PHAM THI KIM LIÊN
Product Specialist at E.L Erman Cosmetic Manufacturing Ltd- Claim this Profile
Click to upgrade to our gold package
for the full feature experience.
Topline Score
Bio
Experience
-
E.L Erman Cosmetic Manufacturing Ltd
-
Israel
-
Personal Care Product Manufacturing
-
1 - 100 Employee
-
Product Specialist
-
Feb 2016 - Present
=Conducting thorough market research, which may include taking surveys, doing desktop research, sending emails and making calls, and even attending product launches of rival companies.=Answering all product-related questions in a polite manner and addressing queries promptly.=Collaborating and strategizing with the business and engineering teams.=Attending workshops and refresher courses in sales and marketing.=Planning and assisting with new product releases and events.=Performing product demonstrations for customers, staff, and other stakeholders.=Assisting with the development of business plans.=Scheduling training sessions and attending meetings as required.=Identifying new market opportunities and relaying this information to the Manager and other relevant stakeholders.=Making helpful product recommendations and suggestions to increase revenue.
-
-
-
CMC Global Company Limited.
-
Vietnam
-
IT Services and IT Consulting
-
700 & Above Employee
-
forensic computer analyst
-
Nov 2004 - Nov 2015
As a forensic computer analyst, you'll use a range of specialized software and other techniques to secure, retrieve and analyze data linked to a range of criminal activities.As a forensic computer analyst, you'll need to:=Secure a system or device so it can't be tampered with=Use a range of forensic tools and software to extract and analyze data=Deal with highly sensitive or confidential data or images, depending on the type of case you’re investigating=Recover damaged, deleted or access hidden, protected or encrypted files=Unlock digital images that are locked to hide the identity of a place or person=Examine data from mobile phones and satellite navigation systems to trace people or places=Follow electronic data trails to reveal links or communication between individual or groups=Collect information and evidence in a legally admissible way=Write technical reports based on your findings and, if required, give evidence in court as an expert witness=Present findings of on-going incidents to other members in the investigation team, law enforcement agencies and clients=Keep up to date with evolving cybercrime methods and developments within the digital forensics field=Undergo security checks and vetting procedures=Work to relevant ISO accreditations.
-
-
-
CyStack
-
Vietnam
-
Information Technology & Services
-
1 - 100 Employee
-
Cyber Security Analyst
-
Apr 1996 - Sep 2004
As a cyber security analyst, you'll need to:=Keep up to date with the latest security and technology developments=Research/evaluate emerging cyber security threats and ways to manage them=Plan for disaster recovery and create contingency plans in the event of any security breaches=Monitor for attacks, intrusions and unusual, unauthorized or illegal activity=Test and evaluate security products=Design new security systems or upgrade existing ones=Use advanced analytic tools to determine emerging threat patterns and vulnerabilities=Engage in 'ethical hacking', for example, simulating security breaches=Identify potential weaknesses and implement measures, such as firewalls and encryption=Investigate security alerts and provide incident response=Monitor identity and access management, including monitoring for abuse of permissions by authorized system users=Liaise with stakeholders in relation to cyber security issues and provide future recommendations=Generate reports for both technical and non-technical staff and stakeholdersMaintain an information security risk register and assist with internal and external audits relating to information security=Monitor and respond to 'phishing' emails and 'pharming' activity=Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues=Give advice and guidance to staff on issues such as spam and unwanted or malicious emails.
-
-
Education
-
Hanoi University of Science and Technology
Master's degree, Computer Science -
Hanoi University of Science and Technology
Bachelor's degree, Computer Science