We can organize an interview with Aldin or any of our 25,000 available candidates within 48 hours. How would you like to proceed?
Schedule Interview NowMy name is Aklilu H. and I have over 4 years of experience in the tech industry. I specialize in the following technologies: Vulnerability Assessment, Penetration Testing, Web App Penetration Testing, Network Penetration Testing, Web Application Security, etc.. I hold a degree in Bachelor of Engineering (BEng), Master of Computer Science (MSCS). Some of the notable projects I've worked on include: OWASP Top Ten, Network Traffic Analysis for Incident Response, CompTIA Cybersecurity Analyst (CySA+), Malware Analysis, Vulnerability Assessment, etc.. I am based in Adama, Ethiopia. I've successfully completed 11 projects while developing at Softaims.
Information integrity and application security are my highest priorities in development. I implement robust validation, encryption, and authorization mechanisms to protect sensitive data and ensure compliance. I am experienced in identifying and mitigating common security vulnerabilities in both new and existing applications.
My work methodology involves rigorous testing—at the unit, integration, and security levels—to guarantee the stability and trustworthiness of the solutions I build. At Softaims, this dedication to security forms the basis for client trust and platform reliability.
I consistently monitor and improve system performance, utilizing metrics to drive optimization efforts. I'm motivated by the challenge of creating ultra-reliable systems that safeguard client assets and user data.
Main technologies
4 years
2 Years
3 Years
3 Years
Potentially possible
INSA
OWASP Top Ten Overview The OWASP Top Ten is a regularly updated document identifying the ten most critical web application security risks. These risks are based on a consensus among security experts a
I have gained knowledge about the tools and techniques used for analyzing traffic passing over the network. This learning path covers the identification and analysis of benign and malicious traffic, e
Key Features of this CompTIA CYSA+ Certification Training Threat and Vulnerability Management, where they will learn to utilize and apply proactive threat intelligence techniques to enhance enterprise
Malware analysis examines malicious software, commonly known as malware, to understand its functionality, behavior, and impact on a system or network. The purpose of malware analysis is to gather info
The primary area of concentration of this course:- Identify any essential defects in frameworks that could permit access to digital trespassers. Take out complicated tasks to discover vulnerabilities
Bachelor of Engineering (BEng) in Computer engineering
2017-01-01-2021-01-01
Master of Computer Science (MSCS) in Computer science
2021-01-01-2023-01-01