Kamran A. looks like a good fit?

We can organize an interview with Aldin or any of our 25,000 available candidates within 48 hours. How would you like to proceed?

Schedule Interview Now

Kamran A. Cybersecurity, Python and Vulnerability Assessment

My name is Kamran A. and I have over 4 years of experience in the tech industry. I specialize in the following technologies: AT&T Cybersecurity, Cyber Threat Intelligence, Penetration Testing, Kali Linux, Website Security, etc.. I hold a degree in Bachelor's degree. Some of the notable projects I've worked on include: Windows reverse Shell, Man in the middle attack through ARP, SSH Remote login Exploitation. I am based in Islamabad, Pakistan. I've successfully completed 3 projects while developing at Softaims.

I possess comprehensive technical expertise across the entire solution lifecycle, from user interfaces and information management to system architecture and deployment pipelines. This end-to-end perspective allows me to build solutions that are harmonious and efficient across all functional layers.

I excel at managing technical health and ensuring that every component of the system adheres to the highest standards of performance and security. Working at Softaims, I ensure that integration is seamless and the overall architecture is sound and well-defined.

My commitment is to taking full ownership of project delivery, moving quickly and decisively to resolve issues and deliver high-quality features that meet or exceed the client's commercial objectives.

Main technologies

  • Cybersecurity, Python and Vulnerability Assessment

    4 years

  • AT&T Cybersecurity

    2 Years

  • Cyber Threat Intelligence

    1 Year

  • Penetration Testing

    1 Year

Additional skills

  • AT&T Cybersecurity
  • Cyber Threat Intelligence
  • Penetration Testing
  • Kali Linux
  • Website Security
  • Cybersecurity Monitoring
  • Information Security
  • Vulnerability Assessment
  • NIST Cybersecurity Framework
  • Wireshark
  • Hydra
  • MySQL
  • Python
  • Metasploit

Direct hire

Potentially possible

Previous Company

National Center for Cyber Security

Ready to get matched with vetted developers fast?

Let's get started today!

Hire Remote Developer

Experience Highlights

Windows reverse Shell

Creating payload from msf console and then by this payload have to get the windows shell. I have got the access of cmd of the targeted windows.

Man in the middle attack through ARP

Man in the middle attack with in the private network through ARP poising. In ARP poising router broadcast every request to every host through which you can see the search history of every host attache

SSH Remote login Exploitation

I have to get the session of an OS which has ssh port open. I got the OS session by using msfconsole and its auxiliary scanner

Education

  • University of Engineering and Technology Texla

    Bachelor's degree in Computer science

    2016-01-01-2020-01-01

Languages

  • English (Native or Bilingual)
  • Urdu (Native or Bilingual)