N. Jacob

Senior Penetration Tester at Multisys Technologies Corporation
  • Claim this Profile
Contact Information
Location
Metro Manila, National Capital Region, Philippines, PH

Topline Score

Topline score feature will be out soon.

Bio

Generated by
Topline AI

5.0

/5.0
/ Based on 2 ratings
  • (2)
  • (0)
  • (0)
  • (0)
  • (0)

Filter reviews by:

Janice Arino

Jacob has a work in detail attitude. Can accomplish report on the specific given schedule. He’s focused and strict to his tasks to accomplish in accordance to its timeline. Has a good manner in working with his collegues and in upper management. He truly deserves to be on top someday to recognize as one of the Senior Infomation and Security Engineer. Goal for the best! 💯

John Patrick Lita

Jacob is a great team player, his fast learner and able to execute the job perfectly. He's not afraid to fail and learn from it. very technical guy in terms of vulenrability assessment, good listener. keep it up jacob!

You need to have a working account to view this content.
You need to have a working account to view this content.

Credentials

  • Cyber Security Foundation Professional Certificate - CSFPC™
    CertiProf
    Apr, 2021
    - Sep, 2024
  • ISO/IEC 27001 INFORMATION SECURITY ASSOCIATE™
    SkillFront
    Apr, 2021
    - Sep, 2024
  • Lifelong Learning
    CertiProf
    Apr, 2021
    - Sep, 2024
  • Payment Card Industry Data Security Standard
    QRC Assurance And Solutions Pvt Ltd
    Apr, 2021
    - Sep, 2024
  • API Product Manager
    API Academy
    Feb, 2021
    - Sep, 2024
  • Certified API Designer
    API Academy
    Dec, 2020
    - Sep, 2024
  • Certified Engineer - Multi Cloud Network Associate
    Aviatrix
    Nov, 2020
    - Sep, 2024
  • Ethical Hacking: VAPT
    GuideM
    Oct, 2020
    - Sep, 2024
  • Information Security Management ISO/IEC 27001
    AIEN Management Consulting
    Sep, 2020
    - Sep, 2024
  • RED Team: Vulnerability Assessment and Penetration Testing
    CSP Cert PH
    Jun, 2018
    - Sep, 2024
  • CCNA 1 - Fundamentals of Network Topologies
    Asian Institute of Computer Studies University
    Aug, 2014
    - Sep, 2024
  • CCNA 2 - Routing Protocols
    Asian Institute of Computer Studies University
    Aug, 2014
    - Sep, 2024
  • CCNA 3 - Lan Switching Theory
    Asian Institute of Computer Studies University
    Aug, 2014
    - Sep, 2024
  • CCNA 4 - Advanced Networking
    Asian Institute of Computer Studies University
    Aug, 2014
    - Sep, 2024
  • Unix Essentials Featuring Solaris 10 Operating System
    -

Experience

    • Philippines
    • Information Technology & Services
    • 100 - 200 Employee
    • Senior Penetration Tester
      • Nov 2021 - Present

      Searching for new security bugs and hacking techniques.1. Obtain and digest threat intelligence (TI) from a variety of sources2. Apply frameworks3. Analyze data and look for trends and patterns4. Identify tactics, techniques & procedures (TTPs)5. Extract indicators and knowledge to enrich threat intel platforms6. Create countermeasures7. Report findings Searching for new security bugs and hacking techniques.1. Obtain and digest threat intelligence (TI) from a variety of sources2. Apply frameworks3. Analyze data and look for trends and patterns4. Identify tactics, techniques & procedures (TTPs)5. Extract indicators and knowledge to enrich threat intel platforms6. Create countermeasures7. Report findings

    • Education Administration Programs
    • 400 - 500 Employee
    • Resource Speaker: Cybersecurity Introduction and Awareness
      • Feb 2022 - Feb 2022

      Resource Speaker: "Sugod" The Realities of Cybersecurity Resource Speaker: "Sugod" The Realities of Cybersecurity

    • Resource Speaker: Mechatronics and Robotics Society of the Philippines - NCR Chapter
      • Nov 2021 - Nov 2021

      Unmasking: What you need to know about Blockchain Technology Webinar Series 6 with the theme "Breakthrough innovation, Creativity, and Resilience by Embracing Change & Transformation through Research" Unmasking: What you need to know about Blockchain Technology Webinar Series 6 with the theme "Breakthrough innovation, Creativity, and Resilience by Embracing Change & Transformation through Research"

    • Philippines
    • IT Services and IT Consulting
    • 1 - 100 Employee
    • Head Of Information Technology
      • Jul 2021 - Nov 2021

      Help to safeguard organization’s computer networks and systems. Planning and carry out security measures to monitor and protect sensitive data and systems from infiltration and cyber-attacks. Work as part of a larger IT team and report directly to management committee. Helping plan and carry out an organization’s in development, information security strategy, develop a set of security standards and best practices for the organization, recommend security enhancements to management as needed and lead the operations in all scope of IT operations. Develop strategies to respond to and recover from a security breach. Responsible for educating the workforce on information security through training and building awareness. Conducts periodic scans of networks to find any vulnerability and also conduct penetration testing, in which they simulate an attack on the system to highlight or find any weaknesses that might be exploited by a malicious party.* Red Team Operations Lead* Team Lead Software and Application Testing* System Administration* IT Ops

    • IT Operations Lead
      • Jan 2021 - Jul 2021

    • Philippines
    • Blockchain Services
    • Information Security Engineer
      • Jan 2021 - Nov 2021

      > Maintain and optimize local company networks and servers> Be responsible for device and password management> Oversee data backup and system security operations (e.g. user authorization, firewalls)> Manage installations, upgrades and configurations of hardware and software> Assess system performance and recommend improvements> Resolve issues escalated by technicians and engineers> Ensure data is handled, transferred or processed according to legal and company guidelines> Provide support and guidance to stakeholders via help desk> Control costs and budgets regarding IT systems> Manage contracts with vendors (e.g. development platforms, telecommunication companies, password managers) and software licensesRed Team Operations Lead> Perform network penetration, web and mobile application testing, source code reviews, threat analysis, wireless network assessments, and social-engineering assessments> Develop comprehensive and accurate reports and presentations for both technical and executive audiences> Effectively communicate findings and strategy to client stakeholders including technical staff, executive leadership, and legal counsel> Recognize and safely utilize attacker tools, tactics, and procedures> Develop scripts, tools, or methodologies to enhance red teaming processes> Assist with scoping prospective engagements, leading engagements from kickoff through remediation, and mentoring less experienced staff

    • Philippines
    • Higher Education
    • 700 & Above Employee
    • Resource Speaker: Introduction in Cryptocurrency and Blockchain
      • Jul 2021 - Jul 2021

      Resource Speaker imparting unparalleled knowledge and expertise on Cryptocurrency 101 and Blockchain Technology during the webinar with the theme "Facing Forward: Shaping our future Innovations". Resource Speaker imparting unparalleled knowledge and expertise on Cryptocurrency 101 and Blockchain Technology during the webinar with the theme "Facing Forward: Shaping our future Innovations".

    • Philippines
    • Outsourcing and Offshoring Consulting
    • 200 - 300 Employee
    • Supervisor - Information Security Officer
      • Jan 2019 - Jan 2021

      Support manager to provide safekeeping and company’s information asset integrity and maintain systems plus controls to protect unauthorized access, disclosure, modification and deletion of information through resources and computer networks. Recommend changes in legal, technical and regulatory areas to manager affecting IT and computer offense and perform as security technical advisor or analyst for company initiatives to analyze new technologies for program conformance.Test solutions effectively utilizing industry standard analysis criteria involving delivery of technical reports and formal papers on test findings. And System Administration Engineer Lead for deploying server for InfoSec and Cybersecurity capability.

    • Egypt
    • IT Services and IT Consulting
    • 1 - 100 Employee
    • Resource Speaker: QE is the new QA [Web Security]
      • Jan 2020 - Jan 2020

      Speak about all possible scenario that can be happen inside and outside of Web Security Testing, OWASP TOP 10 and how it apply in new era of Quality Assurance Speak about all possible scenario that can be happen inside and outside of Web Security Testing, OWASP TOP 10 and how it apply in new era of Quality Assurance

    • Defense and Space Manufacturing
    • 1 - 100 Employee
    • Resource Speaker: AFP Cyber Symposium Philippines
      • Dec 2019 - Dec 2019

      Speaker on how ransomware as a service works and how to avoid, prevent this type of attacks. Speaker on how ransomware as a service works and how to avoid, prevent this type of attacks.

    • Philippines
    • Software Development
    • 1 - 100 Employee
    • Senior System Administrator/Penetration Tester
      • Oct 2014 - Nov 2018

      Securing all database and conducting bash shell in all system security and development. Utilize and configuration in docker images using PostgreSQL database. Checking all security measures using Ethical Hacking VAPT task in all system we handle and validate each vulnerabilities found. Build a multiple server using Linux Operating System that supporting in our project management.Monitor all data, network and system logs within the management and server area. Stabilizing a Active directory and monitor each user for better security. Track all logs inside GPS System Server that will directly report to management and giving a more solutions in every error that encountered. Configuring a network firewall using Fortinet, Pfsense, Palo alto, and Sophos in management solutions, handling EDR reporting and simulation of report for investigation in company rules and policy.

    • Philippines
    • Entertainment Providers
    • 1 - 100 Employee
    • Unix System Administrator
      • Oct 2013 - Sep 2014

      Installing and upgrading UNIX system software on company servers and computers and creating UNIX file systems that will support to all projects. Setting up and maintaining UNIX user accounts and access management systems and Implementing network and computer system policies, detecting and troubleshooting software and hardware issues, responding to user requests and software errors and monitoring the performance of the system and server as well. Creating backup and recovery policies, setting up and monitoring security policies and applying patches and upgrades when necessary. And monitor and handling payroll system server that will support the needs of payroll department. Giving full support in all users employee technology, and securing each computer and other devices in security issue. Develop a server for FTP, Active Directory and NAS Server using Linux Operating system such as Ubuntu and Centos server. Directly reporting to CEO and VP of company with a analytics and requirements needed in particular project.

Education

  • Asian Institute of Computer Studies
    2009 - 2013

Community

You need to have a working account to view this content. Click here to join now