We can organize an interview with Aldin or any of our 25,000 available candidates within 48 hours. How would you like to proceed?
Schedule Interview NowMy name is Kevin B. and I have over 4 years of experience in the tech industry. I specialize in the following technologies: Firewall, Network Security, Web Hosting, Network Administration, Microsoft Active Directory, etc.. I hold a degree in . Some of the notable projects I've worked on include: Setup Microsoft 365 Email, Uncover threats Microsoft 365 missed, Get Better Email Deliverability, Continuous Pen-test & Vulnerability Scan as a Service, VMWare ESX upgrade, etc.. I am based in Chicago, United States. I've successfully completed 7 projects while developing at Softaims.
I approach every technical challenge with a mindset geared toward engineering excellence and robust solution architecture. I thrive on translating complex business requirements into elegant, efficient, and maintainable outputs. My expertise lies in diagnosing and optimizing system performance, ensuring that the deliverables are fast, reliable, and future-proof.
The core of my work involves adopting best practices and a disciplined methodology, focusing on meticulous planning and thorough verification. I believe that sustainable solution development requires discipline and a deep commitment to quality from inception to deployment. At Softaims, I leverage these skills daily to build resilient systems that stand the test of time.
I am dedicated to making a tangible difference in client success. I prioritize clear communication and transparency throughout the development lifecycle to ensure every deliverable exceeds expectations.
Main technologies
4 years
1 Year
2 Years
1 Year
Potentially possible
On-staff Consultant
Setup a new Microsoft 365 tenant for your start-up
Complete a fast & , secure threat scan with no impact on mail flow with our advanced security powered by AI.
Don't let your emails end-up in SPAM folders - Fix your email deliverability!! Once you did the work to get it right, monitor it for 12-months and make sure you always stay off the black-lists and o
Common Vulnerabilities and Exposures are weak areas in the system that have the potential for being hacked. The tool is scanning everything that is publicly facing the internet for these vulnerabiliti
2-step upgrade of clustered ESX hosts to current supported version with associated vCenter migration
in Business
2008-01-01-2010-01-01