Graham Devete
Information Security Analyst at Teachers Savings and Loan Society- Claim this Profile
Click to upgrade to our gold package
for the full feature experience.
Topline Score
Bio
Credentials
-
Fortinet FortiGate 7.4 Operator
FortinetOct, 2023- Nov, 2024 -
Computer Network Fundamentals
Charles Sturt UniversityJun, 2023- Nov, 2024 -
Cyber Defence Strategies
Charles Sturt UniversityJun, 2023- Nov, 2024 -
Cyber Warfare & Terrorism
Charles Sturt UniversityJun, 2023- Nov, 2024 -
Enterprise Cyber Security Fundamentals
Charles Sturt UniversityJun, 2023- Nov, 2024 -
Networking Basics
CiscoJun, 2023- Nov, 2024 -
Ethical Hacking Essentials (EHE)
EC-CouncilMay, 2023- Nov, 2024 -
Google Cloud Computing Foundations: Infrastructure in Google Cloud
Google Cloud Training OnlineMay, 2023- Nov, 2024 -
Machine Learning APIs
Google Cloud Training OnlineMay, 2023- Nov, 2024 -
Cloud Engineering
Google Cloud Training OnlineApr, 2023- Nov, 2024 -
Create and Manage Cloud Resources
Google Cloud Training OnlineApr, 2023- Nov, 2024 -
Digital Transformation with Google Cloud
Google Cloud Training OnlineApr, 2023- Nov, 2024 -
Google Cloud Computing Foundations: Cloud Computing Fundamentals
Google Cloud Training OnlineApr, 2023- Nov, 2024 -
Google Cloud Essentials
Google Cloud Training OnlineApr, 2023- Nov, 2024 -
Google Cloud Fundamentals: Core Infrastructure
Google Cloud Training OnlineApr, 2023- Nov, 2024 -
Infrastructure and Application Modernization with Google Cloud
Google Cloud Training OnlineApr, 2023- Nov, 2024 -
Innovating with Data and Google Cloud
Google Cloud Training OnlineApr, 2023- Nov, 2024 -
Operating Systems Basic
CiscoApr, 2023- Nov, 2024 -
PCIDSS Compliance (Foundation)
QualysApr, 2023- Nov, 2024 -
Understanding Google Cloud Security and Operations
Google Cloud Training OnlineApr, 2023- Nov, 2024 -
Applied Data Loss Prevention
EC-CouncilFeb, 2023- Nov, 2024 -
Cybersecurity Essentials
CiscoFeb, 2023- Nov, 2024 -
Introduction to Cybersecurity
CiscoFeb, 2023- Nov, 2024 -
Introduction to Dark Web, Anonymity, and Cryptocurrency
EC-CouncilFeb, 2023- Nov, 2024 -
SQL Injection Attacks
EC-CouncilFeb, 2023- Nov, 2024 -
Web Hackers Toolbox: Tools Used by Successful Hackers
EC-CouncilFeb, 2023- Nov, 2024 -
Certified Security Operations Center Practitioner
Network IntelligenceJul, 2022- Nov, 2024 -
Certified Data Privacy Practitioner
Network IntelligenceNov, 2020- Nov, 2024 -
Certified Payment Security Practitioner
Network IntelligenceOct, 2020- Nov, 2024 -
Certified Duo Help Desk Administrator
Duo SecurityOct, 2023- Nov, 2024 -
Certified Level 1 Duo Administrator
Duo SecurityOct, 2023- Nov, 2024 -
Fortinet Certified Associate in Cybersecurity
FortinetOct, 2023- Nov, 2024 -
Level One Administrator
Duo SecurityOct, 2023- Nov, 2024 -
Certified Web Security Professional
MimecastSep, 2023- Nov, 2024 -
Fortinet Certified Fundamentals Cybersecurity
FortinetSep, 2023- Nov, 2024 -
Fortinet Network Security Expert Level 3: Certified Associate
FortinetMay, 2023- Nov, 2024 -
Fortinet Network Security Expert Level 2: Certified Associate
FortinetSep, 2022- Nov, 2024 -
Fortinet Network Security Expert Level 1: Certified Associate
FortinetAug, 2022- Nov, 2024 -
Associate Member
ACS (Australian Computer Society)Mar, 2020- Nov, 2024 -
Associated Professional Member (APM)
ISACADec, 2019- Nov, 2024 -
Member
SANS Institute
Experience
-
Teachers Savings and Loan Society
-
Papua New Guinea
-
Financial Services
-
1 - 100 Employee
-
Information Security Analyst
-
Oct 2021 - Present
My current role supports the Manager Information Security to implement and monitor Information Security operations in maintaining TISA's Cyber Security posture to ensure confidentiality, integrity, availability and non-repudiation of TISA’s data and information assets as per the InforSec & Cybersecurity Program. I have implemented and deployed major security projects for entire banking and financial organizations for Security solutions such as ForcePoint and Mimecast (Email and Web filtering), Mobile Iron (MDM) and Checkpoint (Encryption, Endpoint Security, Anti-Bot,URL Filtering, Anti-Ransomware,Behavioral Guard & Reverse Engineering Forensics), MalwareBytes(Endpoint), Sophos(Encryption), Rapid7(Visibilty & Analytics), Cyber Observer(Security Operating Centre Monitoring). I have also set security controls, policies, procedures and implemented cybersecurity frameworks and standards such as the NIST Cybersecurity Frameworks, ISO27001, CIS 7.1 Controls, SWIFT Customer Security Program, PCIDSS Compliance standards on a daily basis to meet these requirements and be compliant as a Bank and Organization. I have also conducted User Access Reviews on all core banking applications, network and server infrastructure, conducted cybersecurity end user awareness for all branches Nationwide, Support the implementation of new cybersecurity solutions through working with enterprise architects, infrastructure, and applications teams. Support implementation of required fixes to manage intrusion and other threats and maintain TISA’s agreed level of cyber security risk and posture. Show less
-
-
-
Kina Bank
-
Papua New Guinea
-
Banking
-
300 - 400 Employee
-
Cyber Security Analyst
-
Aug 2019 - Oct 2021
Monitor cybersecurity operations to maintain Kina Bank’s cyber security posture to ensure confidentiality, integrity, availability and non-repudiation of Kina Bank’s information assets. •Daily monitoring of logs and other feeds and outputs from technology deployed in the Kina environment to ensure intrusion detection and maintenance of Kina’s cybersecurity posture. Any intruder activity detected or changes in Kina’s cybersecurity posture to be promptly reported to the Cybersecurity Manager and Head of IT Governance • Technical acumen including OSI, IT infrastructure, cloud, IoT architectures, application development languages, tools and frameworks, database technologies, web technologies, next gen mobile, network architecture, enterprise architecture, and directory services. • Security technology acumen and experience including but not limited to: firewall, intrusion detection, cyber-attack tools and defenses, encryption, certificate authority, web filtering, anti-malware, anti-phishing, identity and access management, multi factor authentication. • Support implementation of required fixes to manage intrusion and other threats and maintain Kina Bank’s agreed level of cyber security risk. • Support incident response and the investigation of cyber security breaches. • Support the implementation of new cybersecurity solutions through work with enterprise architects, infrastructure, and applications teams. • Implement upgrades and patching of deployed cybersecurity solutions. • Support the implementation and maintenance of cybersecurity policies, procedures, standards and guidelines. • Participate in projects as required from time to time by Kina, to ensure cybersecurity factors are taken into consideration and implemented. • Establish and maintain effective professional working relationships with members of Kina’s IT Team, co-workers, and staff. Show less
-
-
-
Ethan Group
-
Australia
-
IT Services and IT Consulting
-
1 - 100 Employee
-
IT Specialist
-
Jul 2015 - Jul 2019
Key Support Competencies: Unified Communications Services (VOIP Phones Maintenance & Support) End User Support Service Desk Services 1st level user support 24/7 Telephone support Incident logging and tracking via the Helpdesk Incident & Problem management Call severity assignment, management & reporting Server Infrastructure Maintenance & Support Hardware incident management Reinstallation and configuration of supported applications & operating systems Business Hours Onsite Support 24/7 Onsite Support Desktop Infrastructure Maintenance & Support SOE maintenance Citrix, Thin Client support service & Maintenance Business Hours Onsite Support Data Protection Services Tape rotation and offsite storage Antivirus, Antispam & Malware Administration Management of supported Antivirus and Antispam devices and software Outbreak control management Network Administration Moves, Adds, Changes (MACs) of user and email accounts Active Directory Group Management (Distribution & Security) Printer management: drivers, queues and availability ICT fleet inventory tracking (basic) LAN/WAN Infrastructure Maintenance & Support 24/7 LAN/WAN Infrastructure Monitoring & Availability Tracking Patch and firmware management Hardware incident management Change Control Procedures including CAB Business Hours Onsite Support 24/7 Onsite Support Monthly Reporting & Real-time Self-Service Helpdesk Reporting on open tickets, severity reporting, tickets handled per period Change Control Compliance & CAB reporting Out of scope billing (adhoc) reporting Major Disruption Incident Reporting (P1/P2) - On request Real-Time server availability and capacity reporting Show less
-
-
-
NWTL Timor Leste
-
Retail
-
1 - 100 Employee
-
IT & Network Specialist
-
2011 - 2013
Daily consultations, troubleshooting, problem solving for all hardware,software, network related systems and peripheral devices issues. Ensures the effective operation and functionality of all systems . Administration and support of Windows 2008 standard server to include Active Directory, Group Policy, User access and security, basic LAN, WAN, DNS, DHCP, administration and support. Manage Active Directory of users, create accounts and set up e-mail in Domain and outlook. Maintain all business enterprise software used by the company, consists of Microsoft Office 2007, 2010.Pronto-Xi Enterprise Management System, QuickBooks and Team Viewer Provide technical support, Installation, configuration, maintenance, and troubleshooting of over 100 desktops, laptops and iMac users including network devices (Networks printers, redundant servers, switches, wireless routers and Access Points). Prompt in Identifying and addressing complex usability problems. Oversight of installation on all network communications twisted pair cabling in all new locations. Installation and updating of all new software, checking maintenance plans, Pronto-Xi reports and sales updates from retail outlets. Backing up of daily Pronto-Xi data on Pronto-Xi Server (Linux Red hat). Assist in the preparation of the department’s budget and business plan involving purchasing of new services, hardware and other IT supplies. This would include setting up and installation of all new field laptops, PC and other devices including network peripheral devices. Accurately manage all asset inventory and software compliance licenses Responsible for remote connections and connecting Via Team Viewer to all pc users outside the head office providing support to sales and retail outlets. Remove of Mal ware, virus and updating of anti-virus (AVG 2011) on corporate users’ PCs. Provide backup support to IT Manager with help installing and deployment of new redundant servers. Manage daily, weekly, and monthly backup systems. Show less
-
-
-
Telikom PNG
-
Telecommunications
-
700 & Above Employee
-
IT Support Staff
-
2005 - 2007
Responsibilities/Duties: Installation and configuration of peripheral devices and device drivers on new and old PC’s, Microsoft Windows 2000 and XP/Linux, Operating Systems on new and old PC’s, client PC’s onto Microsoft workgroups and domains, PC’s onto the corporate TCP/IP network. TCP/IP, LAN, WLAN and WAN networks devices such as routers and wireless access points (APs). Installation and configuration of Microsoft office applications 2010, 2007, 2003 and other client software for business applications that Telikom PNG Ltd uses. Attending to general PC and network fault finding. Ensuring anti-virus software is up to date and the entire system in virus free. Run diagnostic tests. Make recommendations for any upgrades or replacements when required. Create user documentation, manage customer relationships and apply occupational health and safety procedures. On call and reported general PC and network faults and problems relating to the IT department around Port Moresby. This included the head of the IT Department and team leader appointing me to assist during weekends also. Show less
-
-
Education
-
Canberra Institute of Technology
Information Technology