CISSP with robust background in IT security, prepared to enhance organizational safety and efficiency. Adept at identifying vulnerabilities, implementing protective measures, and ensuring compliance with industry standards. Strong focus on team collaboration and delivering reliable results. Skilled in threat analysis, network security, and incident response. Known for adaptability and reliability in dynamic environments.
CISSP-certified cybersecurity professional with 7+ years of expertise in designing, implementing, and optimizing robust security architectures.
I work closely with stakeholders to drive the entire project lifecycle, from strategic consulting and meticulous planning to seamless deployment and ongoing support.
My proven track record includes extensive hands-on experience with industry-leading solutions crucial for modern cyber defense:
- BullWall Ransomware Containment: Specializing in proactive endpoint defense and rapid breach mitigation.
- Certus Erasure: Expert in certified data sanitization and secure data lifecycle management, ensuring regulatory compliance.
- Netwrix Suite (Identity Manager, Auditor, Endpoint Protector, PingCastle Enterprise, Access Analyzer): Proficient in Identity and Access Management (IAM), privileged access management (PAM), security auditing, threat detection, and vulnerability management across enterprise environments.
- iStorage / Kanguru: Skilled in deploying secure physical storage solutions for sensitive data.
- Jetico: Specialized in container encryption and advanced data protection strategies.
As a Cyber Security Engineer at PrimusTech, I leveraged my Bachelor of Science in Cyber Forensics to manage and resolve daily cybersecurity queries, ensuring robust protection for both organizational assets and also critical information infrastructures across my customer base.
I gained invaluable experience navigating complex government cybersecurity compliance requirements and spearheaded vendor management for critical tenders and projects.
My technical proficiencies include extensive hands-on work with leading security technologies:
- Firewalls: Configured, managed, and troubleshot Check Point, Palo Alto Networks, and FortiGate firewalls for network segmentation and perimeter defense.
- Operational Technology (OT) IDS: Deployed and monitored Nozomi Networks and Claroty Networks to enhance industrial control system (ICS) security and threat detection.
- Vulnerability Management: Utilized Rapid7 Nexpose/InsightVM and Tenable Nessus for comprehensive vulnerability assessments. Managed end-to-end Vulnerability Assessment and Penetration Testing (VAPT) projects by collaborating with external providers.
I have also assisted in leading the hardening technologies for our HVAC (Heat Ventilation, Air Conditioning) systems within one of our MRT (Mass Rapid Transit) systems in 2021.
Applied academic knowledge from a Bachelor's in Cyber Forensics at Murdoch University to real-world cybersecurity challenges while working as a full-time Network Security Engineer at Netpoleon Solutions.
Engaged in hands-on tasks across various network security domains, building a strong foundation in security device management, vulnerability assessment, and threat detection. This experience provided practical insights into how network security measures contribute to broader cyber forensics investigations.
Key Accomplishments/Skills:
Spearheaded critical technical support for diverse cybersecurity products, ensuring seamless operation and robust security posture for clients. Actively engaged in diagnosing, troubleshooting, and resolving complex technical issues, translating into enhanced system reliability and client trust. Gained comprehensive practical experience across various security domains including email, endpoint, web, and vulnerability management.
Key Responsibilities:
Network security management
Identity and Access management
Digital forensics investigation
Incident response planning
Security architecture design
Regulatory compliance
Business continuity planning
IP addressing and subnetting
End-user security training
Incident response
Active directory
Teamwork
Problem-solving
Adaptability
CISSP
CISSP