Liew Hao Chrng

Recognized in the Category:

Additional Info

Nominee’s NameLiew Hao Chrng
Nominee’s Job Title or RoleLead, SOC Operations
Company / OrganizationCybertronium
Company size40-69 employees
CountryMalaysia
World RegionAsia
Websitehttps://cybertronium.com

NOMINATION HIGHLIGHTS

A dedicated Senior Security Analyst with extensive hands-on experience across the cybersecurity landscape, delivering robust security services to organizations in the financial sector and small-to-medium enterprises. Industry exposure spans banking, healthcare, payment gateways, and oil & gas — environments where precision, resilience, and vigilance are non-negotiable. Core competencies lie in Security Information and Event Management (SIEM) and endpoint security, underpinned by a continuous drive to evolve with the ever-changing threat landscape.

SECURITY TOOLS & TECHNOLOGIES
Hands-on proficiency across a broad spectrum of industry-leading security platforms: • SIEM Platforms: Azure Sentinel, DEVO, AlienVault, Splunk, LogRhythm, Elastic (ELK) Stack, Coralogix SIEM • Endpoint Detection & Response: Microsoft Defender for Endpoint, SentinelOne, ManageEngine, Bitdefender, Trend Micro, Palo Alto EDR (Cortex XDR) • Threat Intelligence & Investigation: Mandiant Advantage, Cyberint, StealthMole • Security Orchestration & Automation: Cortex XSOAR • Network & Perimeter Security: Tipping Point IPS, Checkpoint Harmony SASE • Email Security Solutions

KEY CONTRIBUTIONS & FUNCTIONAL ROLES
• Security Monitoring & Incident Response: Spearheads end-to-end monitoring, analysis, and response to security events using advanced SIEM platforms, ensuring timely detection and containment of threats.

• Endpoint Threat Detection (EDR): Serves as a specialist in identifying and neutralizing endpoint-level threats, leveraging EDR tools to safeguard organizational assets.

• Cybersecurity Investigation: Conducts thorough investigations into security breaches, producing detailed incident reports with actionable findings that drive remediation. • Incident Response Coordination: Leads cross-functional incident response efforts, aligning technical teams and stakeholders to ensure swift, organized resolution of cybersecurity events.

• Digital Forensics (Windows & Linux): Performs in-depth forensic investigations across both Windows and Linux environments, tracing the origins and scope of breaches with precision.

• Malware Forensics & Reverse Engineering: Analyzes malicious code through reverse engineering techniques, identifying behavioral patterns and assessing organizational impact.

• Malware Analysis: Evaluates and counters active malware campaigns, providing mitigation strategies that reduce operational risk. • Threat Hunting (Network & Dark Web): Proactively hunts for concealed threats within internal networks and monitors dark web channels to anticipate and preempt emerging attack vectors.

• Custom Detection Engineering: Designs and deploys bespoke detection rules grounded in real-world threat intelligence, strengthening the organization’s capacity to identify novel and sophisticated threats.

• Security Architecture & Solution Design: Reviews, architects, and implements layered security solutions — encompassing Antivirus, Intrusion Prevention Systems (IPS), Log Aggregation & Monitoring, and Identity and Access Management (IAM) — to fortify the overall security posture.