We can organize an interview with Aldin or any of our 25,000 available candidates within 48 hours. How would you like to proceed?
Schedule Interview NowMy name is Iftekharul I. and I have over 11 years of experience in the tech industry. I specialize in the following technologies: Penetration Testing, Information Security, Ethical Hacking, Network Security, Cybersecurity Management, etc.. I hold a degree in Bachelor of Engineering (B.Eng.), , High school degree. Some of the notable projects I've worked on include: Exploited Weak JWT Secret Leading to Account Takeover, Web penetration testing: Prevented Source Code & API Leak via .git, LFI During a Penetration Testing, Stored XSS Exploitation in CKEditor (CVE-2020-9281), Vulnerability Management, etc.. I am based in Dhaka, Bangladesh. I've successfully completed 13 projects while developing at Softaims.
I approach every technical challenge with a mindset geared toward engineering excellence and robust solution architecture. I thrive on translating complex business requirements into elegant, efficient, and maintainable outputs. My expertise lies in diagnosing and optimizing system performance, ensuring that the deliverables are fast, reliable, and future-proof.
The core of my work involves adopting best practices and a disciplined methodology, focusing on meticulous planning and thorough verification. I believe that sustainable solution development requires discipline and a deep commitment to quality from inception to deployment. At Softaims, I leverage these skills daily to build resilient systems that stand the test of time.
I am dedicated to making a tangible difference in client success. I prioritize clear communication and transparency throughout the development lifecycle to ensure every deliverable exceeds expectations.
Main technologies
11 years
7 Years
9 Years
4 Years
Potentially possible
Nexxvali
Identified a critical JWT implementation flaw where weak HS256 secrets exposed a client's system to token forgery and account takeover. Using jwt_tool, I demonstrated how attackers could crack the sec
Discovered a publicly accessible .git directory on a client’s production website, exposing sensitive source code and configuration files. Exploited this to demonstrate risks (e.g., credential leaks, R
Conducted a controlled penetration test on a web application, identifying an LFI vulnerability that allowed unauthorized access to system files. Documented the exploit chain, risks (e.g., credential l
During a targeted web application penetration test for one of my clients, I identified and exploited a stored XSS vulnerability in a CKEditor. The editor was not properly sanitizing user input when s
Vulnerabilities I found in the last year. This is from the vulnerability management dashboard.
Bachelor of Engineering (B.Eng.) in Computer science
2014-01-10-2018-12-10
in science
2011-01-10-2013-12-10
High school degree in Science
2006-01-10-2011-12-10