We can organize an interview with Aldin or any of our 25,000 available candidates within 48 hours. How would you like to proceed?
Schedule Interview NowMy name is Aamir R. and I have over 4 years of experience in the tech industry. I specialize in the following technologies: Digital Forensics, Information Security, Information Security Consultation, Cybersecurity Management, Malware Removal, etc.. I hold a degree in Master of Science (MS), Doctor of Philosophy (PhD). Some of the notable projects I've worked on include: Key Takeaways, Report of Remote Access Contol (RAT), Trojanized Mobile Application - Target user of Pakistan, Cryptography - Generic Attack, Digital Forensics - The 2012 National Gallery DC Scenario. I am based in Islamabad, Pakistan. I've successfully completed 5 projects while developing at Softaims.
I am a dedicated innovator who constantly explores and integrates emerging technologies to give projects a competitive edge. I possess a forward-thinking mindset, always evaluating new tools and methodologies to optimize development workflows and enhance application capabilities. Staying ahead of the curve is my default setting.
At Softaims, I apply this innovative spirit to solve legacy system challenges and build greenfield solutions that define new industry standards. My commitment is to deliver cutting-edge solutions that are both reliable and groundbreaking.
My professional drive is fueled by a desire to automate, optimize, and create highly efficient processes. I thrive in dynamic environments where my ability to quickly master and deploy new skills directly impacts project delivery and client satisfaction.
Main technologies
4 years
3 Years
1 Year
2 Years
Potentially possible
Tile Mountain
general cybersecurity update/article a tech lawyer and privacy lawyer will be writing later on, as part of Cyber Security Awareness Month (October) and Australian Cyber Week, 25-29 October.
The most widely used Cyber Security program for controlling a computer is Remote System Control Tool. When used maliciously, it is referred to as a Remote System Control Trojan (RAT). A malicious pers
A small cluster of Trojanized versions of Android applications, primarily sold to people who live in Pakistan, has been discovered by SophosLabs. These otherwise legitimate applications (clean version
This document comprises of some hands on practices of cryptography attacks i.e. Hash Length Extension Attack, MD5 Collision Attack and RSA Public Key Encryption and Signature. Details document is atta
The 2012 National Gallery DC scenario spans approximately 10 days and encompasses two distinct yet intertwined story arcs. The scenario is centered around an employee at the National Gallery DC Art Ga
Master of Science (MS) in Information Security
2018-01-01-2020-01-01
Doctor of Philosophy (PhD) in Information security
2021-01-01-2025-01-01