Vulnerability Assessment

A dimly lit desk setup featuring a computer monitor displaying a document titled 'General Hardening Guideline'. The desk has a mechanical keyboard with blue and red keys, a lamp providing light on the right side, and various small items including notes pinned to the wall, a notebook, and a cup. There is a mesh office chair in front of the desk.

Cloud Security

Implemented zero trust policies to secure multi-cloud environments, reducing exposure by 40%.
Signage on a wall reads 'Cybercrime Analysis & Research Alliance @ NTU (CARA)' in bold, white letters against a dark, textured surface. A corridor with partial ceiling panels is visible, and there's some greenery in the background.

Incident Response

Led rapid containment and recovery efforts during a ransomware attack, minimizing downtime.
A dimly lit desk setup featuring a computer monitor displaying a document titled 'General Hardening Guideline'. The desk has a mechanical keyboard with blue and red keys, a lamp providing light on the right side, and various small items including notes pinned to the wall, a notebook, and a cup. There is a mesh office chair in front of the desk.

Risk Mitigation

Developed risk frameworks that proactively identify and address emerging cyber threats.
A person wearing a white mask is interacting with a network server, handling blue cables. The setup is illuminated with blue lights, suggesting a technological environment.

Incident Response

Detailed STAR method case studies showcasing measurable ROI from security initiatives.

Core Services

A white mask with distinct black features is placed on an open server tray in a data center or server room. The server is equipped with various LED indicators and network ports, suggesting an active setup.
Comprehensive vulnerability assessments to identify and mitigate risks early.
A lone security camera mounted on a tall pole with a clear blue sky and scattered clouds in the background. A bird is seen flying near the top.
Implementing zero trust principles to secure cloud environments effectively.
A closed padlock rests on top of a computer keyboard, symbolizing security. The image incorporates a motion blur effect, suggesting speed or data movement.
Implementing zero trust principles to secure cloud environments effectively.

Gallery

Snapshots of key projects showcasing cybersecurity expertise.

Signage on a wall reads 'Cybercrime Analysis & Research Alliance @ NTU (CARA)' in bold, white letters against a dark, textured surface. A corridor with partial ceiling panels is visible, and there's some greenery in the background.
A person wearing a white mask is interacting with a network server, handling blue cables. The setup is illuminated with blue lights, suggesting a technological environment.
A modern desk setup featuring a camera lens, a tablet displaying an interface with app icons, a pair of earbuds in an open charging case, and a book titled 'Wireless and Mobile Device Security' on a shelf below.
A padlock sits on a laptop keyboard with glowing red, green, and blue light trails swirling around, creating a sense of security and cyber awareness.