Hi I am
Cybersecurity
Analyst
Cybersecurity & Digital Forensics graduate with hands-on experience supporting IT operations, endpoint security, and incident escalation in a live operational environment. Trained in threat monitoring, vulnerability assessment, and incident response through academic projects and real-world support roles. Experienced in maintaining secure systems, documenting incidents, and supporting investigations through logging and access control mechanisms. Seeking to contribute to security monitoring, investigation support, and cyber defence operations in a professional security team.
About Me
I am a Cybersecurity & Digital Forensics graduate from Nanyang Polytechnic with hands-on experience in IT operations, endpoint management, and incident escalation. During my role as an IT Support & Operations Assistant, I supported over 100 users weekly in a live environment, managed endpoint deployments, and resolved access-related and system issues while adhering to operational and security procedures. Through both academic projects and operational support work, I developed a strong interest in threat monitoring, incident response, and the design of secure systems that prioritise accountability, auditability, and operational reliability. I am particularly motivated to work in environments where security monitoring, investigation support, and continuous improvement are essential to protecting systems and users.
Threat Monitoring & Incident Response
Endpoint & Network Security
Python
Azure MDM & System Administration
HTML/CSS
Core Skills
A summary of my core technical skills and capabilities developed through academic projects, IT operations work, and leadership experience in real-world environments.
Security Operations
Monitor and respond to security incidents using structured procedures.
IT Support & Operations
Support users and systems to ensure operational continuity.
Endpoint Management
Deploy and manage endpoints using standardized configurations.
Network & Access Control
Apply access control and monitoring practices in networked environments.
Task Automation
Automate routine IT tasks to improve efficiency and consistency.
System Administration
Maintain system reliability through preventive maintenance.
My Projects
Here are some of the projects I have worked on, showcasing my skills in cybersecurity, IT operations, and leadership. Each project highlights my involvement, work process, and the results achieved.
FortiFile — Secure Document Storage Platform
Problem / Scope
This team-based project addressed the need for a secure document storage platform that enforces controlled access to sensitive documents while maintaining traceability of user actions across different user roles. The objective was to design a system that supports accountability, security monitoring, and investigation readiness in a collaborative development environment.
My Role & Solution
As a member of the project team, I contributed to the development of the system by focusing on the security-related components. My responsibilities included supporting the implementation of authentication mechanisms, role-based access control (RBAC), and activity logging, working closely with other team members to ensure that the security features were aligned with the overall system design.
Work Process
Working collaboratively with the project team, I implemented session-based authentication to support secure user access across the platform. I assisted in enforcing role-based access control (RBAC) for multiple user roles, including standard users and administrators, to ensure that system functions were restricted based on assigned privileges.To support accountability and security monitoring, I developed audit logging mechanisms to capture login attempts and key user actions. I also collaborated with teammates on an administrative dashboard that allowed logs to be reviewed and exported for monitoring and post-incident analysis.
Outcome & Results
The completed team solution enabled controlled access to documents and full traceability of user activities across all user roles. Through the integration of RBAC and audit logging, the project demonstrated how access control and activity monitoring enhance accountability, support incident investigation, and reflect security practices commonly applied in real-world operational environments.
Digital Bookstore — User Account Management System
Problem / Scope
This team-based project required the development of a centralized user account management system to support secure authentication and clear role separation for multiple user types. The primary objective was to ensure that users and administrators could be authenticated reliably while maintaining appropriate separation of privileges within the system.
My Role & Solution
As part of the development team, I contributed to the implementation of the system’s core access management features. My responsibilities focused on supporting authentication mechanisms, role-based login functionality, and user profile management, working in coordination with other team members to align these features with the overall system design.
Work Process
Working collaboratively within the team, I developed login and profile management workflows that supported multiple user roles. I enforced access separation between standard users and administrators to ensure that system functions were restricted based on assigned privileges. I also structured backend logic using object-oriented programming principles to support maintainability, clarity, and secure access control.
Outcome & Results
The completed team solution enabled consistent and secure user management with clear separation of privileges across different user roles. By implementing role-based authentication and structured backend logic, the system reinforced secure access control while supporting a maintainable and scalable backend design.
Password Security & Authentication Risk Analysis
Problem / Scope
Weak password practices and poor authentication hygiene remain a common cause of security breaches. This personal cybersecurity study examined common password-related risks and evaluated how different authentication practices affect account security. The objective was to understand real-world authentication weaknesses and explore mitigation strategies through analysis and demonstration.
My Role & Solution
As an individual learner, I conducted an independent cybersecurity study focused on password security and authentication risks. As part of this study, I designed and built a small educational demo to visually demonstrate common authentication weaknesses and mitigation concepts, supporting my analysis and learning.
Work Process
I researched common authentication-related threats such as weak passwords, password reuse, brute-force attacks, and credential stuffing using publicly available cybersecurity guidelines. Based on this research, I analysed patterns that contribute to password compromise and compared different authentication approaches, including password-only authentication, password complexity enforcement, account lockout policies, and multi-factor authentication (MFA).To reinforce this analysis, I created a self-built demo application that illustrates password strength evaluation, common attack scenarios, and mitigation concepts in a controlled, educational context. The demo was used to visualise how authentication weaknesses can be exploited and how layered controls reduce risk.
Outcome & Results
This project strengthened my understanding of authentication-related risks and the importance of layered security controls. By combining analysis with a self-created demo, I developed a stronger security mindset when evaluating authentication systems and improved my ability to explain security concepts clearly, supporting readiness for entry-level cybersecurity and Cyber Analyst roles.
Japanese Exchange Programme 2025
Problem / Scope
The Chinese Cultural Group organised a cultural exchange programme with students from Haguro High School (Japan) to foster meaningful interaction and cross-cultural understanding. The programme required careful coordination of activities, logistics, and manpower to support a large group of visiting students within a limited time frame, while ensuring that activities were engaging, culturally relevant, and well-structured.
My Role & Solution
As Vice President of the Chinese Cultural Group and Overall in charge of the organising committee, I contributed to the planning and execution of the exchange programme. My responsibilities included co-drafting the event proposal, supporting programme planning, and assisting with on-site coordination in collaboration with other EXCO members and student helpers.
Work Process
Working together with the organising committee, I drafted the proposal outlining the programme aims, objectives, schedule, activities, manpower requirements, and logistics. I collaborated with other EXCO members to plan the programme flow, including cultural performances, ice-breaker games, and interactive activities such as calligraphy sessions and group games.During the event, I supported on-site operations by assisting with coordination between activity stations, performers, and helpers, and helped ensure that the programme followed the planned schedule while adapting to minor adjustments as needed.
Outcome & Results
The exchange programme was successfully conducted on 1 December 2025, involving 55 Japanese students and accompanying teachers, along with CCG members and student helpers. The event met its objectives of promoting cultural exchange and meaningful interaction, and provided participants with an engaging and positive experience through structured activities and collaborative teamwork.
Let's Connect
I am open to cybersecurity opportunities and professional discussions related to threat monitoring, incident response, and security operations. Feel free to reach out through the channels below.