Additional Info

Job title of nominated professional (or team name)Senior SOC Analyst
Company (where nominated professional or team is working)Cybertronium
Websitehttps://www.cybertronium.com
Company size (employees)50 to 99
CountryMalaysia
Headquarters RegionAsia

Overview

Senior Security analyst with years of experience in the cyber security field, providing cyber security services to financial sector and small-medium enterprises. Proficient with security information event management and endpoint security technologies.
Experience with Security Tools: Azure Sentinel, DEVO, AlienVault, Splunk, LogRhythm, Mandiant Advantage, Elastic (ELK) Stack, Microsoft Defender for Endpoint, SentinelOne, Bitdefender, Cortex XSOAR, Cyberbit EDR & SOAR, and Trend Micro (Vision One, Cloud One, Tipping Point, Email Security, Apex Central/One, DDI).

• Engaged in the monitoring, analysis, and response to security incidents utilizing SIEM tools.
• Specialist in detection and response to threats at the endpoint level for EDR.
• Carried out investigations of security breaches and compiled detailed incident reports as a Cybersecurity Investigator.
• Managed the collaborative response to cybersecurity incidents across various teams as Incident Response Coordinator.
• Performed investigations into digital mediums to trace the origins and extent of security breaches as a Digital Forensics Analyst.
• Served as a Malware Analyst that involved analyzing and counteracting malware threats that impact an organization.
• As a Threat Hunter, actively seeks out hidden threats within the network to preemptively counter them.
• Tasked with designing and implementing systems that detect suspicious activities in cyber environments as Cybersecurity Detection Developer.
• Assessed potential cyber risks and recommendations on appropriate mitigation strategies as a Cyber Risk Analyst.
• Updated and established cybersecurity policies and procedures as Cybersecurity Policy Maker.
• Performed as Security Awareness Trainer who plays a crucial role in educating employees about security best practices and awareness of threats.
• Ensured that the organization complies with both internal and external security standards and regulations as a Cybersecurity Compliance Auditor.
• Offered advice and designs robust security architectures to protect network infrastructures as a Security Architecture Consultant.
• Responsible for managing and securing the network infrastructure of an organization as a Network Security Administrator.
• Specializes in Cloud Security and focuses on security of cloud-based platforms and services.

Accomplishments

In acknowledgment of outstanding contributions to the cybersecurity field, he possesses the necessary expertise and experience with a robust background in providing cybersecurity services to clients in the financial sector and small-medium enterprises, he has demonstrated unparalleled proficiency in Security Information Event Management (SIEM) and Endpoint security technologies. His adeptness with an extensive array of security tools, including Azure Sentinel, DEVO, AlienVault, and more, showcases his versatility and depth of knowledge.


Furthermore, he has exhibited a proactive approach to incident response and investigation, ensuring prompt and thorough resolution of security breaches and incidents. His meticulous documentation of security breaches and assessment of associated damages underscores his commitment to maintaining robust cybersecurity measures. Moreover, he has played a pivotal role in strategic security policy development, collaborating with teams to craft standards and best practices, and providing valuable recommendations to senior management for enhancing security posture.


In addition to his hands-on experience, he has demonstrated a commitment to continuous learning and professional development, as evidenced by his attainment of certifications such as AZ-900 Certified Microsoft Azure Fundamentals, Certified Penetration Testing Professional, and more. His dedication to staying abreast of the latest IT security trends further solidifies his suitability for the role. In conclusion, he embodies the qualities and expertise necessary to excel in this position, and his capabilities are a significant asset to any cybersecurity initiative.