About My Journey
Sales Engineer hybrid. SaaS tinkerer. IT guy who loves selling.
I’m Ahmad Hakimi, a Sales Engineer hybrid with over a decade of experience across IT, cybersecurity, SaaS innovation, and entrepreneurship. My career has always been about one thing: bridging technical systems with business outcomes—through discovery, solution design, demos, and persuasive communication.
I’ve launched and sold SaaS products like FlippAI, an AI-powered app that automated ad generation and sourcing for resellers, generating $300k+ in revenue through The Flipping Ninja platform. And here’s the truth: the code was cool, but the best part? Demoing it. Watching someone’s eyes light up when they realized it could help them pay off $18k in debt—that’s the kind of moment that gets me fired up.
At the Boulder Public Library, I pioneered internal AI initiatives with the launch of AI Meeting Scribe, a secure tool for transcript summaries and Q&A. I treated it like a consultative engagement—holding discovery sessions with leadership, gathering requirements, designing proofs-of-concept. But I didn’t just build it, I sold it. I pitched it to staff, handled the “but is it safe?” objections, and demoed it in plain language until it clicked. When 200+ users started adopting it, that’s when it hit me: this was Sales Engineering in disguise.
Before that, I cut my teeth in enterprise IT at Amazon, Colliers International, and the US Postal Service. Vulnerability remediations, MFA deployments, nationwide support, high stakes.
I also worked in MSP environments supporting 50+ client organizations across different industries, which sharpened my ability to diagnose problems quickly, translate technical issues into plain language, and earn trust fast.
Those years taught me how to keep systems secure, users happy, and execs calm when things got messy.
And on the side? I’ve built ventures that doubled as training grounds and strengthened my consultative selling skills:
- IntelligentMuscle.net – a fully automated digital fitness platform I spun up in my early 20s that pulled in $8k in its first three weeks. I managed the full SaaS lifecycle—from backend systems to customer retention, often saving 80% of refund-seeking customers through empathetic calls and solution reframing.
- Real Estate Marketing Consultant – authored The One Page Marketing Plan for Real Estate Investors as a lead-gen tool that positioned me as a trusted advisor; from there, I helped investors generate six-figure profits (e.g., one client landed three deals worth $150k+) by uncovering pain points in discovery calls, designing USP-driven websites and direct mail campaigns, and closing $1,000/month subscription retainers.
Each of these sharpened the same muscles I use today: finding pain points, pitching solutions, and closing.
Through Operation Octopus, my cybersecurity blog, I’ve also shared insights from hands-on labs—SIEM setups, penetration testing, Nessus vulnerability management—and how those skills tie back to real business value.
So why Sales Engineering? Because it’s everything I love rolled into one role: tech, problem-solving, people, persuasion, revenue. It’s where all the threads of my interests and strengths come together — and it’s what truly lights me up. And honestly, I’ve been training for this all along.
If you’re curious, let’s connect. Reach me on LinkedIn or here. I’m always down to talk shop—whether it’s SaaS, sales, cybersecurity, or just swapping stories about ridiculous side hustles.
Behind the Scenes: My Technical Side
While my focus today is on Sales Engineering—discovery, demos, and translating tech into business wins—I also bring a strong technical foundation. Over the years I’ve earned certifications, completed hands-on labs, and built projects that keep my skills sharp and credible. Here’s a breakdown of the technical work that underpins my Sales Engineering journey:
# Splunk Fundamentals
# Cybrary - Become a SOC Analyst - Level 1 (81h 4m)
# MITRE ATT&CK Training
# Pentester Academy
# INE: Penetration Testing Student
# TryHackMe
~$ Vulnerability Assessment: Nessus, Nikto, Wireshark, Burp Suite, Nmap, SQLmap
~$ Regulatory Compliance: NIST 800-61, NIST 800-171, CIS Controls v8, ISO 27001
~$ Scripting and Programming: Linux Shell, Bash, PowerShell
~$ Offensive Security: Kali Linux, Metasploit, Meterpreter, Aircrack-ng, DirBuster, enum4linux, exploitdb, John the Ripper, Ettercap, Social-Engineer Toolkit (SET), Mimikatz, Wappalyzer, MITRE ATT&CK framework
~$ Operating Systems: Linux, Windows, MacOS, Virtual Machines (VMware)
~$ SIEM & Monitoring Tools: Splunk, Azure Sentinel, Elastic Stack (ELK), Security Onion
~$ Network: Fundamentals, common protocols, packet capture and analysis, log analysis, tcpdump, Ettercap
~$ Other: Typing speed of 95 wpm
