}
Jobyer Ahmed

About Jobyer Ahmed

Cybersecurity Expert

Founder of Bytium LLC, delivering advanced cybersecurity and risk engineering solutions through practical, research-driven expertise.

Why clients hire me

OSCE3 • OSCP • CNVP
  • Senior-led, OSCE3-level manual + automated testing
  • Developer-ready remediation guidance with free retest
  • Compliance-ready reporting aligned with ISO 27001 / SOC 2 / OWASP
  • Delivered and verified through Bytium LLC

Typical engagements

App/API Pentest
Manual, risk-based testing for critical flows
Cloud Security Review
AWS / Azure / GCP hardening and guardrails
Red-Team Advisory
Threat modeling, readiness, and remediation plans

Ready to talk?

Who I am

Cybersecurity professional, founder, and security lead at Bytium LLC, focused on helping organizations identify, assess, and reduce cyber risks through practical, engineering-led solutions.

My work spans offensive security, vulnerability management, and security architecture, guided by globally recognized frameworks such as ISO 27001, SOC 2, OWASP, and NIST CSF.

I approach security as an enabler of business, combining technical depth with strategy to build systems that are resilient, compliant, and built to last.

Core skills

Certifications & Badges

Offensive Security Certified Expert 3 (OSCE3)
OffSec
Offensive Security Exploit Developer (OSED)
OffSec
Offensive Security Web Expert (OSWE)
OffSec
Offensive Security Experienced Penetration Tester (OSEP)
OffSec
RastaLabs
Hack The Box
Offensive Security Certified Professional (OSCP)
OffSec
Ethical Hacking: Hacking Web Servers and Web Applications
LinkedIn
Advanced+ Penetration Testing Certified
Virtual Hacking Labs
Penetration Testing
Virtual Hacking Labs
CompTIA Network Vulnerability Assessment Professional – CNVP
CompTIA
CompTIA PenTest+ ce
CompTIA
CompTIA Security+ ce
CompTIA
Google IT Support Professional Certificate
Google

Research: CVEs & Exploits

Tools I use

Timeline

Cybersecurity Expert & Founder Bytium LLC • Jan 2024 — Present · New York, USA
Leads Bytium LLC, a global cybersecurity and IT consulting firm protecting SMBs from modern cyber threats. Provides senior-led penetration testing, vulnerability assessment, and red-team advisory services. Manages client delivery, strategy, and technical leadership across engagements.
Security Consultant & Advisor BrosPly Ltd • 2022 — 2024 · Remote
Provided cybersecurity consulting and advisory services focused on security architecture design, vulnerability assessment, and risk management. Supported clients in aligning policies with industry standards, strengthening compliance programs, and developing technical security documentation for both internal and external initiatives.
Founder & Cybersecurity Researcher Rednode Services Ltd • Feb 2022 — Jan 2024 · Dhaka / Remote
Established a research-focused security lab performing exploit development, Active Directory exploitation, and vulnerability research. Published multiple CVEs, exploit advisories, and trained engineers on secure development.
Penetration Tester Red Team Partners (Contract) • Oct 2022 — May 2023 · London, UK
Performed enterprise-grade penetration testing for web, infrastructure, and cloud environments. Delivered detailed, developer-ready remediation reports with business impact analysis.
Cyber Security Specialist Freelancer.com • Jun 2020 — Dec 2021 · Remote
Performed black-box web and network pentests for global SMB clients. Delivered actionable findings and remediation verification.
Cyber Security Specialist Cyber Armed Security • Jan 2021 — Aug 2021 · United Kingdom
Executed web application penetration testing, authored in-depth technical reports, and validated fixes post-remediation.
Cyber Security Specialist Self Employed • Feb 2010 — Jun 2021 · Remote
Provided independent consulting in web security, vulnerability scanning, and incident response. Helped clients implement remediation and strengthen overall security posture.
CTF Player Hack The Box • May 2018 — Jan 2020 · Remote
Completed RastaLabs (Active Directory-focused lab). Specialized in lateral movement, privilege escalation, and red-team simulation.
Technical Support Specialist Self Employed • Feb 2007 — Jan 2014 · Remote
Delivered remote troubleshooting and IT administration, forming the foundation of deep technical problem-solving skills.

FAQ

What types of pentests do you run?
Black/gray box web apps, APIs, mobile (basic), and cloud posture checks; reports include remediation paths.
Do you sign NDAs and handle sensitive systems?
Yes. Standard security and legal processes are in place.
How do I engage you for a pentest or security audit?
Start by contacting me via the contact page with a brief scope and timeline. I’ll provide a written proposal with deliverables, timeline, and pricing.
What does a typical report look like?
Reports include an executive summary, prioritized findings, technical details, reproduction steps, and recommended fixes with severity ratings.
Do you offer training or workshops?
Yes — I offer tailored workshops for secure development practices, manual pentesting fundamentals, and red team awareness sessions. Contact for availability and pricing.