About Me

    I have work on Software & Web Development field since the year 2009. Then I was a Web Developer of a private group in Berhampore. After that I have done so many project on Web and Software Development for Private and Government Sector as a Freelancer.


    After that I joined Five Csters Pvt. Ltd. company as a Software Developer cum Technical H.R. Then I had work with National IT And Cyber Security Research Association as a Technical Instructor and Ardent Computech Pvt. Ltd. as a Trainer cum Software Developer. After that We formed a startup named Futurebuzz Consultant LLP.
Now I am Sr. Software Engineer at AppKnox.

    Awards
  • Got Star Performer award in InGreens Business Meet 2018-19.
  • Got award in B.E.S. Education Fair for Making a Robot.
  • Got award in Tech. Fest at GCELT for developing a Website.
  • Got 371 Rank in CodeVita Global Coding competition.

Work Experience

February, 2024 - Current

Paraminfo Consultancy Pvt. Ltd.

I was Sr. Software Engineer in this company. I was taking care of backend as well frontend team.

April, 2022 - May, 2023

AppKnox

I am Sr. Software Engineer in this company.

August, 2021 - April, 2022

Creator Stack Pvt. Ltd.

I was Sr. Product Engineer in this organization.

March, 2020 - July, 2021

Mindship Technologies

I was Sr. Software Engineer in this company. I was taking care of backend as well frontend team.

December, 2017 - March, 2020

Green Think Venture Pvt. Ltd.

I was Full Stack Java Developer at this organization.

Jun, 2017 - December, 2017

FutureBuzz Consultant LLP

I was Chairman cum Software Engineer in this organization.

January, 2016 - December, 2017

Ardent Computech Pvt. Ltd.

I use to develop software and train people at this organization.

July, 2014 - October, 2014

Five Csters Pvt. Ltd.

I was Software Developer cum Team Leader at this organization.

Education

B.Tech in C.S.E. - 2017

MAKAUT (WBUT)

Completed graduation in Computer Science and Engineering at Government College Of Engineering and Leather Technology under Maulana Abul Kalam Azad University Of Technology (Formaly known as West Bengal University Of Technology).

Diploma in C.S.T. - 2014

West Bengal State Council Of Technical Education

Completed Diploma in Computer Science and Technology at Dumkal Polytechnic under West Bengal State Council Of Technical Education.

Madhyamik (10th) - 2009

West Bengal Board Of Secondary Education

Completed 10th Standard at Lalnagar High School (H.S.) under West Bengal Board Of Secondary Education.

Skills

Go, GraphQL, Ruby on Rails80%
SpringBoot, Java, JavaFX, JavaEE90%
Web Design 80%
Software Development 85%
Unix Operating Systen & Shell Programming 85%
C, C++, Python 75%
PROJECT MANAGEMENT 85%
Git VCS 90%
Android Development 95%
HTML, CSS, JavaScript, jQuery 85%
PL/SQL, MySQL, SQLite 75%
JSON, AJAX 80%

Bookshelf

Internet: Fundamentals of Internet

Author: Asif Mohammad Mollah, Language: English

Now a day's internet has become an important part of our life. We are very much dependent on internet for many purposes as we use internet for social network, we also use internet for educational purposes and communicating with friends, families etc. We can also use internet in defense etc. The initial idea is credited as being Leonard Klein rock's after he published his first paper entitled "Information Flow in Large Communication Nets" on May 31, 1961. Purpose of this book is to understand how Internet works and what is the basic.

Buy Book on:

Protect Yourself from Hackers

Author: Asif Mohammad Mollah, Language: English

Ethical hacking is the practice of using hacking techniques to identify vulnerabilities and weaknesses in computer systems, networks, and applications, with the goal of improving their security. Unlike malicious hacking, ethical hacking is conducted with the explicit permission and knowledge of the system owner, and is intended to identify and address security issues before they can be exploited by attackers. Ethical hacking is a crucial component of modern cybersecurity, and is used by organizations around the world to protect their systems and data from cyber threats.

Buy Book on:

Connections