We can organize an interview with Aldin or any of our 25,000 available candidates within 48 hours. How would you like to proceed?
Schedule Interview NowMy name is Mohammed J. and I have over 2 years of experience in the tech industry. I specialize in the following technologies: Penetration Testing, Application Security, System Security, Vulnerability Assessment, Network Security, etc.. I hold a degree in Bachelor of Computer Science (BCompSc). Some of the notable projects I've worked on include: Burp Suite Certified Practitioner, Hall of Fame - OPPO, Hall of Fame - Tencent, Hall of Fame - Toyota, Hall of Fame - Logitech. I am based in Bethlehem, Palestinian Territories. I've successfully completed 5 projects while developing at Softaims.
I specialize in architecting and developing scalable, distributed systems that handle high demands and complex information flows. My focus is on building fault-tolerant infrastructure using modern cloud practices and modular patterns. I excel at diagnosing and resolving intricate concurrency and scaling issues across large platforms.
Collaboration is central to my success; I enjoy working with fellow technical experts and product managers to define clear technical roadmaps. This structured approach allows the team at Softaims to consistently deliver high-availability solutions that can easily adapt to exponential growth.
I maintain a proactive approach to security and performance, treating them as integral components of the design process, not as afterthoughts. My ultimate goal is to build the foundational technology that powers client success and innovation.
Main technologies
2 years
1 Year
1 Year
1 Year
Potentially possible
Bridginex
This certification, created by PortSwigger's Web Security Academy, demonstrates that I have the ability to Detect and prove the full business impact of a wide range of common web vulnerabilities, Adap
I have been listed on oppo's Monthly Hall of Fame multiple times for discovering different high severity security vulnerabilities on oppo web applications.
I Found an IDOR (insecure direct object reference) vulnerability on one of Tencent's subdomains, which allows an attacker to leak private/sensitive user information on the website.
Found a critical web cache poisoning vulnerability that turns a reflected unexploitable xss into a stored xss that will affect any user visits the home page on one of the websites owned by toyota.
Found an XSS vulnerability on one of the websites owned by Logitech.
Bachelor of Computer Science (BCompSc) in Computer science
2019-01-01-2024-01-01