Liew Hao Chrng
Recognized in the Category:
Photo Gallery
|
Liew Hao Chrng
Additional Info
| Nominee’s Name | Liew Hao Chrng |
| Nominee’s Job Title or Role | Lead, SOC Operations |
| Company / Organization | Cybertronium |
| Company size | 40-69 employees |
| Country | Malaysia |
| World Region | Asia |
| Website | https://cybertronium.com |
NOMINATION HIGHLIGHTS
A dedicated Senior Security Analyst with extensive hands-on experience across the cybersecurity landscape, delivering robust security services to organizations in the financial sector and small-to-medium enterprises. Industry exposure spans banking, healthcare, payment gateways, and oil & gas — environments where precision, resilience, and vigilance are non-negotiable. Core competencies lie in Security Information and Event Management (SIEM) and endpoint security, underpinned by a continuous drive to evolve with the ever-changing threat landscape.
SECURITY TOOLS & TECHNOLOGIES
Hands-on proficiency across a broad spectrum of industry-leading security platforms: • SIEM Platforms: Azure Sentinel, DEVO, AlienVault, Splunk, LogRhythm, Elastic (ELK) Stack, Coralogix SIEM • Endpoint Detection & Response: Microsoft Defender for Endpoint, SentinelOne, ManageEngine, Bitdefender, Trend Micro, Palo Alto EDR (Cortex XDR) • Threat Intelligence & Investigation: Mandiant Advantage, Cyberint, StealthMole • Security Orchestration & Automation: Cortex XSOAR • Network & Perimeter Security: Tipping Point IPS, Checkpoint Harmony SASE • Email Security Solutions
KEY CONTRIBUTIONS & FUNCTIONAL ROLES
• Security Monitoring & Incident Response: Spearheads end-to-end monitoring, analysis, and response to security events using advanced SIEM platforms, ensuring timely detection and containment of threats.
• Endpoint Threat Detection (EDR): Serves as a specialist in identifying and neutralizing endpoint-level threats, leveraging EDR tools to safeguard organizational assets.
• Cybersecurity Investigation: Conducts thorough investigations into security breaches, producing detailed incident reports with actionable findings that drive remediation. • Incident Response Coordination: Leads cross-functional incident response efforts, aligning technical teams and stakeholders to ensure swift, organized resolution of cybersecurity events.
• Digital Forensics (Windows & Linux): Performs in-depth forensic investigations across both Windows and Linux environments, tracing the origins and scope of breaches with precision.
• Malware Forensics & Reverse Engineering: Analyzes malicious code through reverse engineering techniques, identifying behavioral patterns and assessing organizational impact.
• Malware Analysis: Evaluates and counters active malware campaigns, providing mitigation strategies that reduce operational risk. • Threat Hunting (Network & Dark Web): Proactively hunts for concealed threats within internal networks and monitors dark web channels to anticipate and preempt emerging attack vectors.
• Custom Detection Engineering: Designs and deploys bespoke detection rules grounded in real-world threat intelligence, strengthening the organization’s capacity to identify novel and sophisticated threats.
• Security Architecture & Solution Design: Reviews, architects, and implements layered security solutions — encompassing Antivirus, Intrusion Prevention Systems (IPS), Log Aggregation & Monitoring, and Identity and Access Management (IAM) — to fortify the overall security posture.

