We can organize an interview with Aldin or any of our 25,000 available candidates within 48 hours. How would you like to proceed?
Schedule Interview NowMy name is Prashant P. and I have over 1 year of experience in the tech industry. I specialize in the following technologies: Information Security, Computing & Networking, Compliance, Cybersecurity Management, Information Security Awareness, etc.. I hold a degree in . Some of the notable projects I've worked on include: CISM (Certified Information Security Manager), AWS Certified Security – Specialty, MS-500: Microsoft 365 Security Administration, PGPCC – Post Graduate Program in Cybersecurity (Great Learning), CEH (Certified Ethical Hacker), etc.. I am based in Pune, India. I've successfully completed 7 projects while developing at Softaims.
My expertise lies in deeply understanding and optimizing solution performance. I have a proven ability to profile systems, analyze data access methods, and implement caching strategies that dramatically reduce latency and improve responsiveness under load. I turn slow systems into high-speed performers.
I focus on writing highly efficient, clean, and well-documented code that minimizes resource consumption without sacrificing functionality. This dedication to efficiency is how I contribute measurable value to Softaims' clients by reducing infrastructure costs and improving user satisfaction.
I approach every project with a critical eye for potential bottlenecks, proactively designing systems that are efficient from the ground up. I am committed to delivering software that sets the standard for speed and reliability.
Main technologies
1 year
1 Year
1 Year
1 Year
Potentially possible
Angel One
• Information security governance and program management • Enterprise risk identification, analysis, and treatment • Security policy, standards, and control frameworks • Incident management governance
• Securing AWS environments using native security services • IAM design, least-privilege access, and role-based controls • Data protection using encryption, KMS, and secrets management • Logging, moni
• Microsoft 365 security configuration and administration • Identity protection using Azure AD, Conditional Access, and MFA • Microsoft Defender for Office 365, Endpoint, and Identity • Information pr
• Practical understanding of enterprise cybersecurity domains • SOC operations, SIEM concepts, and alert triage fundamentals • Network, endpoint, and application security basics • Risk assessment, vul
• Understanding attacker methodologies and kill chains • Identification of common vulnerabilities and misconfigurations • Web, network, system, and application attack vectors • Reconnaissance, exploit
in Computer engineering
2008-01-01-2011-01-01