We can organize an interview with Aldin or any of our 25,000 available candidates within 48 hours. How would you like to proceed?
Schedule Interview NowMy name is Yash K. and I have over 5 years of experience in the tech industry. I specialize in the following technologies: Malware Removal, System Security, Vulnerability Assessment, Information Security, Information Security Consultation, etc.. I hold a degree in Master of Engineering (MEng), . Some of the notable projects I've worked on include: Phishing Awareness Training, Open Source SOC Development, Vulnerability Assessment and Penetration Testing. I am based in Karachi, Pakistan. I've successfully completed 3 projects while developing at Softaims.
I approach every technical challenge with a mindset geared toward engineering excellence and robust solution architecture. I thrive on translating complex business requirements into elegant, efficient, and maintainable outputs. My expertise lies in diagnosing and optimizing system performance, ensuring that the deliverables are fast, reliable, and future-proof.
The core of my work involves adopting best practices and a disciplined methodology, focusing on meticulous planning and thorough verification. I believe that sustainable solution development requires discipline and a deep commitment to quality from inception to deployment. At Softaims, I leverage these skills daily to build resilient systems that stand the test of time.
I am dedicated to making a tangible difference in client success. I prioritize clear communication and transparency throughout the development lifecycle to ensure every deliverable exceeds expectations.
Main technologies
5 years
1 Year
3 Years
4 Years
Potentially possible
SOCByte
We have conducted Cybersecurity Awareness Training organization wide. As a content specialist working on the cybersecurity awareness content/campaigns such as Awareness Presentations, Security Hints a
We have established a full stack open source SOC envirneoment on AWS cloud, rightly configured and fullly integrated with each component. We have used following components: - Wazuh as SIEM solution -
We have performed a stealth vulnerability assessment and penetration testing activity for the client complete infrastructure to make sure the fulfilment of compliance and endure the effectiveness of c
Master of Engineering (MEng) in Computer Networks and System Security
2019-01-01-2022-01-01
in Computer engineering
2014-01-01-2018-01-01