Seeking a 6-month internship in Security Operations Center (SOC) or related roles in networking or cybersecurity, from 3 March to 3 September 2026.
Strong foundation in ethical hacking concepts and attacker
methodologies, including malware, social engineering, and common web
vulnerabilities.
Focused on understanding threat behavior to strengthen security
posture, improve risk awareness, and support effective prevention
strategies.
Solid knowledge of enterprise networking concepts including routing,
switching, OSPF, ACLs, NAT, and IP addressing.
Experienced in configuring and troubleshooting networks with
performance and security considerations in mind.
Skilled in OSINT techniques to analyze locations, digital footprints, and contextual indicators to understand environments, identify patterns, and anticipate potential risks or activities for incident analysis, background checks, and security assessments.
Developing user-friendly, functional, and secure web applications aligned with client requirements, with emphasis on proper access control, secure data handling, and core web security principles. Able to bridge development and security to minimize common application risks.
June 2023 – April 2025
Role: Cybersecurity Trainer cum Program Manager
Description:
Delivered engaging cybersecurity training and awareness programs for
government agencies and private organizations. Conducted live
ethical hacking demonstrations covering phishing, malware, mobile
hacking, and social engineering. Led a small team to plan and
execute sessions, develop content, and manage technical logistics.
Clients:
Trained multiple Malaysian government agencies and
government-linked companies, including the Ministry of Defense
(MINDEF), Social Security Organisation (SOCSO), EDOTCO (subsidiary
of Axiata) and institutions such as Universiti Tun Hussein Onn
Malaysia (UTHM), Universiti Malaysia Perlis (UNIMAP), Politeknik
Merlimau and Management Science University (MSU).
Problem:
Methodology:
The system was developed using the Secure Software Development Life Cycle (SSDLC) combined with an Agile methodology. Security considerations was embedded at every phase of development, including requirement analysis, design, implementation, testing, and deployment. Agile practices was applied to enable iterative development, continuous feedback, and regular security assessments to ensure the platform remains secure, scalable, and aligned with user requirements.
Solution: