Modul 1-8 are inspired by Google. Please visit this link for further information. More are to come, stay tuned!
Please make sure you include the original MIT license.
I am Ketmanto Wangsa. I am an Application Support Engineer at a Sydney-based CX consultancy. I provide IT technical support (Azure, Intune, Exchange, Entra ID), database extraction (SQL), and cyber security support. During a remote internship at a leading US supplier, I had the opportunity to serve as both Technical Support and Team Leader of the Sourcing Team. In addition, I completed the IBM Engagement Specialist program to enhance my interpersonal skills. Furthermore, I completed nine cybersecurity virtual programs with ANZ, Datacom, Mastercard, AIG, Tata Consultancy, Telstra, and more.
Recently, I completed the Google IT Support and Cybersecurity Professional Certificate to pursue my passion for technology and Cybersecurity. The Google IT Support and Cybersecurity Professional Certificate have prepared me for industry-ready jobs. My ultimate goal is to become a Security Analyst. This role suits me because I have strong analytical abilities, persistence, eagerness to learn, a can-do attitude, problem-solving skills, and communication skills to address problems and emerging threats.
As of 2024, I am preparing to take the Linux Foundation Certified Associate (LFCA)
, CompTIA A+
, CompTIA Network+
and CompTIA Security+
certifications.
Please visit this link for further information.
Some of my documents are in PDF format to accommodate advanced formatting, include colorful presentations, and incorporate abundant screenshots for enhanced clarity and detail.
I have developed a cybersecurity portfolio showcasing various tasks and projects completed during my journey to earn the Google Cybersecurity Professional Certificate. This program has provided insights into:
- Programming for cybersecurity tasks
- Frameworks and controls that inform security operations
- SIEM tools for cybersecurity
- Detecting and responding to incidents using an intrusion detection system
- Performing packet capture and analysis
Additionally, it has paved the way for me to pursue one of the entry-level following roles:
- Cybersecurity Analyst
- Security Analyst
- SOC Analyst
- Information Security Analyst
- IT Security Analyst
- Cyber Defense Analyst
Projects | Skills/Knowledge Gained |
---|---|
1 - Conduct a security audit | INFOSEC , NIST Risk Management Framework , Security Audits , NIST Cybersecurity Framework , Incident Response Playbooks , CISSP , CIA triad |
2 - Network Security | TCP/IP model , Network Architecture , Network Communication , Security Hardening , Network Security , Cloud Networks |
3 - Linux & SQL | Command-line Interface , SQL , Linux , Bash |
4 - Assets, Threats, & Vulnerabilities | Authentication , Vulnerability assessment , Cryptography , Asset Classification , Threat Modelling Analysis |
5 - Detection & Response | Incident Lifecycle , Incident Journal |
6 - Tcpdump & Wireshark | Packet Analyzer |
7 - IDS & SIEM | Intrusion Detection System (IDS): Suricata , Security Information and Event Management (SIEM): Chronicle, Splunk |
8 - Automation with Python | Computer Programming , Python Programming , Coding , PEP 8 Style Guide |
Several tools that I used:
- Google Workspace (Drive, Docs, Sheets, Slides)
- Markdown Language
- Tcpdump
- Wireshark
- Linux OS
- SQL
- Chronicle
- Splunk
- Suricata
- Python
Please have a look on other standalone portfolio that I published:
- Python - Cybersecurity - Bruteforce Zipfile
- Python - Cybersecurity - Automation Case
- Python - Cybersecurity - Transaction Fraud
- Cybersecurity - Investigation & Risk Assessment Based on MITRE ATT&CK Framework and Open-Source Intelligence (OSINT)
and more....
Stay tuned for updates!
This portfolio will continuously grow as I complete more certificates and projects. I encourage you to visit again to see my progress and learn more about my skills and experience. Thank you for your time. For more information, please connect with me on Linkedin.