We can organize an interview with Aldin or any of our 25,000 available candidates within 48 hours. How would you like to proceed?
Schedule Interview NowMy name is Ashley W. and I have over 5 years of experience in the tech industry. I specialize in the following technologies: Security Policies & Procedures Documentation, Cybersecurity Management, Risk Assessment, Information Security Governance, Security Operation Center, etc.. I hold a degree in Bachelor of Science in Information Technology. Some of the notable projects I've worked on include: Security Certified Auditor, Security Certified Incident Handler, Personal cyber security blog. I am based in Sheffield, United Kingdom. I've successfully completed 3 projects while developing at Softaims.
I value a collaborative environment where shared knowledge leads to superior outcomes. I actively mentor junior team members, conduct thorough quality reviews, and champion engineering best practices across the team. I believe that the quality of the final product is a direct reflection of the team's cohesion and skill.
My experience at Softaims has refined my ability to effectively communicate complex technical concepts to non-technical stakeholders, ensuring project alignment from the outset. I am a strong believer in transparent processes and iterative delivery.
My main objective is to foster a culture of quality and accountability. I am motivated to contribute my expertise to projects that require not just technical skill, but also strong organizational and leadership abilities to succeed.
Main technologies
5 years
4 Years
1 Year
2 Years
Potentially possible
Practical-Infosec Limited
Proof of certification from SANS GIAC as a certified auditor and implementer of the CIS Critical Controls giac.org/certified-professional/ashley-woodhall/148485
Proof of certification from SANS GIAC as a certified incident handler giac.org/certified-professional/ashley-woodhall/148485
I launched my own personal blog on cyber security, tackling issues that companies typically face. For example, how and where to invest their money in order to improve security posture, risk managemen
Bachelor of Science in Information Technology in Computer Security and Digital Forensics
2010-01-01-2014-01-01