We can organize an interview with Aldin or any of our 25,000 available candidates within 48 hours. How would you like to proceed?
Schedule Interview NowMy name is Christian P. and I have over 0 years of experience in the tech industry. I specialize in the following technologies: Digital Forensics, Incident Response Readiness Assessment, Red Team Assessment, Vulnerability Assessment, CrowdStrike, etc.. I hold a degree in Bachelor's. Some of the notable projects I've worked on include: Discovery of MFA Bypass in Remote Desktop Software (Bugcrowd), Microsoft Sentinel Deployment for CMMC Compliance, Stopped AWS Role Theft and Blocked Live Exfiltration, Recovered $73K in Active Business Email Compromise. I am based in Portland, United States. I've successfully completed 4 projects while developing at Softaims.
I am a dedicated innovator who constantly explores and integrates emerging technologies to give projects a competitive edge. I possess a forward-thinking mindset, always evaluating new tools and methodologies to optimize development workflows and enhance application capabilities. Staying ahead of the curve is my default setting.
At Softaims, I apply this innovative spirit to solve legacy system challenges and build greenfield solutions that define new industry standards. My commitment is to deliver cutting-edge solutions that are both reliable and groundbreaking.
My professional drive is fueled by a desire to automate, optimize, and create highly efficient processes. I thrive in dynamic environments where my ability to quickly master and deploy new skills directly impacts project delivery and client satisfaction.
Main technologies
0 years
1 Year
1 Year
1 Year
Potentially possible
Various Clients
I discovered and reported an MFA bypass in a commercial remote desktop (RDP) application during a Bugcrowd engagement. The issue allowed remote access without completing MFA due to a flaw in the authe
Led deployment of Microsoft Sentinel as the core SIEM for a hybrid environment. Built the workspace, connected Microsoft Defender, on-prem AD, WatchGuard firewalls, HPE/Aruba networking, and Windows/L
Responded to an AWS EC2 role theft attack triggered via IMDSv1 SSRF. Blocked exfiltration within minutes by enforcing IMDSv2, detaching compromised role, and disabling non-TLS S3 access. Developed det
A financial transfer was executed through malicious Microsoft 365 consent phishing and access token theft. I led the live response: identified the intrusion path, revoked OAuth tokens, removed malicio
Bachelor's in Computer Science