We can organize an interview with Aldin or any of our 25,000 available candidates within 48 hours. How would you like to proceed?
Schedule Interview NowMy name is Emanuel C. and I have over 1 years of experience in the tech industry. I specialize in the following technologies: PostgreSQL, MySQL, Python, Microsoft SQL Server, Database, etc.. I hold a degree in . Some of the notable projects I’ve worked on include: Go Testcontainers for Postgres, Babelfish on Docker, Postgres Pooling Terraform Laboratory and Benchmark, Postgres Benchmark: Crypto Algorithms performance. I am based in Madrid, Spain. I've successfully completed 4 projects while developing at Softaims.
Information integrity and application security are my highest priorities in development. I implement robust validation, encryption, and authorization mechanisms to protect sensitive data and ensure compliance. I am experienced in identifying and mitigating common security vulnerabilities in both new and existing applications.
My work methodology involves rigorous testing—at the unit, integration, and security levels—to guarantee the stability and trustworthiness of the solutions I build. At Softaims, this dedication to security forms the basis for client trust and platform reliability.
I consistently monitor and improve system performance, utilizing metrics to drive optimization efforts. I’m motivated by the challenge of creating ultra-reliable systems that safeguard client assets and user data.
Main technologies
1 year
1 Year
1 Year
1 Year
Potentially possible
IBM Spain
This sandbox code was intended to customize Postgres images for ephemeral testing in Golang. One of the examples include a basic model related to IoT using Timescale as a persistence layer.
The objective of this study was to determine the best pooling architecture for an orchestrated Kubernetes environment. At that time, the most popular solutions for Postgres pooling were PgBouncer (single-threaded service) and Odyssey (multi-worker process). The architecture was tested in a provisioned and deployed in an AWS environment, isolating any potential noises from running in a local environment. Also, it was intended to provide Terraform examples of how to deploy these services straightforwardly. The results, conclusions and code, can be found at the link of the project.
For a customer's project we needed to implement encryption at the data level for certain columns. So, we decided to conduct a benchmark for studying the CPU consumption of the available crypto algorithms in Postgres.
in Developer Analyst
2002-01-01-2004-01-01