We can organize an interview with Aldin or any of our 25,000 available candidates within 48 hours. How would you like to proceed?
Schedule Interview NowMy name is Muhammad Abdullah Bin I. and I have over 2 years of experience in the tech industry. I specialize in the following technologies: Information Security, Compliance, Computer Network, Government Reporting Compliance, Graph, etc.. I hold a degree in Bachelor of Applied Science (BASc), Master of Information Technology (MIT). Some of the notable projects I’ve worked on include: SOC 2, Wazuh, Web Pentest, Mobile App Testing. I am based in Gujrat, Pakistan. I've successfully completed 4 projects while developing at Softaims.
I thrive on project diversity, possessing the adaptability to seamlessly transition between different technical stacks, industries, and team structures. This wide-ranging experience allows me to bring unique perspectives and proven solutions from one domain to another, significantly enhancing the problem-solving process.
I quickly become proficient in new technologies as required, focusing on delivering immediate, high-quality value. At Softaims, I leverage this adaptability to ensure project continuity and success, regardless of the evolving technical landscape.
My work philosophy centers on being a resilient and resourceful team member. I prioritize finding pragmatic, scalable solutions that not only meet the current needs but also provide a flexible foundation for future development and changes.
Main technologies
2 years
1 Year
1 Year
1 Year
Potentially possible
Cybernet
https://pastoral-dolphin-293.notion.site/1b250fdab58c807fbffbc92de820a191?v=1b250fdab58c8197af32000c56f0e134 Here is the link to my complete portfolio of SOC 2 work from different projects.
Use Wazuh, an open-source security tool for finding threats, managing compliance, and handling incidents. Skilled in setting up Wazuh agents, creating monitoring rules, and checking security alerts on its dashboard. Able to connect Wazuh with other tools to improve security tracking and reports.
Multiple security issues ranging from High to Medium severity levels have been identified in the tested websites and APIs. Although every vulnerability needs to be fixed, High and medium-level security vulnerabilities must be fixed as soon as possible. The assessment team has mentioned remediation measures specific to every issue, which will guide the application developers, network administrators, and security teams in patching, fixing, or updating the affected assets.
The mobile application uses an intent flter. Intent flters should not be used for security purposes because they place no restrictions on explicit intents sent to the component, and can allow other applications on the same device to directly interact with them. Intent flters are defned in the Android Manifest fle, they let developers choose which type of intents their application components are supposed to receive and handle.
Bachelor of Applied Science (BASc) in Computer science
2016-01-01-2020-01-01
Master of Information Technology (MIT) in Computer science
2021-01-01-2023-01-01