We can organize an interview with Aldin or any of our 25,000 available candidates within 48 hours. How would you like to proceed?
Schedule Interview NowMy name is Ionut B. and I have over 8 years of experience in the tech industry. I specialize in the following technologies: Zabbix, Network Monitoring, Virtualization, Azure, Elasticsearch, etc.. I hold a degree in , . Some of the notable projects I’ve worked on include: Cloudflare protection to private network. I am based in Cluj-Napoca, Romania. I've successfully completed 1 projects while developing at Softaims.
I approach every technical challenge with a mindset geared toward engineering excellence and robust solution architecture. I thrive on translating complex business requirements into elegant, efficient, and maintainable outputs. My expertise lies in diagnosing and optimizing system performance, ensuring that the deliverables are fast, reliable, and future-proof.
The core of my work involves adopting best practices and a disciplined methodology, focusing on meticulous planning and thorough verification. I believe that sustainable solution development requires discipline and a deep commitment to quality from inception to deployment. At Softaims, I leverage these skills daily to build resilient systems that stand the test of time.
I am dedicated to making a tangible difference in client success. I prioritize clear communication and transparency throughout the development lifecycle to ensure every deliverable exceeds expectations.
Main technologies
8 years
3 Years
5 Years
6 Years
Potentially possible
Microsoft Romania
Client needed to protect several websites from direct outside world access or discovery of the real IP's. The website work scenario was as follows: - Domains setup in Cloudflare - Custom WAF rate limiting rules on sensitive parts of the website - SSL enabled (at CF side) - Full (strict) - SSL enabled (at Nginx side) - with CF Origin certificates - Nginx/Apache servers had their configs secured and locked down - Code processor was locked down to unprivileged user permissions - MySQL servers locked down to private IP pools - Websites DNS was set in Cloudflare with the proxy obfuscation option enabled (the real IP of the back-end website was never revealed to the outside world) - Several back-end web servers, several back-end db servers, build/schedule server either individual or proxyed via Nginx or ProxySQL services (all of them had local traffic forced for domain TLD level queries) - Access to servers done via SSH gateway with strict key options, 2FA and VPN connection backup - Both software and hardware firewalls were limited to certain operating ports - Firewalls were set to block any outside web traffic except Cloudflare network - All emails handled by Postfix servers were handled by external relays to which outgoing mail traffic was locked to. As a summary, the server real IP was protected at all times by this project.
in Faculty of Computer Science (IT)
2003-01-01-2006-01-01
in
1999-01-01-2003-01-01