nicholas so
Security Engineer at Amway- Claim this Profile
Click to upgrade to our gold package
for the full feature experience.
Topline Score
Bio
Credentials
-
Ethical Hacking: System Hacking
LinkedInApr, 2022- Oct, 2024 -
Cybersecurity Awareness: Social Engineering
LinkedInFeb, 2022- Oct, 2024 -
Ethical Hacking: Evading IDS, Firewalls, and Honeypots
LinkedInFeb, 2022- Oct, 2024 -
Ethical Hacking: Penetration Testing
LinkedInFeb, 2022- Oct, 2024 -
Ethical Hacking: The Complete Malware Analysis Process
LinkedInFeb, 2022- Oct, 2024 -
Exam Tips: Certified Kubernetes Administrator (CKA)
LinkedInFeb, 2022- Oct, 2024 -
Operating System Forensics
LinkedInFeb, 2022- Oct, 2024 -
Programming Foundations: Web Security
LinkedInFeb, 2022- Oct, 2024 -
Risk Management for IT and Cybersecurity Managers
LinkedInFeb, 2022- Oct, 2024 -
Wireshark Essential Training
LinkedInFeb, 2022- Oct, 2024 -
Wireshark: Network Troubleshooting
LinkedInFeb, 2022- Oct, 2024 -
AWS Administration: Security Operations
LinkedInJan, 2022- Oct, 2024 -
Advanced Kali Linux
LinkedInJan, 2022- Oct, 2024 -
Artificial Intelligence for Cybersecurity
LinkedInJan, 2022- Oct, 2024 -
Cisco Certified CyberOps Associate (200-201) Cert Prep: 5 Security Policies and Procedures
LinkedInJan, 2022- Oct, 2024 -
CompTIA Security+ (SY0-601) Cert Prep: The Basics
LinkedInJan, 2022- Oct, 2024 -
Cybersecurity Foundations
LinkedInJan, 2022- Oct, 2024 -
Cybersecurity for IT Professionals
LinkedInJan, 2022- Oct, 2024 -
Cybersecurity with Cloud Computing
LinkedInJan, 2022- Oct, 2024 -
Ethical Hacking: Denial of Service
LinkedInJan, 2022- Oct, 2024 -
Ethical Hacking: Mobile Devices and Platforms
LinkedInJan, 2022- Oct, 2024 -
Ethical Hacking: SQL Injection
LinkedInJan, 2022- Oct, 2024 -
IT Security Foundations: Core Concepts
LinkedInJan, 2022- Oct, 2024 -
IT Security Foundations: Network Security
LinkedInJan, 2022- Oct, 2024 -
IT Security Foundations: Operating System Security
LinkedInJan, 2022- Oct, 2024 -
IT Security: Key Policies and Resources
LinkedInJan, 2022- Oct, 2024 -
Information Management: Document Security
LinkedInJan, 2022- Oct, 2024 -
Inside the Breach
LinkedInJan, 2022- Oct, 2024 -
Learning Computer Forensics
LinkedInJan, 2022- Oct, 2024 -
Learning Cyber Incident Response and Digital Forensics
LinkedInJan, 2022- Oct, 2024 -
Learning PC Maintenance and Performance
LinkedInJan, 2022- Oct, 2024 -
Learning SSL/TLS
LinkedInJan, 2022- Oct, 2024 -
Learning Security Frameworks
LinkedInJan, 2022- Oct, 2024 -
Learning Threat Modeling for Security Professionals
LinkedInJan, 2022- Oct, 2024 -
Learning Tor and the Dark Web
LinkedInJan, 2022- Oct, 2024 -
Learning Vulnerability Management
LinkedInJan, 2022- Oct, 2024 -
Protecting Your Network with Open Source Software
LinkedInJan, 2022- Oct, 2024 -
Securing Containers and Kubernetes Ecosystem
LinkedInJan, 2022- Oct, 2024 -
Security Testing Essential Training
LinkedInJan, 2022- Oct, 2024 -
Security Tips
LinkedInJan, 2022- Oct, 2024 -
Security Tips: Protecting Sensitive Information
LinkedInJan, 2022- Oct, 2024 -
The Cybersecurity Threat Landscape
LinkedInJan, 2022- Oct, 2024 -
Wireshark: Malware and Forensics
LinkedInJan, 2022- Oct, 2024 -
Humble Leadership: The Power of Relationships, Openness, and Trust (getAbstract Summary)
LinkedInNov, 2021- Oct, 2024 -
Excel Quick Tips
LinkedInOct, 2021- Oct, 2024
Experience
-
Amway
-
Türkiye
-
Consumer Services
-
500 - 600 Employee
-
Security Engineer
-
Sep 2022 - Present
- Support Identity solution- Okta, to configure SSO for application, to provide secure access for user. - Support Identity solution- RSA- prepare LDAP report for management level to review user access . - Cortex XDR- SOC support, fine tune policy, build guide, and product supprot. - Support Identity solution- Okta, to configure SSO for application, to provide secure access for user. - Support Identity solution- RSA- prepare LDAP report for management level to review user access . - Cortex XDR- SOC support, fine tune policy, build guide, and product supprot.
-
-
-
Averis
-
Malaysia
-
Outsourcing and Offshoring Consulting
-
500 - 600 Employee
-
Information Technology Security Analyst
-
Dec 2017 - Present
- To lead and perform investigation on security event of interest raise by Security Operation Center and ensure the security event ticketing is timely closure - Maintain and monitor Antivirus Management system to ensure it covers all devices within RGE environment and make sure detected viruses within the organization are clean from infection - Perform preliminary investigation on the root cause of virus infection and provide advise to stakeholders on how to remediate malware, ransomware and viruses. - To conduct Vulnerability scan to all devices within organization and provide advisory to remediate the vulnerability finding - Provide vulnerability assessment on all application and devices within the organization against security advisory published by vendors - To publish and inform all stakeholders on daily assessment security alerts. - To update and convert IT security processes into documentation to ensure the team is aware and adhere to it. - Upgrade all security product OS version, and perform monthly patch. - Regularly upgrade security product agent version. - Major upgrade for security product. - prepare compliance report for our client. Show less
-
-
Education
-
Open University Malaysia
Bachelor's degree, Computer Systems Networking and Telecommunications -
Tunku Abdul Rahman University College (TARC)
Diploma of marketing, Business