Aklilu H. looks like a good fit?

We can organize an interview with Aldin or any of our 25,000 available candidates within 48 hours. How would you like to proceed?

Schedule Interview Now

Aklilu H. Cybersecurity, Vulnerability Assessment and Security Testing

My name is Aklilu H. and I have over 4 years of experience in the tech industry. I specialize in the following technologies: Vulnerability Assessment, Penetration Testing, Web App Penetration Testing, Network Penetration Testing, Web Application Security, etc.. I hold a degree in Bachelor of Engineering (BEng), Master of Computer Science (MSCS). Some of the notable projects I've worked on include: OWASP Top Ten, Network Traffic Analysis for Incident Response, CompTIA Cybersecurity Analyst (CySA+), Malware Analysis, Vulnerability Assessment, etc.. I am based in Adama, Ethiopia. I've successfully completed 11 projects while developing at Softaims.

Information integrity and application security are my highest priorities in development. I implement robust validation, encryption, and authorization mechanisms to protect sensitive data and ensure compliance. I am experienced in identifying and mitigating common security vulnerabilities in both new and existing applications.

My work methodology involves rigorous testing—at the unit, integration, and security levels—to guarantee the stability and trustworthiness of the solutions I build. At Softaims, this dedication to security forms the basis for client trust and platform reliability.

I consistently monitor and improve system performance, utilizing metrics to drive optimization efforts. I'm motivated by the challenge of creating ultra-reliable systems that safeguard client assets and user data.

Main technologies

  • Cybersecurity, Vulnerability Assessment and Security Testing

    4 years

  • Vulnerability Assessment

    2 Years

  • Penetration Testing

    3 Years

  • Web App Penetration Testing

    3 Years

Additional skills

  • Vulnerability Assessment
  • Penetration Testing
  • Web App Penetration Testing
  • Network Penetration Testing
  • Web Application Security
  • Security Assessment & Testing
  • Cybersecurity Tool
  • WordPress Malware Removal
  • Cyber Threat Intelligence
  • Malware Removal
  • Network Security
  • NIST Cybersecurity Framework
  • Cybersecurity Monitoring
  • Cybersecurity Management
  • Security Testing

Direct hire

Potentially possible

Previous Company

INSA

Ready to get matched with vetted developers fast?

Let's get started today!

Hire Remote Developer

Experience Highlights

OWASP Top Ten

OWASP Top Ten Overview The OWASP Top Ten is a regularly updated document identifying the ten most critical web application security risks. These risks are based on a consensus among security experts a

Network Traffic Analysis for Incident Response

I have gained knowledge about the tools and techniques used for analyzing traffic passing over the network. This learning path covers the identification and analysis of benign and malicious traffic, e

CompTIA Cybersecurity Analyst (CySA+)

Key Features of this CompTIA CYSA+ Certification Training Threat and Vulnerability Management, where they will learn to utilize and apply proactive threat intelligence techniques to enhance enterprise

Malware Analysis

Malware analysis examines malicious software, commonly known as malware, to understand its functionality, behavior, and impact on a system or network. The purpose of malware analysis is to gather info

Vulnerability Assessment

The primary area of concentration of this course:- Identify any essential defects in frameworks that could permit access to digital trespassers. Take out complicated tasks to discover vulnerabilities

Education

  • Adama Science and Technology University

    Bachelor of Engineering (BEng) in Computer engineering

    2017-01-01-2021-01-01

  • University of Michigan

    Master of Computer Science (MSCS) in Computer science

    2021-01-01-2023-01-01

Languages

  • Amharic (Fluent)
  • English (Native or Bilingual)
  • Oromo (Native or Bilingual)