Hello, my name is

Asad Ahmad

OSINT Investigator | Security Researcher

image hd
About me

I am a dedicated OSINT (Open Source Intelligence) investigator and a security researcher with a passion for uncovering valuable insights through public online resources.

A dedicated OSINT (Open Source Intelligence) Investigator and a Security Researcher

With years of experience in OSINT investigations, I have honed the skills to gather and analyze open-source data to meet specific investigative needs. I’ve worked on various projects, providing detailed intelligence reports and insights to specific focuses and requirements, so you can trust me to support your investigation effectively.

Throughout my career, I’ve specialized in different aspects of OSINT, including social media analysis, Profiling Individual(s), geolocation tracking, and data validation. Having worked on numerous live cases. With me, you won’t be limited to one approach—I provide multiple perspectives, ensuring that we find the best possible path forward together.

What I do

From understanding your investigative objectives to gathering and analyzing open-source data, I handle every step of the OSINT process. I start by developing a clear strategy, then gather relevant information from public sources, and finally deliver actionable insights to support your goals. I ensure a comprehensive and thorough approach to every stage, providing you with valuable intelligence to make informed decisions.

Web Intelligence - WEBINT

Web intelligence involves gathering information from various online sources, such as websites, social media platforms, forums, and blogs, to track trends, identify patterns, and make informed decisions.

Social Media Intelligence - SOCMINT

This form of intelligence focuses specifically on online social networks such as Facebook, Twitter, Instagram, LinkedIn, or any other platforms where people share personal, professional, and public content.

Manhunting

Using publicly available data to locate, track, and profile individuals. This practice leverages open-source materials—such as social media profiles, news articles, government databases, geolocation data, and various digital footprints left behind on the internet—to gather intelligence about a person’s identity, whereabouts, relationships, or activities.

Profiling Individual - HUMINT

When profiling an individual through HUMINT, investigators or intelligence professionals look at a range of factors, including personal history, psychological patterns, social interactions, and even subtle behaviors. It helps identify potential threats, vulnerabilities, or opportunities and supports decision-making in a variety of cases or situations

Geospatial Intelligence - GEOINT

GEOINT involves the collection, analysis, and interpretation of geographic information to gain insights about physical locations, terrain, infrastructure, and human activities.

Breached Information Lookup

Breached Information Lookup is an OSINT (Open-Source Intelligence) service designed to help individuals and organizations identify whether their sensitive information has been exposed in data breaches. By leveraging publicly available breach databases, underground forums, and dark web sources, this service provides users with actionable insights to mitigate potential security risks.

Skills

Research and Analytical Skills
85%
Knowledge of OSINT Tools and Technologies
95%
Cybersecurity Awareness
90%
Social Media and Digital Footprint Analysis
80%

My Experience

2021-2024

PTA – Pakistan Telecommunication Authority

MTO Manager Traineeship Officer

I was a part of an amazing cyber security team and worked on projects include:
• Osint
• Socmint
• Webint
• Manhunting
• Geoint

2015-2019

Govt of Pakistan

Sr. Penetration Tester

Worked for a long term project with government and conducted:
R&D / VAPT(Vulnerability Assessment and Penetration Testing)
• Web Applications
• Wired & Wireless Networks
• Hardware
OSINT(Open Source Intelligence)
• Emails
• IP address
• Mobile & Fixed Line
• Image
• Website(s)
• Social Media Accounts
• Manhunting

2013-2015

Deltasoft Technologies

Information Security Research Officer

I was responsible for all cyber ops in-house and include vulnerability assessments and penetration testing based assignments. I took pride in having helped the best of our clients and getting maximum growth for the company.

Portfolio