Work History
Showcase
Education
Work history
BPU
Lead AI Engineer
2018 - 2019 (1 year)
Supported NLP analysis over different languages.
Developed image analysis and detection specific classes in order to improve marketing/branding.
Implemented an automated pipeline for data collecting, transformations, dataset creation, training, and validation of models.
Managed remote developers across different locations.
Smartboss
Senior Software Engineer
2016 - 2017 (1 year)
Designed and implemented a recommendation engine platform for people using Python.
Designed and implemented a security system for keeping private user data safe while integrating with social accounts and validation.
Built integration with a social accounts API and aggregated data for precise task generation.
Implemented a REST API using Flask.
Managed and planned new features like assigning tasks for developers on this project.
Worked on design and implementation of ML algorithms for supporting better task generation using Python using scikit-learn.
Atia Consulting
Security Engineer
2016 - 2017 (1 year)
Created a plan for penetration testing.
Created and customized different kinds of tools for penetration testing.
Assessed and reported on vulnerabilities.
Reverse engineered binary applications and exploited weak spots.
Reviewed source code.
IOD
ELK Expert
2016 - 2017 (1 year)
Consulted and wrote content related to the ELK stack.
Created articles for best practices.
Created articles about ELK use cases.
Zoomer Analytics
Senior Software Engineer
2015 - 2016 (1 year)
Implemented the web application in Flask framework.
Created the real-time application using the Socket.IO library.
Worked on database migrations and supporting different kinds of databases.
Worked on supporting the communication with Interactive Broker API in real-time.
Created directives in AngularJS for updating web content using the socket.
DevLogic
Software Developer
2013 - 2015 (2 years)
Created analytic scripts for tracking client-side events.
Implemented support on the back-end for generating an analytic script based on user input.
Created a system for receiving large amounts of data using Flume and dispatching data in different sources.
Implemented reusable components for manipulating data in Redis.
Created scripts for fast migration between databases using Python.
Worked on indexing data using the Elasticsearch with support of real-time search of indexed data.
Maintained an Elasticsearch cluster.
VOC-Solution D.O.O.
Software Developer
2012 - 2013 (1 year)
Created reusable menu components with support from a database using C# and ASP.NET.
Built components for a different version of a PCI DSS questionnaire.
Worked on Ajax ASP.NET components related with uploading file and tracking progress.
Developed client-side progress components for the PCI DSS questionnaire.
Wrote a tool for managing the PCI DSS questionnaire.
Showcase
Optimization of Digital Marketing
The project focuses on optimizing marketing efforts using digital marketing.
It employs analytics techniques to improve marketing through social networks.
The goal is to find the optimal mix of digital marketing efforts.
PCI DSS Tool
PCI DSS Questionnaire simplifies the PCI DSS assessment process.
The tool streamlines the assessment for clients.
It aims to make PCI DSS compliance easier to achieve.
Published Article
A security issue has been discovered in a router.
Sending an invalid HTTP request can cause services to stop.
This issue could lead to a potential security breach.
Accomplice
Optimizes social marketing across paid, owned, and earned channels.
Provides web analytics to monitor ROI and user behavior.
Focuses on improving social marketing effectiveness.
Routersploit contributor
The RouterSploit Framework is an open-source exploitation framework focused on embedded devices.
The contributor actively works on adding new exploits for various embedded devices.
The framework utilizes interfaces for further development and improvement.
Published Article
Machine learning is being utilized to enhance cybersecurity for self-driving cars.
The text focuses on protecting autonomous vehicles from cyberattacks and malware.
Security is a key consideration in the development of self-driving technology.
Published Article
A network or graph represents structured data with nodes and relationships defined by edges.
Graphs can contain various attributes, including numerical and categorical data, and complex relationships.
The text highlights examples of graphs like the World Wide Web, social networks, and scientific literature networks.
Education
Bachelor's Degree in Computer Sciences
University in Sarajevo
2008 - 2014 (6 years)