Hasan Al Banna Muhammad Abduh

Technical Support at Practical DevSecOps
  • Claim this Profile
Contact Information
us****@****om
(386) 825-5501
Location
Yogyakarta, Indonesia, ID

Topline Score

Topline score feature will be out soon.

Bio

Generated by
Topline AI

5.0

/5.0
/ Based on 1 ratings
  • (1)
  • (0)
  • (0)
  • (0)
  • (0)

Filter reviews by:

LinkedIn User

Hasan is highly talented student in IT company. He always has sense of willing to learn everything directly anytime. He is also professional in every jobs that he had taken. kindly creating any task quickly and simply, he is also great in cyber security such web penetration testing. He has professional background as a-fast-learning person who currently studies with me in the same major, he always leads us in many groups about cyber security and solutive person in every team, so that he is highly recommended to learn more in every place and easy to adapt with genius attitude.

You need to have a working account to view this content.
You need to have a working account to view this content.

Credentials

  • CyberOps Associate
    Cisco
    Nov, 2022
    - Nov, 2024
  • CCNAv7: Enterprise Networking, Security, and Automation
    Cisco
    Aug, 2022
    - Nov, 2024
  • CCNA R&S: Scaling Networks
    Cisco
    Aug, 2021
    - Nov, 2024
  • CCNAv7: Switching, Routing, and Wireless Essentials
    Cisco
    Feb, 2021
    - Nov, 2024
  • CCNAv7: Introduction to Networks
    Cisco
    Sep, 2020
    - Nov, 2024
  • Partner: PCAP - Programming Essentials in Python
    Cisco
    Jun, 2020
    - Nov, 2024
  • IT Essentials: PC Hardware and Software
    Cisco
    Feb, 2020
    - Nov, 2024
  • Cisco Certified Network Associate
    Cisco
    Nov, 2022
    - Nov, 2024

Experience

    • United States
    • Computer and Network Security
    • 1 - 100 Employee
    • Technical Support
      • Jul 2023 - Present

  • OUTFITCOST.ID
    • Yogyakarta, Indonesia
    • Social Media Content Advisor
      • Feb 2022 - Present

      -Conducting through research on current trends, consumer behavior, and market dynamics related to the fashion industry. This involves staying updated with the latest social media trends and identifying opportunities for content creation. -Monitoring and analyzing social media metrics and performance to gain insights into the effectiveness of content strategies. This includes tracking key performance indicators, identifying areas for improvement, and making data-driven recommendations to optimize social media presence. -Ensuring consistent brand messaging and visual identity across all social media platforms. This involves developing and implementing content guidelines, style guides, and brand voice to maintain a cohesive and recognizable brand image. Show less

    • Indonesia
    • Utilities
    • 1 - 100 Employee
    • Cyber Security Officer
      • Feb 2023 - Jun 2023

      -Responsible for designing, implementing, and managing network infrastructure. Ensuring stable connectivity, monitoring network performance, and troubleshooting technical issues related to the network. -Implementing and maintaining security measures to protect sensitive information and systems from unauthorized access, data breaches, and cyber threats. -Managing and securing databases to ensure data integrity, availability, and confidentiality. Designing and implementing backup and recovery strategies and performing regular database maintenance tasks. -Designing and planning network infrastructure based on organizational needs and industry best practices. Show less

    • Government Administration
    • 300 - 400 Employee
    • Cyber Security Analyst
      • Aug 2022 - Dec 2022

      -Collaborate with the team to design and simulate network models using specialized software. Develop network architectures and configurations to evaluate their effectiveness and security. -Conduct connectivity tests to assess network performance, identify vulnerabilities, and ensure proper. -Utilize both Windows and Linux operating systems to monitor and analyze network traffic, detect potential cyber threats, and identify anomalous activities. -Investigate and analyze security events and alerts generated by the Security Information and Event ------Management (SIEM) system. Determine the nature and severity of cyber attacks or malware incidents and provide timely response and mitigation measures. -Assess and analyze various cyber attack techniques targeting websites, such as SQL injection, cross-site scripting, and distributed denial-of-service (DDoS) attacks. Identify vulnerabilities and recommend security measures to enhance website protection. Show less

  • Mega Computer
    • Temanggung, Central Java, Indonesia
    • Repair Technician
      • Jun 2019 - Jul 2019

      -Diagnosing and identifying hardware issues in computer systems, laptops, or other electronic devices. This involves conducting thorough assessments, running diagnostic tests, and identifying faulty components. -Analyzing and diagnosing software-related problems in computer systems. This includes identifying software conflicts, troubleshooting operating system errors, and resolving software-related issues that impact device performance. -Performing data recovery processes to retrieve lost or corrupted data from storage devices such as hard drives, memory cards, or USB drives. This involves utilizing specialized software and techniques to recover valuable data for customers. -Identifying faulty or damaged hardware components and replacing them with suitable replacements. This includes disassembling devices, installing new components, and ensuring proper functioning after the replacement process. Show less

Education

  • Universitas AMIKOM Yogyakarta
    Bachelor's degree, Computer Engineering
    2019 - 2023

Community

You need to have a working account to view this content. Click here to join now