We can organize an interview with Aldin or any of our 25,000 available candidates within 48 hours. How would you like to proceed?
Schedule Interview NowMy name is Muhammad Adnan W. and I have over 5 years of experience in the tech industry. I specialize in the following technologies: Network Security, Web Application Security, OWASP, NIST Cybersecurity Framework, Cybersecurity Management, etc.. I hold a degree in Bachelor of Science (BS). Some of the notable projects I've worked on include: Network Infrastructure Deployment and Vulnerability Assessment, Testing Injection SQL Vulnerability, Volatility Analysis. I am based in Wah Cantt, Pakistan. I've successfully completed 3 projects while developing at Softaims.
I possess comprehensive technical expertise across the entire solution lifecycle, from user interfaces and information management to system architecture and deployment pipelines. This end-to-end perspective allows me to build solutions that are harmonious and efficient across all functional layers.
I excel at managing technical health and ensuring that every component of the system adheres to the highest standards of performance and security. Working at Softaims, I ensure that integration is seamless and the overall architecture is sound and well-defined.
My commitment is to taking full ownership of project delivery, moving quickly and decisively to resolve issues and deliver high-quality features that meet or exceed the client's commercial objectives.
Main technologies
5 years
4 Years
4 Years
2 Years
Potentially possible
Pakistan Air Force
Set up a virtual network infrastructure, which included a firewall, router, and a Windows server with fully configured and deployed DNS services, as well as user machines. Following the successful dep
Project involved setting up and deploying a WordPress website on a Raspberry Pi, followed by testing for SQL injection vulnerabilities using both manual techniques and the automated tool, WPScan. Rem
Utilized the Volatility tool to analyze an image file, aiming to identify suspicious IP addresses, connection locations, and the executable files running at the time of the incident. This forensic ana
Bachelor of Science (BS) in Cyber Security
2020-01-01-2024-01-01