With almost four years of experience in cybersecurity across telecommunications,
financial institutions, and a private security firm, I have shown a strong dedication to
improving cyber defenses and tackling emerging threats. My background includes
working in high-pressure situations and possessing advanced technical skills, which
contribute to my consistent performance. I am looking forward to opportunities for
advancement within the organization, aiming to enhance security measures and
safeguard digital assets. I am an organized and reliable candidate who effectively
manages multiple priorities with a positive outlook, and I am eager to take on additional
responsibilities to help achieve team objectives.
Conducted comprehensive internal audits to identify areas for improvement within the organization's information security program, ensuring risks are mitigated and vulnerabilities are addressed.
Monitored and managed company assets, ensuring all assets are properly protected and continuously monitored for security breaches.
Worked closely with IT teams to integrate security measures seamlessly into existing infrastructure, ensuring robust protection without disrupting operations.
Performed regular security audits, ensuring compliance with industry regulations, ISO standards, and best practices to maintain a secure environment.
Reviewed documentation for adherence to local and national code requirements, ensuring that organizational practices align with legal standards.
Conducted thorough checks and data analysis on internal IT data, ensuring that all operations and security protocols meet ISO security standards.
Performed regular web security assessments, ensuring that all access is role-based, and only authorized personnel can access sensitive information.
Developed data analysis dashboards to streamline monitoring of key security metrics, enabling real-time tracking and efficient decision-making.
Analyzed post-resolution security incidents to identify gaps and recommend improvements in technical controls and incident response processes.
Reduced false positive alerts by fine-tuning detection parameters in security monitoring systems, significantly enhancing operational efficiency.
Customized, managed, and optimized SIEM (Security Information and Event Management) systems for real-time threat detection, correlation, and analysis.
Recommended improvements in security systems, policies, and procedures to strengthen the overall security posture.
Identified, evaluated, and reported information security threats impacting both the ePLDT Group and its clients.
Managed and monitored Endpoint Detection and Response (EDR) solutions to ensure proactive threat detection and enhance client security.
Created daily and monthly security reports based on client requirements and SLAs.
Performed vulnerability assessments as part of the client onboarding process to ensure secure integration into managed security services.
Analyzed malware samples and leveraged threat intelligence feeds to identify and document Indicators of Compromise (IOCs).
Facilitated client onboarding for security services and provided regular updates throughout project development and implementation phases.
Entered service tickets into the incident tracking system to facilitate faster problem identification and resolution.
Discussed customer concerns regarding the application user experience to promote improvements in usability and satisfaction.
Contributed to knowledge base articles, sharing expertise with colleagues to enhance overall team capabilities and knowledge sharing.
Conducted regular reviews of service desk metrics to identify opportunities for improvement and implement effective enhancements.
Implemented remote desktop support tools to increase efficiency in resolving user issues remotely.
Provided after-hours support as needed to minimize business impact during downtime or critical events.
Collaborated with IT teams to resolve complex technical issues, ensuring minimal downtime for end users.
Monitored system performance proactively to identify and address potential issues before escalation.
Generated reports to track service desk performance and analyze trends, supporting data-driven decision-making.
Validated documents submitted by the client to ensure accuracy and compliance.
Monitored sender IDs requested by the client for registration.