We can organize an interview with Aldin or any of our 25,000 available candidates within 48 hours. How would you like to proceed?
Schedule Interview NowMy name is Stephen K. and I have over 5 years of experience in the tech industry. I specialize in the following technologies: Technical Writing, Intrusion Prevention System, Information Technology, Intrusion Detection System, Network Security, etc.. I hold a degree in Other, Bachelor of Applied Science (BASc). Some of the notable projects I've worked on include: AI Red Team Attacks for FinTech: Commando X Pentest with Warp AI Agent, Forensic Disk Imaging on Windows, Run Private Cybersecurity AI, Email Forensics: Analyze email headers and trace IP & location, Windows Memory Forensics: How to Capture RAM for Investigations, etc.. I am based in Nairobi, Kenya. I've successfully completed 54 projects while developing at Softaims.
I approach every technical challenge with a mindset geared toward engineering excellence and robust solution architecture. I thrive on translating complex business requirements into elegant, efficient, and maintainable outputs. My expertise lies in diagnosing and optimizing system performance, ensuring that the deliverables are fast, reliable, and future-proof.
The core of my work involves adopting best practices and a disciplined methodology, focusing on meticulous planning and thorough verification. I believe that sustainable solution development requires discipline and a deep commitment to quality from inception to deployment. At Softaims, I leverage these skills daily to build resilient systems that stand the test of time.
I am dedicated to making a tangible difference in client success. I prioritize clear communication and transparency throughout the development lifecycle to ensure every deliverable exceeds expectations.
Main technologies
5 years
1 Year
2 Years
3 Years
Potentially possible
Kiso Secure
AI-augmented red teaming demo for banking and financial web applications. Commando X vulnerable bank deployed on AWS Ubuntu EC2 and assessed using the Warp terminal AI agent. The attacks included Nmap
Practical demonstration of court-defensible disk imaging on Windows. Produces bit-for-bit (RAW/E01) images with AccessData FTK Imager, R-Drive Image, and dd under defined scope and consent. Acquisitio
This project showcases how to set up and run large language models (LLMs) locally for cybersecurity workflows using LM Studio and Hugging Face. Instead of relying on cloud-based AI, the models run off
This project analyzes a phishing campaign targeting Deeper Network customers with fake “reward” emails containing both a malicious PDF and an NF-e XML invoice attachment. Using email header analysis,
In digital forensics, RAM often contains the most critical evidence that includes active processes, encryption keys, malware, and chat sessions. Since RAM is erased on shutdown, live capture is essent
Other in Cyber Security
2021-01-01-2021-01-01
Bachelor of Applied Science (BASc) in Mathematics and Computer Science
2016-01-01-2020-01-01