
About Me
Junior Endpoint Security Engineer — currently onsite at BNI Pejompongan, Central Jakarta. I am a fresh graduate in Informatics from Telkom University (May 2025) with a strong focus on cybersecurity, networking, and modern security operations & solutions.
Previously at Virtus Technology Indonesia, I gained technical and presales exposure with leading solutions such as Palo Alto Networks, and developed familiarity with security platforms including CrowdStrike and Sophos — allowing me to understand their unique strengths, use cases, and differences in enterprise security environments.
I also completed an internship at Telkomsigma (Telkom Indonesia Group) as a Security Analyst in their SOC, where I worked hands-on with SIEM, IBM QRadar, Cybereason, Stellar, and other platforms for real-time monitoring, threat detection, and reporting for multinational clients.
My expertise spans endpoint security (EDR/XDR), network architecture, and security solutions. I have a strong understanding of routers, switches, network devices, OSI 7 Layers, NAT, LAN/WAN, VPN, SD-WAN, storage solutions (NAS, DAS), and various network topologies — ensuring a comprehensive understanding from design to defense.
Skills
- Threat Detection & Incident Response (SIEM Qradar, SOC Operations)
- EDR/XDR (Cortex XDR, CrowdStrike, Cybereason), DLP (Forcepoint), NAC Aruba
- Routing, Switching, OSI 7 Layers, Network Topologies & Devices
- Machine Learning, Deep Learning, Data Analysis & Visualization
- Teamwork, Communication, Time Management
- Football ⚽ & Running 🏃
Experiences
Junior Endpoint Security Engineer

PT. Logistik Teknologi Indonesia (Integra) by Lintas Group
📅 September 2025 - Present
- Manage Services for PT Bank Negara Indonesia (Persero), Tbk.
- Implemented and maintained endpoint security solutions (EDR, DLP, NAC such as Aruba ClearPass) across diverse platforms including Windows, macOS, and Linux servers to ensure compliance and protection.
- Performed endpoint and server hardening, applying security policies and best practices to strengthen system defenses against threats.
- Supported secure connectivity for employees and branch offices by managing network access control and site binding, ensuring endpoints comply with internal banking security standards.
- Conducted on-site troubleshooting and remediation for endpoint security issues, coordinating with business units to restore secure access and minimize downtime.
Technical Consultant

PT. Virtus Technology Indonesia by CTI Group
📅 June 2025 - August 2025
- Pre-sales Palo Alto Networks.
- etc.
Head of Research Group

Hardware and Embedded System Laboratory
📅 November 2023 - March 2025
- Collaborated with a team to create an IoT-based automatic watering device, which operates based on soil and air humidity levels.
- Gained hands-on experience with IoT modules such as Arduino, ESP32, various sensors, and other related technologies.
- Served as a 'mentor' for junior students, offering guidance and insights for innovation competitions and projects in hardware and embedded systems.
Security Operation Center Intern

PT. Sigma Cipta Caraka (Telkomsigma) by Telkom Indonesia
📅 June 2024 - September 2024
- Monitored network traffic for multiple multinational companies, managing cybersecurity for over 6 companies to spot unusual activity or threats.
- Detected network anomalies and potential attacks, creating clear incident reports and sharing them with clients to keep them informed.
- Utilized cybersecurity tools such as SIEM, Cybereason, Group-IB Threat Hunting Framework (THF), Qradar, and Stellar to enhance monitoring, threat detection, and incident response processes.
- Built attack flow diagrams to show where attacks started, how they moved, and what they targeted, giving clients a better understanding of security risks.
- Worked closely with the team to monitor and report together, also taking on Level 1 (L1) analyst tasks and covering shift work when extra support was needed.
Machine Learning Cohort

Bangkit Academy led by Google, Tokopedia, Gojek, & Traveloka
📅 February 2024 - June 2024
- Engaged in weekly consultations and completed various learning modules including Growth Mindset, Time and Energy Management, Critical Thinking, Project Management, and Professional Branding.
- Learned foundational and advanced machine learning concepts through hands-on modules such as Collecting Data with Python, Deep Dive into Data Analysis, Machine Learning Fundamentals, Unsupervised Learning, and Advanced Deep Learning with TensorFlow.
- Gained experience in deploying machine learning models through real-world application sessions like TensorFlow Deployment with TF.js, TF Lite, and TF Serving.
- Developed and led AI model development for Sereluna, a mobile application designed for mental health detection. Utilizing natural language processing (NLP), the model analyzes user diary entries and generates output labels to identify potential mental health conditions, overseeing model design and integration to ensure optimal performance in the app.
Practicum Assistant of Data Structure

Informatics Laboratory Telkom University
📅 September 2023 - January 2024
- Planned, organized, and facilitated teaching sessions focusing on data structure concepts to enhance understanding and engagement among students.
- Taught key data structures including single linked lists, double linked lists, multiple linked lists, trees, and graphs.
- Assisted in managing a practicum course for 80-90 students, ensuring effective communication and support for each student's learning experience.
Study Group

Forensic And Security Laboratory
📅 March 2023 - December 2023
- Engaged in discussions on forensic and security principles.
- Gained foundational skills in Linux (Ubuntu), network security, and web hacking techniques
- Actively participated in Capture the Flag (CTF) challenges, enhancing problem-solving skills and applying knowledge in practical cybersecurity scenarios.
Student Internship

Advanced Software Engineering Laboratory
📅 June 2023 - July 2023
- Analyzed and documented business processes to support software development planning.
- Identified suitable software development models aligned with user requirements.
- Authored comprehensive documentation detailing business processes from initial stages through to software development initiation.
My Projects
Certifications

Endpoint Security
- Explain how types of data can present unique challenges, with examples.
- Document and recommend threat mitigation measures for common and emerging network threats that are relevant to a given organization.
- Configure a simulated network according to organizational requirements.
- Analyze malware files that have been extracted from packet captures.
- Evaluate endpoint security.

Ethical Hacker
- Explain the importance of methodological ethical hacking and penetration testing.
- Create penetration testing preliminary documents.
- Perform information gathering and vulnerability scanning activities.
- Explain how social engineering attacks succeed.
- Explain how to exploit wired and wireless network vulnerabilities.
- Explain how to exploit application-based vulnerabilities.
- Explain how to exploit cloud, mobile, and lot security vulnerabilities.
- Explain how to perform post-exploitation activities.
- Create a penetration testing report.
- Classify pentesting tools by use case.

Cyber Threat Management
- Explain why organizations must conform with specific compliance frameworks according to institutional context.
- Evaluate network and systems vulnerability.
- Given an organizational context, create a vulnerability assessment plan by identifying and describing relevant threats.
- Explain how IT systems vulnerability is assessed.
- Select security controls based on organizational relevance and create a risk management plan.
- Explain how organizations recover from cybersecurity exploits.
- Given organizational contexts, recommend disaster recovery and incident response activities.
- Explain how forensic investigations of internal and external security incidents are performed.

Network Support and Security
- Demonstrate effective troubleshooting methodologies and help desk best practices.
- Explain common threats, vulnerabilities, and attacks on end points.
- Configure secure user access on a network.
Contact Me






