We can organize an interview with Aldin or any of our 25,000 available candidates within 48 hours. How would you like to proceed?
Schedule Interview NowMy name is Marty C. and I have over 5 years of experience in the tech industry. I specialize in the following technologies: Cybersecurity Management, Information Security, Information Security Audit, Policy Writing, ISO 27001, etc.. I hold a degree in Bachelor of Science (BS). Some of the notable projects I've worked on include: DRATA Technical Certification, ISO 27001 Lead Auditor, Bespoke Risk Assessment Tool, Information Security Framework. I am based in Pila, Philippines. I've successfully completed 4 projects while developing at Softaims.
I thrive on project diversity, possessing the adaptability to seamlessly transition between different technical stacks, industries, and team structures. This wide-ranging experience allows me to bring unique perspectives and proven solutions from one domain to another, significantly enhancing the problem-solving process.
I quickly become proficient in new technologies as required, focusing on delivering immediate, high-quality value. At Softaims, I leverage this adaptability to ensure project continuity and success, regardless of the evolving technical landscape.
My work philosophy centers on being a resilient and resourceful team member. I prioritize finding pragmatic, scalable solutions that not only meet the current needs but also provide a flexible foundation for future development and changes.
Main technologies
5 years
4 Years
2 Years
3 Years
Potentially possible
Cyber Compliance
The Drata Technical Certification is designed for channel partners who onboard and manage customers on the Drata platform. Holders of this certification can demonstrate their ability to implement and
As a Certified ISO 27001 Lead Auditor, I possess a deep understanding of information security standards and best practices. With extensive experience in conducting audits and assessments, I can help o
I wrote this User Guide for a risk assessment tool I developed last year. The process embedded in the tool follows the risk assessment methodology documented in NIST Special Publication (SP) 800-30, R
There has recently been an update to an International Standard for Information Security that drove the need to map it back to the previous version for ease of understanding Based on this, I wanted t
Bachelor of Science (BS) in Communications and Engineering Management
1986-01-01-1990-01-01