We can organize an interview with Aldin or any of our 25,000 available candidates within 48 hours. How would you like to proceed?
Schedule Interview NowMy name is Najam U. and I have over 8 years of experience in the tech industry. I specialize in the following technologies: Network Security, Kali Linux, Security Assessment & Testing, Penetration Testing, Information Security Consultation, etc.. I hold a degree in Bachelor of Science (BS). Some of the notable projects I've worked on include: Helped a Ride-Hailing App Recover from DDoS Attack, Implementation of Secure Architecture using Bicep in Azure, Implementing Intune and Defender for Endpoint on MacOS and Windows, Securing a hacked vibe-coded React Native iOS App, Practical Network Penetration Tester Certified (PNPT), etc.. I am based in Gujranwala, Pakistan. I've successfully completed 18 projects while developing at Softaims.
I possess comprehensive technical expertise across the entire solution lifecycle, from user interfaces and information management to system architecture and deployment pipelines. This end-to-end perspective allows me to build solutions that are harmonious and efficient across all functional layers.
I excel at managing technical health and ensuring that every component of the system adheres to the highest standards of performance and security. Working at Softaims, I ensure that integration is seamless and the overall architecture is sound and well-defined.
My commitment is to taking full ownership of project delivery, moving quickly and decisively to resolve issues and deliver high-quality features that meet or exceed the client's commercial objectives.
Main technologies
8 years
1 Year
4 Years
2 Years
Potentially possible
Contour Software
A panicked-CEO contacted me when his app's server went down because of a DDoS attack, they tried everything they could but couldn't recover from it. Their app was hosted on Digital Ocean whose defaul
This project involved setting up of Azure subscriptions from scratch using pipelines and infrastructure as code. Several resources i.e. IoT Hub, Service Bus, Web App, Log Analytics Workspace, Storag
The client approached us to help him with enrollment of mac and windows devices on Intune and then onboard them to Defender for Endpoint. We helped him achieve the goal and configured policies on Intu
This client approached us with a warning PDF from hacker that he hacked his application, leaked API keys and abused them. We helped the client by analyzing the codebase that used React Native, Expo a
https://certified.tcm-sec.com/922d515c-f0b9-452e-a12d-22906619ab88
Bachelor of Science (BS) in Software Engineering
2017-01-01-2021-01-01