We can organize an interview with Aldin or any of our 25,000 available candidates within 48 hours. How would you like to proceed?
Schedule Interview NowMy name is Asim S. and I have over 1 year of experience in the tech industry. I specialize in the following technologies: Information Security, System Security, Cybersecurity Management, Government Reporting Compliance, Compliance, etc.. I hold a degree in Master of Information Technology (MIT). Some of the notable projects I've worked on include: Domain Investigation & Threat Intelligence Analysis., XRP Blockchain Forensic Audit & Liquidity Pool Validation, VAPT, Mobile Application Penetration Test, DDoS Test, etc.. I am based in Peshawar, Pakistan. I've successfully completed 7 projects while developing at Softaims.
Information integrity and application security are my highest priorities in development. I implement robust validation, encryption, and authorization mechanisms to protect sensitive data and ensure compliance. I am experienced in identifying and mitigating common security vulnerabilities in both new and existing applications.
My work methodology involves rigorous testing—at the unit, integration, and security levels—to guarantee the stability and trustworthiness of the solutions I build. At Softaims, this dedication to security forms the basis for client trust and platform reliability.
I consistently monitor and improve system performance, utilizing metrics to drive optimization efforts. I'm motivated by the challenge of creating ultra-reliable systems that safeguard client assets and user data.
Main technologies
1 year
1 Year
1 Year
1 Year
Potentially possible
Growth Arbor
Investigated a suspicious domain closely mimicking a client-owned brand to assess impersonation and phishing risks. Conducted WHOIS, DNS, certificate, and threat intelligence checks using industry-sta
Conducted a forensic audit of an XRP-based crypto arbitrage platform to assess transaction integrity, liquidity flows, and compliance. Verified XRP/TRX transactions, tracing micro-trades and execution
The purpose of this assessment was to point out security loopholes, business logic errors, and missing best security practices. The tests were carried out assuming the identity of an attacker or a mal
This report presents the penetration testing activity conducted on the XYZ (Android App). During penetration testing, numerous security issues ranging from Low to High have been observed on the tested
DDoS protection/blocking capability of in-scope assets has been evaluated under this current engagement. Different categories of DDoS attacks agreed upon with the client during the initial phases of t
Master of Information Technology (MIT) in Computer science
2021-01-01-2023-01-01