We can organize an interview with Aldin or any of our 25,000 available candidates within 48 hours. How would you like to proceed?
Schedule Interview NowMy name is Usama M. and I have over 3 years of experience in the tech industry. I specialize in the following technologies: Computer Science, Computer Network, Internet of Things Software, Information Security, Network Penetration Testing, etc.. I hold a degree in Bachelor of Science (BS), Master of Science in Information Technology (MSc(IT)). Some of the notable projects I've worked on include: Cybersecurity Research Study, Big Data Analytics, Penetration Test Report, Vulnerability Assessment, Methodology Creation, Cyber Security Posture assessment of Japan, etc.. I am based in Duarte, United States. I've successfully completed 6 projects while developing at Softaims.
I am a business-driven professional; my technical decisions are consistently guided by the principle of maximizing business value and achieving measurable ROI for the client. I view technical expertise as a tool for creating competitive advantages and solving commercial problems, not just as a technical exercise.
I actively participate in defining key performance indicators (KPIs) and ensuring that the features I build directly contribute to improving those metrics. My commitment to Softaims is to deliver solutions that are not only technically excellent but also strategically impactful.
I maintain a strong focus on the end-goal: delivering a product that solves a genuine market need. I am committed to a development cycle that is fast, focused, and aligned with the ultimate success of the client's business.
Main technologies
3 years
2 Years
1 Year
1 Year
Potentially possible
Creative Ideate
Research Paper Title :- "Trust based Optimized Reporting for the Detection and Preventation of Blackhole Attack in RPL based IoT" As an R&D assistant, I assisted the client during the development ph
In this project, the dataset was analyzed. First a comprehensive investigation was carried out, making sure the data was complete and filling in any missing information; secondly analyzing its overall
Performed penetration testing on 9 different VM machines.
This report presents and explains the proposed methodology to achieve the main goals, including efficient text summarization and concise answers to non-factoid questions using an innovative hybrid dee
I authored the "Detailed Report on Cyber Security Posture Assessment of Japan.
Bachelor of Science (BS) in
Master of Science in Information Technology (MSc(IT)) in
2022-01-01-2024-01-01