Ethical Hacker  ·  Bug Bounty Hunter  ·  CTF Player

Akash
Basnet

@Noneofyou  ·  Ethical Hacker  ·  Silicon Valley
📍 Sunnyvale, CA  ·  🇳🇵 Nepal → 🇺🇸 NVIDIA HQ

Eight years building enterprise IT. Two-plus years finding what others miss — every disclosure responsibly reported and credited. Acknowledged by Google, Apple, Microsoft, Meta, BBC News, Harvard, Cambridge, Intel, Huawei, McAfee, ESET, Lenovo, and many more. Once trusted to secure Nepal’s federal government from inside Singha Durbar. Today, an IT Intern at NVIDIA HQ in Silicon Valley.

// status: hunting
Akash Basnet
zsh — akash@nvidia ~ whoami
akash@nvidia:~$ whoami --verbose
 
## IDENTITY ─────────────────────────────────────────
  name   » Akash Basnet
  alias  » @Noneofyou
  base   » Sunnyvale, CA, USA 🇺🇸
  origin » Jhapa, Nepal 🇳🇵 (countryside)
  email  » basnetakash46@gmail.com
## EXPERIENCE ───────────────────────────────────────
  cybsec » 2+ yrs · hands-on security researcher
  it     » 8+ yrs · IT specialist
## CURRENT ──────────────────────────────────────────
  work   » NVIDIA — Technical Support Analyst (SRO)
  since  » Jan 2026
  scope  » global endpoint support · Win/macOS/Linux
## BUG BOUNTY HALL OF FAME ──────────────────────────
  google » $10K+ · "Nice catch" — Google Security Team 🎯
  apple  » apple.com Security Acknowledgements 2020
  msft   » MSRC Acknowledgements 2020
  meta   » facebook.com/whitehat — Hall of Fame
  +      » BBC News, Harvard, Cambridge, ESET, McAfee,
          Intel, Lenovo, Huawei, Nokia, Hamropatro, Kantipur
## CTF & CONFERENCES ────────────────────────────────
  winner» 🥇 Pre-DEF CON CTF — HackerDojo, Silicon Valley
  defcon» attended × 2 · Caesars Palace, Las Vegas
  blkhat» Black Hat USA · attended × 1, Las Vegas
  wiz   » Wiz CTF — Top 50 / 500
  dod   » DoD USA CTF — Top 500 / 5,000
## NEPAL FEDERAL GOV ────────────────────────────────
  secured» Singha Durbar · PMO · 5 ministries
─────────────────────────────────────────────────────
 
akash@nvidia:~$ still hunting
8+
Yrs IT Specialist
2+
Yrs Cybersecurity Research
15+
Hall of Fames
$10K+
Bug Bounties
🥇
Pre-DEF CON Winner
DEF CON Attendee
Black Hat Attendee
// Ethical hacking

Bug Bounty Hall of Fame

Recognized for responsibly disclosed vulnerabilities by the world’s most rigorous security teams — including Google, Apple, Microsoft, Meta, BBC News, Harvard University, University of Cambridge, Intel, Huawei, McAfee, ESET, Lenovo, and many more. Each acknowledgement below represents a confirmed vulnerability, triaged and credited by a Fortune-500 or world-class security program.

GOOGLE VRP · HOF
Google Bug Hunters — Akash Basnet · Hall of Fame, bounty reward, and Nice catch acknowledgement

Google Bug Bounty

Vulnerabilities responsibly disclosed across Googleplex, Waze, and Google internal assets — each one confirmed and triaged by the Google Vulnerability Reward Program panel. Credited on the Google Bug Hunters Leaderboard, listed in Google’s Hall of Fame, and financially rewarded by the Google Security Team.

Among the receipts: a personal reply from Martin, Google Security Team — one of the rarest direct acknowledgements in the bug-bounty world.

“Nice catch! I’ve filed a product bug for this issue. We’ll work with the product team to ensure this issue is addressed.” — Martin, Google Security Team · status: ACCEPTED
Google VRP Hall of Fame Cash Bounty “Nice Catch” Reply Googleplex Waze
Harvard
Harvard University thank-you letter
Harvard University
Personal letter from Christian Hamer, CISO, Harvard University Information Technology.
CISO Letter · 2019
Cambridge
University of Cambridge CSIRT letter
University of Cambridge
Letter on Cambridge letterhead from Vin Everett, CSIRT Analyst.
CSIRT Letter · 2019
Intel
Intel Certificate of Appreciation
Intel Corporation
Certificate of Appreciation signed by Matt White, Investigations Manager.
Certificate · 2019
McAfee
McAfee Certificate of Acknowledgement
McAfee
Certificate of Acknowledgement signed by Grant Bourzikas, CISO of McAfee.
CISO Certificate
ESET
ESET acknowledgement letter
ESET
Official letter from Daniel Chromek, CISO of ESET s.r.o., Bratislava.
CISO Letter · 2021
Apple
Apple Web Server Notifications
Apple
Vulnerability on filemaker.com (Apple-owned). Listed on Apple’s public Web Server Security Notifications.
Apple Credits · 2020
Microsoft
Microsoft MSRC acknowledgement
Microsoft
Reflected XSS on a Microsoft acquisition. Listed in official MSRC Acknowledgements.
MSRC · 2020
Meta
Facebook Security Team $750 bounty award
Meta (Facebook)
$750 bounty from the Facebook Security Team via Bugcrowd / HackerOne.
$750 Bounty · HOF
BBC News
BBC News Security Disclosure page
BBC News
Top of BBC News Security Disclosure 2020 list — rate-limit-bypass vulnerability.
BBC News VDP · 2020
Huawei
Huawei Letter of Acknowledgement
Huawei
Formal Letter of Acknowledgement from Huawei PSIRT & IT CTR.
PSIRT Letter · 2020
Lenovo
Lenovo PSIRT Letter of Acknowledgement
Lenovo
Official Letter of Acknowledgement from Lenovo PSIRT for responsible disclosure of a security vulnerability.
PSIRT Letter
// Competitions

CTF Results

From a countryside village in Nepal to standing inside Caesars Palace, Las Vegas — DEF CON badge in hand.

1ST PLACE
Pacific Hackers Association — Akash Basnet wins Pre-DEFCON CTF

Pre-DEF CON CTF — Winner

From a countryside village in Nepal to standing inside Caesars Palace, Las Vegas, with a DEF CON badge in hand. Won the Pacific Hackers Pre-DEF CON Capture the Flag at HackerDojo, Silicon Valley — the qualifier drawing elite hackers preparing for DEF CON in Las Vegas. Took 1st place, publicly congratulated by the Pacific Hackers Association.

Subsequently invited to and attended DEF CON twice in Las Vegas, plus Black Hat USA in Las Vegas.

DEF CON Las Vegas Caesars Palace Black Hat USA Pacific Hackers WiCyS Silicon Valley
Top 50
Wiz CTF
Cloud-security competition by Wiz. Top 10% in a field of specialized cloud security professionals.
Top 500
U.S. DoD CTF
U.S. Department of Defense cybersecurity competition. Top 10% out of 5,000 participants.
× 2
DEF CON Las Vegas
World’s most prestigious hacking conference. Invited and attended twice.
× 1
Black Hat USA Las Vegas
World’s premier information security conference. Attended in Las Vegas.
// Media

Featured in National Press

Covered by Nepal’s biggest newspapers and tech publications — The Annapurna Express, Tech Pana, Capital Nepal, Gorkhapatra (est. 1901), Shilapatra, Living with ICT, and more.

The Annapurna Express feature
The Annapurna Express
National English newspaper
Cybersecurity feature interview
Tech Pana — Google reward for Nepali hacker
Tech Pana
Nepal’s #1 tech media
“Nepali ethical hacker rewarded by Google” — cash reward coverage
Tech Pana — Meta / Facebook reward coverage
Tech Pana
Nepal’s #1 tech media
Meta / Facebook bounty — reward coverage in Nepali press
Tech Pana — Another Google vulnerability discovered by Nepali hacker
Tech Pana
Nepal’s #1 tech media
“Nepali ethical hacker discovers another Google vulnerability”
Capital Nepal feature
Capital Nepal
English business & affairs magazine
Tech feature on responsible disclosure
Gorkhapatra Saturday edition feature
Gorkhapatra
Nepal’s oldest national daily · est. 1901
“Bug Bounty” — youth attraction (Saturday edition)
// Career history

Professional Experience

10+ years across enterprise IT, cybersecurity, and government infrastructure — from Nepal’s federal seat to NVIDIA HQ.

2026 — Present
NVIDIA Corporation
Technical Support Analyst · SRO Support Team
📍 Santa Clara, CA
  • Resolve high-priority remote and walk-in tickets via ServiceNow for a globally distributed workforce.
  • Cross-platform laptop reimaging and full hardware lifecycle — Windows, macOS, Linux — with rigorous QA.
  • White-glove in-person support at the NVIDIA Tech Lounge for VPN, Wi-Fi, Outlook, drivers, and AI tooling.
  • Document recurring incidents and root-cause patterns in the internal knowledge base.
Aug — Dec 2025
Year Up United
IT Support Training · Corporate Internship Track
📍 San Jose, CA
  • Intensive IT career development program leading to placement at NVIDIA.
  • Coursework: Computer Architecture, Network Configuration, Device Management, Troubleshooting.
2021 — 2022
Federal Government · Singha Durbar
Technical Support Analyst · Ministry of Law, Justice & Parliamentary Affairs
📍 Singha Durbar, Kathmandu, Nepal
  • Worked inside Singha Durbar — Nepal’s seat of federal government — supporting multiple ministries.
  • 50+ tickets weekly across Windows, macOS, and Linux. Led ransomware containment and recovery.
  • Administered Cisco networks, Fortinet firewalls, and Microsoft 365 for sensitive ministry users.
  • Supported the PMO, Home, Forest, Transport, Finance, and Law ministries.
2016 — 2021
Global Link Technologies
IT Manager
📍 Kathmandu, Nepal
  • Designed and rolled out an enterprise security framework for a 50+ device fleet.
  • Network monitoring with Wireshark and Fing — detecting anomalies and unauthorized devices.
  • Delivered $25K+ in annual cost savings by in-sourcing IT and renegotiating vendor contracts.
2012 — 2015
Online Computer
Technical Support & Sales
📍 Damak, Nepal
  • Resolved 25+ tickets daily for 30+ users across hardware, software, and OS issues.
  • Provided personalized technology recommendations driving $10K+ in monthly sales.
// Serving Nepal

Secured Nepal’s Federal Government

A self-taught hacker from a countryside village — trusted with the cybersecurity of Nepal’s most sensitive government infrastructure inside Singha Durbar, Kathmandu.

Office of the Prime Minister
IT and cybersecurity support inside Nepal’s most sensitive executive office.
Ministry of Home Affairs
Helped secure critical law enforcement and national security infrastructure.
Ministry of Law & Justice
Contract role offered purely on talent. Provided IT and security support.
Ministry of Forest
Supported IT infrastructure for Nepal’s environmental ministry.
Ministry of Transportation
IT support and system maintenance for Nepal’s national transport.
Ministry of Finance
Technical support for one of Nepal’s most critical government ministries.
// Technical arsenal

Skills & Expertise

// Offensive security & ethical hacking
Certified Ethical Hacker (CEH) Bug Bounty Hunting XSS SSRF SQLi Subdomain Enumeration Recon Burp Suite Penetration Testing Vulnerability Assessment Wireshark CTF
// Network & defensive security
Fortinet Firewalls Cisco Networks Network Administration Incident Response Ransomware Containment Endpoint Hardening VPN DNS / DHCP TP-Link
// Systems & identity
Microsoft Entra ID (Azure AD) Microsoft 365 Intune JAMF Pro Active Directory Windows 10/11 macOS Linux Group Policy MFA / SSO
// ITSM, dev & AI
ServiceNow Jira GitHub / Git TeamViewer AnyDesk Slack Microsoft Teams Zoom Python HTML Cursor.ai Claude
// Credentials

Certifications

Certified Ethical Hacker (CEH)
EC-Council
Nov 2019
Google Cloud Cybersecurity
Coursera · Google
Apr 2025
Google IT Support Professional
Coursera · Google
Mar 2025
Microsoft IT Support Specialist
Coursera · Microsoft
Feb 2025
Fortinet Network Security
Fortinet
Certified
Claude 101
Anthropic
2026
Let’s work together

Open to roles in cybersecurity, IT engineering, and security research. If you need someone who’s broken Google, Apple, and Microsoft ; and built defenses for a national government ; let’s talk.