Punctual and honest Cybersecurity consultant with solid background in Information and Protective Security environments. Satisfies customers with exceptional service. Uses slow periods effectively to stay on top of daily chores while pursuing opportunities to help team improve security engineering and architecture.
Head and lead consultant in technology consulting group designing Cybersecurity architecture for PLDT clients using NIST Framework, CISA Framework and CIS Controls
SIGNIFICANT SECURITY CONSULTATIONS:
Consulted on the 2019 South East Asean Games security implementations
Lead Security Consultant of Parish Pastoral Council for Responsible Voting (PPCRV) Philippine Elections 2022
Work as lead Data Privacy Expert and Consultant to various ePLDT clients. Implement Data Protection, Privacy Impact Assessment Recommend Organizational, Physical and Technical Controls Conduct Data Protection Awareness
Design the Security aspect of one of the Smart City using NIST Framework, CISA Framework and CIS Controls Design both Network and Security of one of the Smart Campus opportunities based on NIST framework.
Enterprise Architect and Cybersecurity Consultant for the New Clark City Project Securing the network and data using perimeter security, segmentation and block chain. Recommend basic and beyond security solutions and technologies using NIST Framework, CISA Framework and CIS Controls
Team lead on cybersecurity engagement
Serve as trusted advisor of PLDT clients relevant to Information Security
Attend to meetings and conducts framework and security controls presentation
Consulted on the recently concluded Philippine Sea Games 2019 on security Design the Security aspect of one of the Smart City using NIST Framework, CISA Framework and CIS Controls Design both Network and Security of one of the Smart Campus opportunities based on NIST framework.
Experienced with [Technology]
undefinedIT Governance & Enterprise Architecture
NIST Framework and Best Practices Standard adoption
CISA Cybersecurity Framework Best Practices
Information Security Process Assessment & Design
Cyber Security Management Incident Response Training
Ransomware Attack Prevention, Mitigation, and Response
Smart City Cybersecurity Enterprise Architecture In-depth
Cloud Computing Security Cloud Security Posture Maturity
Protecting Against the Threat of Unmanned Aircraft Systems (Webinar)
Forensics Guidelines for Video Evidence Canvassing and Collection
Forensics Practices for Archiving Digital and Multimedia Evidence
Forensics Digital Evidence Acquisition from Cloud Service Providers
Developing Cyber Resiliency
Zero Trust Development and Maturity Model
Building CSIRT and SOC Securing Industrial IoT
Preparing for Ransomware Attack
Security and Privacy Controls Industrial Control Systems
Security Business Email Compromise
Developing Cyber Resiliency Securing IpV6