Information Security, Banking Security, Technology Information and Cyber Risk
I'm a IT, Jakarta based who loves Challenge, Explore & Enthusiast and focus in IT Security. Enjoy Traveling, Movies, Gaming & Music.
Major in Banking Security, Information Security, ID Management & Technology Information and Cyber Risk.
Handle: Assesment, Security Awareness, Vendor Assesment, Procedur and Policy, Cyber Roadmap, CyberRisk, Cybersecurity Review Bussiness IT Process, End to End, Phishing Simulation, Obsolete Review
Handle: Endpoint Security, Coordinate Blue Team& Red Team, Hardening Review Process, Coordinate Alert & Security Monitoring. Handle: ID and Management, Parameter process, Regulatory Application review, STP Application
Handle: Endpoint Security (Symantec, Qradar, Mcafee, Tripwire, Imperva, Network, DLP, Manage and involve security Project
Handle: Team Lead for Trendmicro Team on Bank Mandiri
Handle: Bank Mandiri for support and helpdesk
Handle: IT Support for supporting client : Bank Mandiri, Boehringer, Bank Ekonomi/p>
McAfee use a unique, predictive capability that is powered by McAfee Global Threat Intelligence, which enables home users and businesses to stay one step ahead of the next wave of fileless attacks, viruses, malware, and other online threats. Cert & Training Mcafee ePO, DLP, Safeboot, FRP
Computer hacking forensic investigation is the process of detecting hacking attacks and properly extracting evidence to report the crime and conduct audits to prevent future attacks.
The ECSA penetration testing course provides you with a real world hands-on penetration testing experience and is a globally accepted hacking and penetration testing class available that covers the testing of modern infrastructures, operating systems and application environments while teaching the students how to document and write a penetration testing report.
Tripwire Enterprise is the industry’s leading security configuration management (SCM) solution
IBM QRadar is an enterprise security information and event management (SIEM) product. It collects log data from an enterprise, its network devices, host assets and operating systems, applications, vulnerabilities, and user activities and behaviors.