Jian Lim Choong

Information Security Analyst at Justworks
  • Claim this Profile
Contact Information
us****@****om
(386) 825-5501
Location
New York City Metropolitan Area
Languages
  • English -
  • Mandarin -
  • Cantonese -

Topline Score

Topline score feature will be out soon.

Bio

Generated by
Topline AI

You need to have a working account to view this content.
You need to have a working account to view this content.

Credentials

  • Countering Ransomware with MITRE ATT&CK
    AttackIQ
    Jan, 2023
    - Nov, 2024
  • Threat-Informed Architecture
    AttackIQ
    Jan, 2023
    - Nov, 2024
  • Application of ATT&CK Navigator
    AttackIQ
    Dec, 2022
    - Nov, 2024
  • Attack Flows
    AttackIQ
    Dec, 2022
    - Nov, 2024
  • AttackIQ Foundational Blueprints
    AttackIQ
    Dec, 2022
    - Nov, 2024
  • Beyond Atomic Testing with Attack Flows
    AttackIQ
    Dec, 2022
    - Nov, 2024
  • Center for Threat-Informed Defense Research
    AttackIQ
    Dec, 2022
    - Nov, 2024
  • Delivering Value with the ATT&CK Sightings Report
    AttackIQ
    Dec, 2022
    - Nov, 2024
  • Intermediate Breach & Attack Simulation
    AttackIQ
    Dec, 2022
    - Nov, 2024
  • Intermediate MITRE ATT&CK
    AttackIQ
    Dec, 2022
    - Nov, 2024
  • Intermediate Purple Teaming
    AttackIQ
    Dec, 2022
    - Nov, 2024
  • Introduction To FIN6 Emulation Plans
    AttackIQ
    Dec, 2022
    - Nov, 2024
  • Introduction to EASY Framework for Threat Intelligence
    AttackIQ
    Dec, 2022
    - Nov, 2024
  • Mapping MITRE ATT&CK to CVE for Impact
    AttackIQ
    Dec, 2022
    - Nov, 2024
  • Strategic Cybersecurity Management
    AttackIQ
    Dec, 2022
    - Nov, 2024
  • Uniting Threat and Risk Management with NIST 800-53 and MITRE ATT&CK
    AttackIQ
    Dec, 2022
    - Nov, 2024
  • menuPass Emulation Plan Execution
    AttackIQ
    Dec, 2022
    - Nov, 2024
  • Extending ATT&CK with ATT&CK Workbench
    AttackIQ
    Nov, 2022
    - Nov, 2024
  • Foundations of Breach & Attack Simulation
    AttackIQ
    Nov, 2022
    - Nov, 2024
  • Foundations of Operationalizing MITRE ATT&CK
    AttackIQ
    Nov, 2022
    - Nov, 2024
  • Foundations of Purple Teaming
    AttackIQ
    Nov, 2022
    - Nov, 2024
  • MITRE ATT&CK Security Stack Mappings: AWS
    AttackIQ
    Nov, 2022
    - Nov, 2024
  • MITRE ATT&CK Security Stack Mappings: Azure
    AttackIQ
    Nov, 2022
    - Nov, 2024
  • Top ATT&CK Techniques
    AttackIQ
    Nov, 2022
    - Nov, 2024
  • CyberArk Certified Trustee
    CyberArk
    Jun, 2022
    - Nov, 2024
  • Intro to Splunk (eLearning)
    Splunk
    Jun, 2022
    - Nov, 2024
  • Microsoft Certified: Security, Compliance, and Identity Fundamentals
    Microsoft
    Jun, 2022
    - Nov, 2024
  • Advanced Certificate in Applied Digital Forensic Science
    John Jay College (CUNY)
    May, 2022
    - Nov, 2024
  • Cortex XSOAR: SOAR Engineer Training
    Palo Alto Networks
    May, 2022
    - Nov, 2024
  • Cortex XSOAR: Analyst Training
    Palo Alto Networks
    Apr, 2022
    - Nov, 2024
  • Cortex XSOAR: IT Administrator Training
    Palo Alto Networks
    Apr, 2022
    - Nov, 2024
  • Autopsy Basics and Hands On
    Basis Technology
    Jan, 2022
    - Nov, 2024
  • Intro to DFIR: The Divide and Conquer Process
    Cyber Triage
    Jan, 2022
    - Nov, 2024
  • PCAP: Programming Essentials in Python
    Cisco
    Sep, 2020
    - Nov, 2024
  • Cybersecurity Essentials
    Cisco
    Aug, 2020
    - Nov, 2024
  • Introduction to Cybersecurity
    Cisco
    Aug, 2020
    - Nov, 2024
  • Introduction to IoT
    Cisco
    Aug, 2020
    - Nov, 2024
  • Cybersecurity and Privacy in the IoT
    Curtin University
    Jun, 2020
    - Nov, 2024
  • Certified in Cybersecurity (CC)
    (ISC)²
    Aug, 2023
    - Nov, 2024
  • Splunk Core Certified Power User
    Splunk
    Sep, 2022
    - Nov, 2024
  • CompTIA CySA+ ce Certification
    CompTIA
    Jan, 2022
    - Nov, 2024
  • CompTIA Security Analytics Professional – CSAP Stackable Certification
    CompTIA
    Jan, 2022
    - Nov, 2024
  • CompTIA Security+ ce Certification
    CompTIA
    Jul, 2021
    - Nov, 2024
  • (ISC)² Candidate
    (ISC)²
    Mar, 2023
    - Nov, 2024
  • Microsoft Certified: Security Operations Analyst Associate
    Microsoft
    Mar, 2022
    - Nov, 2024
  • Microsoft Certified: Azure Security Engineer Associate
    Microsoft
    Feb, 2022
    - Nov, 2024
  • Microsoft Certified: Azure Administrator Associate
    Microsoft
    Jan, 2022
    - Nov, 2024
  • Cisco Certified Network Associate (CCNA)
    Cisco
    Dec, 2016
    - Nov, 2024
  • CompTIA A+ ce
    CompTIA
    Aug, 2016
    - Nov, 2024
  • Microsoft Office Specialist for Office Excel® 2013
    Microsoft
  • Microsoft Office Specialist for Office Outlook® 2013
    Microsoft
  • Microsoft Office Specialist for Office PowerPoint® 2013
    Microsoft
  • Microsoft Office Specialist for Office Word® 2013
    Microsoft

Experience

    • United States
    • Human Resources Services
    • 700 & Above Employee
    • Information Security Analyst
      • Jun 2022 - Present

    • United States
    • Primary and Secondary Education
    • 700 & Above Employee
    • Cyber Security Incident Response Analyst
      • Jan 2022 - Jun 2022

      • Responsible for investigating, responding, and remediating cyber security incidents relating to identity, endpoint, and multiple cloud-based learning tools to mitigate risk to NYCDOE network assets • Monitor and analyze information security events, including reviewing, analyzing, and interpreting reports from various systems to identify anomalies, trends, threats, and breaches • Responsible for investigating, responding, and remediating cyber security incidents relating to identity, endpoint, and multiple cloud-based learning tools to mitigate risk to NYCDOE network assets • Monitor and analyze information security events, including reviewing, analyzing, and interpreting reports from various systems to identify anomalies, trends, threats, and breaches

    • United States
    • IT Services and IT Consulting
    • 1 - 100 Employee
    • Cyber Security Engineer
      • May 2021 - May 2022

      • Using and analyzing vulnerability scanners such as Nessus and Nexpose • Analyzing logs for IDS and SIEM • Building, configuring, and reviewing IDS such as ntopng & Suricata • Perform hunting for malicious activity across the network and digital assets (SonicWall, CrowdStrike) • Perform penetration testing using tools such as Metasploit, Nmap, Wireshark, Spiderfoot, and Maltego • Using and analyzing vulnerability scanners such as Nessus and Nexpose • Analyzing logs for IDS and SIEM • Building, configuring, and reviewing IDS such as ntopng & Suricata • Perform hunting for malicious activity across the network and digital assets (SonicWall, CrowdStrike) • Perform penetration testing using tools such as Metasploit, Nmap, Wireshark, Spiderfoot, and Maltego

    • IT Services and IT Consulting
    • 100 - 200 Employee
    • Desktop Support / Independent Contractor
      • Mar 2017 - Sep 2021

      • Major clients include: Citigroup, New York Public Radio • Testing new systems in order to ensure the new systems meet the requirement and proper functionality. • Assembled machines & hardware upgrades according to specifications using hand tools. • Mapping Network Drive and Printers • Providing Trade Floor & Morning Support • Providing white-glove support service in a professional manner for clients • Monitor and test fixes to ensure problems have been adequately resolved • Image, configure desktops and laptops using enterprise imaging solution • Providing cable management services including pre-cabling of furniture on installation • De-installation of all computer components/equipment including peripherals and cable strips out from desk • Reinstallation of equipment, network connections, testing, and script running • Pre-move audits and planning to ensure accurate inventory of equipment • Ecological disposal of waste and electrical and electronic equipment Show less

    • United States
    • Higher Education
    • 700 & Above Employee
    • PRISM Undergraduate Student Researcher
      • Jan 2020 - Jun 2021

      Understanding and Implementing security mechanism on application protocol for constrained devices such as CoAP Understanding and Implementing security mechanism on application protocol for constrained devices such as CoAP

  • Borough of Manhattan Community College (CLIP)
    • 163 West 125th Street, 6th floor, New York, NY 10007
    • LAB TECH (Internship)
      • Jan 2017 - Jun 2017

      • Network Setup by setting up access point and remote control • Setting up Task Scheduler and editing batch script • Network Setup by setting up access point and remote control • Setting up Task Scheduler and editing batch script

  • P1
    • Perak, Malaysia
    • Seasonal Promotion Associate
      • Jan 2015 - Jan 2016

      • Advertised and explained to customers all about the products. • Sale modem by signing contracts. • Advertised and explained to customers all about the products. • Sale modem by signing contracts.

Education

  • John Jay College (CUNY)
    Master of Science in Digital Forensics and Cybersecurity, 3.940
    2021 - 2022
  • John Jay College (CUNY)
    Advanced Certificate Post Baccalaureate, Applied Digital Forensic Science
    2021 - 2022
  • John Jay College (CUNY)
    Bachelor of Science - BS, Computer Science and Information Security
    2019 - 2020
  • John Jay College (CUNY)
    ISACA
    2020 -
  • Borough of Manhattan Community College
    Associate of Arts and Sciences - AAS, Computer Network Technology
    2017 - 2018
  • Borough of Manhattan Community College
    CompTIA A+ & CCNA (Cisco Certified Network Associate)
    2016 - 2016
  • RE2 International Computer School
    Level 4 - 7 & Microsoft Office Specialist (MOS)
    2012 - 2015
  • BERCHAM NATIONAL SECONDARY SCHOOL
    High School Diploma
    2010 - 2014

Community

You need to have a working account to view this content. Click here to join now