Highly accomplished ICT Solution Architect and Presales Specialist with 5 years in ICT and 17 years of multidisciplinary experience in Civil, Mechanical, and Electrical (CME) engineering. Skilled in delivering innovative, tailored solutions across diverse industries, leveraging a unique blend of technical expertise and commercial insight. Proficient in presales and business development, with a proven ability to bridge gaps between sales and technical teams, ensuring seamless collaboration and execution. Adept at crafting high-level presentations for Chief Executives, Boards of Directors, and senior engineers, effectively articulating complex technical concepts with strategic clarity. Renowned for designing ICT solutions that seamlessly integrate with intricate infrastructure, driving business growth, client satisfaction, and long-term relationships. A results-oriented professional with exceptional problem-solving skills and strategic thinking.
Cybersecurity Architecture Consultant
Architecture Consultant specializing in cybersecurity solutions. Responsible for designing end-to-end architectures that align security capabilities with business objectives. Act as a bridge between business stakeholders and technical teams, translating complex cybersecurity concepts into clear, accessible language to ensure alignment across all levels of the organization. Actively involved in the presales cycle, including customer engagements, technical workshops, and solution presentations to senior technical audiences and C-level executives. Provide presales technical support for proof-of-value (PoV) and proof-of-concept (PoC) activities to validate solution effectiveness and drive adoption.
External Attack Surface Management (EASM)
Internal Attack Surface Management (IASM)
Endpoint Detection and Response (EDR)
Network Gateway Security
E187 Semiconductor Compliance Assessment
Cyber Threat Intelligence
Cybersecurity Presales Specialist
Consults on and delivers tailored cybersecurity solutions for corporate and government clients, aligning technical architectures with business objectives and risk posture. Experienced in the full presales cycle—developing BoMs, managing tenders, qualifying leads, and engaging vendors to ensure solution fit. Acts as a key liaison between business and technical stakeholders, simplifying complex cybersecurity concepts for clear understanding. Provides strategic presentations to senior technical and C-level audiences, and supports PoV/PoC activities to validate solution value and drive adoption.
Security Operations Center (SOC)
Vulnerability Assessment & Penetration Testing (VAPT)
Governance, Risk, Compliance Consulting (GRC)
Cybersecurity System Integration (CSI)
Diploma in Information and Communication Technologies (ICT) with Specialization in Software Engineering
Major: Software Engineering
Minor: Network Engineering & System Administration
Malaysia Board of Technology (MBOT)
Construction Industry Development Body (CIDB)
SD-WAN
WLAN | Routing & Switching
A2Z - Physical Breach
HACKED - Are You Safe?
"Embark on an enlightening journey at Asia Pacific University, Malaysia, where a group of 10 dedicated students is hosting a fundraising event for a local charity. Join over 300 attendees, including professionals, academicians, and students, for a captivating live hacking demo that unveils the realities of cybersecurity threats.
Delve into the world of real-world hacking, from WiFi breaches and malware attacks to sophisticated techniques like RATs, backdoors, and DDOS assaults. Explore the chilling possibilities of physical breaches, data theft, identity spoofing, and reverse engineering. This event promises to not only raise crucial funds for charity but also foster cybersecurity awareness, equipping attendees with the knowledge to navigate the digital landscape safely."
As the lead organizer of this charity-fundraising event, I orchestrated a successful and impactful initiative, rallying support and resources to make a meaningful difference in our community. Additionally, I showcased my expertise as one of three hackers chosen to demonstrate real-world cyber threats, concurrently disseminating crucial cybersecurity information and raising awareness among participants. Leveraging my advanced skills, I executed live demonstrations by penetrating three different operating systems—MacOS, Linux, and Windows—in under 30 minutes, underscoring the importance of robust cybersecurity measures in today's digital landscape.