PHAM THI KIM LIÊN

Product Specialist at E.L Erman Cosmetic Manufacturing Ltd
  • Claim this Profile
Contact Information
us****@****om
(386) 825-5501

Topline Score

Topline score feature will be out soon.

Bio

Generated by
Topline AI

You need to have a working account to view this content.
You need to have a working account to view this content.

Experience

    • Israel
    • Personal Care Product Manufacturing
    • 1 - 100 Employee
    • Product Specialist
      • Feb 2016 - Present

      =Conducting thorough market research, which may include taking surveys, doing desktop research, sending emails and making calls, and even attending product launches of rival companies.=Answering all product-related questions in a polite manner and addressing queries promptly.=Collaborating and strategizing with the business and engineering teams.=Attending workshops and refresher courses in sales and marketing.=Planning and assisting with new product releases and events.=Performing product demonstrations for customers, staff, and other stakeholders.=Assisting with the development of business plans.=Scheduling training sessions and attending meetings as required.=Identifying new market opportunities and relaying this information to the Manager and other relevant stakeholders.=Making helpful product recommendations and suggestions to increase revenue.

    • Vietnam
    • IT Services and IT Consulting
    • 700 & Above Employee
    • forensic computer analyst
      • Nov 2004 - Nov 2015

      As a forensic computer analyst, you'll use a range of specialized software and other techniques to secure, retrieve and analyze data linked to a range of criminal activities.As a forensic computer analyst, you'll need to:=Secure a system or device so it can't be tampered with=Use a range of forensic tools and software to extract and analyze data=Deal with highly sensitive or confidential data or images, depending on the type of case you’re investigating=Recover damaged, deleted or access hidden, protected or encrypted files=Unlock digital images that are locked to hide the identity of a place or person=Examine data from mobile phones and satellite navigation systems to trace people or places=Follow electronic data trails to reveal links or communication between individual or groups=Collect information and evidence in a legally admissible way=Write technical reports based on your findings and, if required, give evidence in court as an expert witness=Present findings of on-going incidents to other members in the investigation team, law enforcement agencies and clients=Keep up to date with evolving cybercrime methods and developments within the digital forensics field=Undergo security checks and vetting procedures=Work to relevant ISO accreditations.

    • Vietnam
    • Information Technology & Services
    • 1 - 100 Employee
    • Cyber Security Analyst
      • Apr 1996 - Sep 2004

      As a cyber security analyst, you'll need to:=Keep up to date with the latest security and technology developments=Research/evaluate emerging cyber security threats and ways to manage them=Plan for disaster recovery and create contingency plans in the event of any security breaches=Monitor for attacks, intrusions and unusual, unauthorized or illegal activity=Test and evaluate security products=Design new security systems or upgrade existing ones=Use advanced analytic tools to determine emerging threat patterns and vulnerabilities=Engage in 'ethical hacking', for example, simulating security breaches=Identify potential weaknesses and implement measures, such as firewalls and encryption=Investigate security alerts and provide incident response=Monitor identity and access management, including monitoring for abuse of permissions by authorized system users=Liaise with stakeholders in relation to cyber security issues and provide future recommendations=Generate reports for both technical and non-technical staff and stakeholdersMaintain an information security risk register and assist with internal and external audits relating to information security=Monitor and respond to 'phishing' emails and 'pharming' activity=Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues=Give advice and guidance to staff on issues such as spam and unwanted or malicious emails.

Education

  • Hanoi University of Science and Technology
    Master's degree, Computer Science
    1992 - 1994
  • Hanoi University of Science and Technology
    Bachelor's degree, Computer Science
    1989 - 1992

Community

You need to have a working account to view this content. Click here to join now