Personal Information
Organization / Workplace
West Java Province, Indonesia Indonesia
Occupation
Independent Security Researcher at Information Security Industry
Industry
Technology / Software / Internet
Website
digitoktavianto.web.id
About
IT security professional and system administrator with experiences in linux server, network security, Security Information and Event Management (SIEM), vulnerability assessment, penetration testing, intrusion analysis, incident response and incident handling, security hardening, PCI-DSS Compliance, and system administration.
Have a good experiences also on Managed Security Services (MSS) projects, Security Operation Center, operate and maintain SIEM tools (IBM Qradar, HP ArcSight, Alienvault, NetIQ Sentinel, Splunk, ELK Open Source Log Management), setup and configure IDS/IPS, Firewall, Antivirus, Operating Systems, and Applications.
Having basic knowledge in malware analysis and revers...
Tags
cyber security trend
threat intelligence
threat hunting
digital forensic
incident response
dfir
cyber security attack
information security
cyber security
cyber defense
blue team
mitre att&ck
honeypot
honeynet project
malware
malware analysis
idsecconf
idsecconf 2020
security operation center
stealing data
hackers steal data
data leak
data breach
forensic
forensic investigation
windows forensic
advance persisten threat
purple team
red teaming
red team
adversary simulation
adversary emulation
endpoint
edr
endpoint security
att&ck
information security awareness
it security career
career in information security
information security career
it security industry
it security attack
security trend
it security trend
virus
trojan
basic malware analysis
practical malware analysis
hackign
honeynet
training malware analysis
security
workshop malware analysis
ubuntu
website
linux
blog
wordpress
vulnerability assesment
penetration test
computer security
setup malware lab
analysis malware
lab malware
malware lab
configure malware lab
See more
Presentations
(13)Likes
(3)Three Lines of Defense (3LODs) for Startup
Adlina Hajidah Anwar
•
4 years ago
DEF CON 23 - NSM 101 for ICS
Chris Sistrunk
•
8 years ago
Oracle VM Benchmark
markgatkinson
•
15 years ago
Personal Information
Organization / Workplace
West Java Province, Indonesia Indonesia
Occupation
Independent Security Researcher at Information Security Industry
Industry
Technology / Software / Internet
Website
digitoktavianto.web.id
About
IT security professional and system administrator with experiences in linux server, network security, Security Information and Event Management (SIEM), vulnerability assessment, penetration testing, intrusion analysis, incident response and incident handling, security hardening, PCI-DSS Compliance, and system administration.
Have a good experiences also on Managed Security Services (MSS) projects, Security Operation Center, operate and maintain SIEM tools (IBM Qradar, HP ArcSight, Alienvault, NetIQ Sentinel, Splunk, ELK Open Source Log Management), setup and configure IDS/IPS, Firewall, Antivirus, Operating Systems, and Applications.
Having basic knowledge in malware analysis and revers...
Tags
cyber security trend
threat intelligence
threat hunting
digital forensic
incident response
dfir
cyber security attack
information security
cyber security
cyber defense
blue team
mitre att&ck
honeypot
honeynet project
malware
malware analysis
idsecconf
idsecconf 2020
security operation center
stealing data
hackers steal data
data leak
data breach
forensic
forensic investigation
windows forensic
advance persisten threat
purple team
red teaming
red team
adversary simulation
adversary emulation
endpoint
edr
endpoint security
att&ck
information security awareness
it security career
career in information security
information security career
it security industry
it security attack
security trend
it security trend
virus
trojan
basic malware analysis
practical malware analysis
hackign
honeynet
training malware analysis
security
workshop malware analysis
ubuntu
website
linux
blog
wordpress
vulnerability assesment
penetration test
computer security
setup malware lab
analysis malware
lab malware
malware lab
configure malware lab
See more