NTC PKI.
As a penetration testing team member for the National Telecommunication Corporation’s PKI and Repository project, I conduct thorough assessments to ensure the security and resilience of both the infrastructure and applications involved.
“Ensuring digital safety and security against evolving threats is crucial, and cybersecurity plays a pivotal role. A multi-dimensional approach via tools, education, and monitoring is necessary to manage the risks involved in malware and hacking. Ignoring cybersecurity can result in serious consequences. Therefore, it is imperative for all entities to prioritize cybersecurity to guarantee comprehensive protection.“
I take a comprehensive approach to protect organizations from a wide range of cyber threats. By implementing strong strategies, conducting thorough vulnerability assessments, and providing engaging training, I ensure the security of valuable digital assets. My goal is to identify and address potential risks, empower individuals with practical knowledge, and create a proactive defense against malicious attacks.
Firewall Management, Intrusion Detection Systems (IDS), Virtual Private Networks (VPNs), Access Control Lists (ACLs)
Penetration Testing, Vulnerability Assessment, Exploit Development
SIEM (Security Information and Event Management), Antivirus/Anti-malware, IDS/IPS Solutions, Vulnerability Scanners
Cyber Incident Handling, Forensics Analysis, Incident Mitigation
Secure Software Development, Input Validation, Code Review
As a penetration testing team member for the National Telecommunication Corporation’s PKI and Repository project, I conduct thorough assessments to ensure the security and resilience of both the infrastructure and applications involved.
In collaboration with the client, we design masterplans to establish a secure infrastructure for the asset portfolio. These plans aim to attract skilled ICT engineers and engage stakeholders and members of the Japanese community effectively.
Medicos Connect, a top-tier healthcare technology firm, is thoroughly tested for resilience against potential offensive attacks, ensuring strong security measures for their technological infrastructure.
Bachelor of Science in Telecommunication Engineering, providing a solid foundation for navigating the dynamic telecommunications and networking landscape
Proficient in Cybersecurity with a Google Cybersecurity Certificate, demonstrating expertise in securing digital systems and networks. Acquired hands-on experience in identifying and mitigating cyber threats, and proficiently implementing security best practices. Committed to ensuring robust cybersecurity measures to safeguard sensitive information in a professional capacity.
Which firmament dominion first rule and tree. The seas he i were cattle Under living. It may beast every forth place.
Rule bearing whales. Created gathering blessed, sixth likeness male. Over were which you'll so be make moveth made saw above.
Firmament itself rule their evening, which moved very night so great them cattle bearing and gathered forth had whose bearing.
Which firmament dominion first rule and tree. The seas he i were cattle Under living. It may beast every forth place.
Rule bearing whales. Created gathering blessed, sixth likeness male. Over were which you'll so be make moveth made saw above.
Firmament itself rule their evening, which moved very night so great them cattle bearing and gathered forth had whose bearing.
Which firmament dominion first rule and tree. The seas he i were cattle Under living. It may beast every forth place.
Rule bearing whales. Created gathering blessed, sixth likeness male. Over were which you'll so be make moveth made saw above.
Firmament itself rule their evening, which moved very night so great them cattle bearing and gathered forth had whose bearing.