Digital Forensics & Cybersecurity Enthusiast
Send a job offer directly to this candidate
I have over 15 years of experience in information security, system auditing, forensic analysis, fraud investigation, banking compliance, cybersecurity, and hold multiple certifications, such as CRCM, CISA, CISM, CFE, ACE, GCFA, dCAA, CEHv8, CEHv7, CCFE.
I perform forensic examinations and preserve analyzed data obtained from various electronic devices, using the latest tools and best practices. I also demonstrate knowledge of subject matter, pedagogy, and andragogy through exceptional content delivery and course design. I am passionate about sharing my expertise and helping students pursue their career goals in the field of forensics and cybersecurity.
Digital Forensics & Cyber Security Instructor
Government & Private Company - DKI Jakarta, Indonesia
•Perform forensic examinations and preserve analyzed data obtainedfrom examining electronic devices, including laptop, desktop computers, servers, mobile devices
•Teach Cyber Defense and Digital Forensic courses
•Instructors would teach face-to-face, online, dual enrollment, or hybrid courses.
•Demonstrates knowledge of subject matter through exceptional content delivery, pedagogy, and andragogy through the teaching of Digital Forensic courses.
•Describe the procedures, ethics/codes, and key technologies in Digital Forensics
•Explain how to apply the digital forensic concepts and methodologies to existing digital environments.
•Manage and oversee security operations, incident response, and disaster recovery programs.
•Establish a risk management framework to identify, assess, and mitigate information security risks across the organization.
•Establish and implement policies and procedures for IT (IT policy) including IT security policies (IT security policy)
•Controls and prioritizes all business requests, such as those for feature enhancements, ensuring limited resources are spent on high-value requests
•Ensure that all information systems are functional, secure, and compliant with privacy laws and regulations.
•Develop and establish IT policies, procedures, and standards to ensure consistency and compliance with organizational guidelines
•Ensure the protection of the organization's information assets, including data, systems, and networks, against unauthorized access, use, disclosure, destruction, or modification.
PT. HAY TRANS PRATAMA
•Oversees staff of the IT Operations and Business Systems departments, including hiring, scheduling, disciplining, training/development and overall employee performance with an emphasis on service.
•Serve as the Information Security Officer to assist with internal and external information security related investigations and update disaster recovery plan.
•Periodically testing of the plan and other applications as deemed appropriate.
•Establish, adhere to and enforce system security policy and standards;
develop, maintain and update appropriate policies and procedures.
•Manage infrastructure projects for the organization within approved budget and agreed upon timelines.
•Communicates with all levels of management to determine information requirements to establish boundaries and priorities of new projects and to discuss system capacity and equipment acquisitions.
Owner,
CV.BORNEO ANDALAS TECHNOLOGY & SECURITY
•Building the company's technical vision and leading all aspects of technology development companies.
•Directing the company's strategic direction, development and growth in the future
•Works by consultation with the heads of other departments, such as marketing, production and operations as a technology advisor that can increase their efficiency and effectiveness.
•Provide leadership to the department head in a fashion that supports the culture, mission and values of the company.
•Conducting research and case studies on leading-edge technology andmake a determination about a possible implementation.
•Acting as good stewards of the resources of the company and ensure control of IT and Security Companies.
•Information security/risk/incident analysts, support the front-line defense of networks, protecting information from unauthorized access and violations.
•Provide strategic direction for our compliance team.
•Work closely with department heads and other management-level staff to establish compliance priorities and update policies.
•Plan and execute compliance programs to ensure that company.
operations are adhering to relevant federal, state, and local laws.
•Develop guidelines for internal compliance audits of various company operations to see whether proper protocols and procedures are followed, identify problems, and suggest ways for improvement.
•Stay up to date on the latest regulatory changes within the industry and update our compliance procedures accordingly.
•Facilitate collaborations with external legal experts and auditors when performing audits and creating new compliance policies.
Assistant Vice President Information Technology
PT. MAHAKAM TEPIAN INTERNATIONAL
Master of Science, Information Technology, Expected in 02/2024
University of The People - USA
Master of Science, Cybersecurity, 03/2015
Bellevue University - Bellevue, USA
Master of Science, Organizational Psychology, 05/2011
City, University of London - London, UK