Are you using any plugins? There are some plugins that can disable the certificate checking.
I'm assuming your MITM attack used a certificate that wasn't self-signed, and used a CA that wasn't installed on the device? This should have failed in normal circumstances. Even so, this is no guarantee of security -- what if the MITM attack happens to use a certificate with a CA that /is/ installed on the device -- that would pass. Certificate pinning / fingerprint checking is your only option to have any assurance that you're talking to the right server. (And of course, there are ways around that as well... sigh, security is ///hard///).
When testing this, are you building debug or release? To the best of my knowledge, iOS doesn't care, but Android sure makes some differentiation here (debug builds don't care nearly as much about validating this stuff as do release builds). Even though I don't think iOS cares, it'd be worth verifying.
Did your security guy also try self-signed certs with a MITM attack? Did those fail?