Rudy Anggam P

Rudy Anggam P

Pentester | Red Team | Security Operation Center | Business Continuity Management | IT Service Management | IT Strategic Planning | IT Audit | IT Governance

Indonesia
2K followers 500+ connections

About

I'm interested in IT Security, IT service management, disaster recovery and business continuity planning.

In area IT security i have experience about :
- Penetration Testing & Vulnerability assessment,
- Manage and implement Data Loss Prevention
- Diagnose the occurrence of incident / attacks and rectify the related problem
- Perform gab assessment, Create policy and procedure based on IS0 27001
- Ensure that the IT System are compliant with applicable regulations, group policies,
codes and industry guidance
- Review security event log data and investigate anomalies (SIEM)
- Perform monitoring activities (IPS) and risk assessment
- Respond to, and where appropriate, resolve or escalate reported security incidents
- Perform hardening process
- Work with relevant internal IT application, infrastructure, network teams to ensure that
security controls are implemented at all significant and relevant phases of all IT processes
- Perform Patch Management
- Manage Antivirus
- Manage Access Management
- I have a good knowledge of IT security concept and security tools for network reconnaissance, vulnerability scanning, exploitation framework and incident handling

In area BCP/DRP i have experience about :
- Business Continuity and Disaster Recovery Planning
- Policy and framework development
- Business Impact analysis and Risk assessment
- Business recovery startegy and plan development
- Training and scenario Exercising

In area Programming i have experience about :
- Web Programming,
- Visual Basic 6,
- Database Ms.SQL Server,
- Crystal Reports.
- Relational Database Management System (RDBMS).

In area ITSM i have experience about :
- Incident management process
- Problem management process
- Request Fulfilment Process
- IT Service Catalog
- Service Level Management

Activity

Join now to see all activity

Experience

  • Confidential

    Confidential

    3 years 4 months

    • Confidential Graphic

      Senior Manager Cyber Security

      Confidential

      - Present 1 year 11 months

      Indonesia

    • Confidential Graphic

      Cyber Security Manager

      Confidential

      - 1 year 6 months

      Indonesia

  • Meratus Group Graphic

    Cyber Security Manager

    Meratus Group

    - 1 year 3 months

    Indonesia

  • KPMG Indonesia Graphic

    Cyber Security Manager

    KPMG Indonesia

    - 1 year 9 months

    Greater Jakarta Area, Indonesia

  • PT AIA FINANCIAL (American International Assurance). Graphic

    IT Security - Assistant Manager

    PT AIA FINANCIAL (American International Assurance).

    - 11 months

    Greater Jakarta Area, Indonesia

    IT Governance & Business Continuity Management

  • IT Security Analyst - Assistant Manager

    Allianz Utama Indonesia

    - 2 years

    IT Governance and Compliance

  • Technical Consultant -IT Security

    PT Mitra Integrasi Informatika (Metrodata group)

    - 3 years 2 months

  • Security Analyst

    PT Cybertech Solusindo

    - 6 months

  • Consultant SIPKD (Sistem Informasi Pengelolaan Keuangan Daerah)

    PT Usadi Sistemindo Informatika

    - 8 months

Education

  • BINUS University Graphic

    BINUS University

    Bachelor's degree Information system 3.76

  • Telkom Polytechnic

    Computer Engineering

    -

  • Telkom Institute of Technology

    Industrial Automation

    -

  • Jumantono 1 Senior High School

    IPA

    -

Licenses & Certifications

Projects

  • IT Audit & Security at Pertamina Hulu Energy WMO

    - Present

    IT Security
    โ€ข Evaluate, design, install and ongoing support for the following technologies: Security Information and Event Management (SIEM), Firewalls, Intrusion Prevention, Content Filtering, Remote Access (SSL/Direct Access), Endpoint Protection for desktop and server, and more
    โ€ข Write and design meaningful security policies and to document adequate security controls
    โ€ข Develop strategy and roadmap for ongoing controls and risk programs
    โ€ข Deliver risk management, metrics andโ€ฆ

    IT Security
    โ€ข Evaluate, design, install and ongoing support for the following technologies: Security Information and Event Management (SIEM), Firewalls, Intrusion Prevention, Content Filtering, Remote Access (SSL/Direct Access), Endpoint Protection for desktop and server, and more
    โ€ข Write and design meaningful security policies and to document adequate security controls
    โ€ข Develop strategy and roadmap for ongoing controls and risk programs
    โ€ข Deliver risk management, metrics and reporting
    โ€ข Assist in review of security controls
    โ€ข Review and provide best practices for internal and vendor improvements to network security hardware and software
    โ€ข Troubleshooting, Documentation and Reporting IT Security Issue.

    IT Audit
    โ€ข Planning and completing the full audit cycle for Information Technology functions, including but not limited to network penetration testing, application development
    โ€ข Determining audit scope and direction
    โ€ข Evaluating business systems effectiveness
    โ€ข Performing test procedures
    โ€ข Developing audit programs and budget estimates

    Other creators
  • Disaster Recovery Plan Project (DRP Project) at RAMBA ENERGY

    - Present

    - Conduct Risk Assessment
    - Conduct Business Impact Analyst
    - Provide Reference of Strategy from Gap Analyst
    - Create Scenario Table on Top Simulation

    Other creators
  • FIF Group - IT Service Catalogue

    - Present

    - Create Business Service Catalogue,
    - Create Technical Service Catalogue
    - Create Service Level Management (SLA OLA, UC)

    Other creators
  • IT Blueprint

    - Present

    IT Blueprint;
    - Enterprise Architecture
    - IT Architecture
    - IT Infrastructure Blueprint
    - IT Application Blueprint
    - IT Governance

    Other creators
  • Business Continuity Plan (BCP)

    - Present

    - As Lead Consultant
    - Conduct Business Risk and IT Risk
    - As Technology Consultant

    Other creators
  • ITSM Services Catalog at Bank Mandiri

    1. Analysis & Assessment
    - Transfer Knowledge
    - Assessment and Analysis Report
    - Strategy and Identification Services for Implementation

    2. Development
    - IT Service Catalog Document
    - Service Level Agreement Document
    - Operational Level Agreement Document

    3. Implementation
    - Recommendation and Reporting
    - Socialization

    Other creators
  • [Bank Mandiri] - ITSM Service Catalogue

    1. Analysis & Assessment
    - Transfer Knowledge
    - Assessment and Analysis Report
    - Strategy and Identification Services for Implementation

    2. Development
    - IT Service Catalog Document
    - Service Level Agreement Document
    - Operational Level Agreement Document

    3. Implementation
    - Recommendation and Reporting
    - Socialization

    Other creators
  • PT. Pertamina Retail

    -

    - Assessment Schedule Coordinating
    - Conduct assessment with Head of each business unit of Pertamina Retail, Head of SPBU, SPBG, and Depot Pertamina
    - Analyze internal business factor and IT People Organization
    - Develop document IT Blue Print for Business Architecture and IT People and Organization
    - IT Blue Print documentation and finalization

    Other creators
  • IT Risk Assessment

    - Lead Consultant
    - Conduct Physical Assessment for Data Center
    - Conduct Vulnerability Assessment
    - Conduct IT Risk

    Other creators
  • IT Service Catalog @airline company

    -

    Develop IT service catalog

    Other creators
  • PT. Garuda Indonesia - IT Service Catalog

    -

    โ€ข Assessment Garuda and Vendor to collect data
    โ€ข Recap & Analyze assessment result
    โ€ข Develop Business Service Catalog, Technical Service Catalog, Request, Incident, and Problem Management, and Service Level Management document
    โ€ข Assessment Schedule Coordinating

    Other creators
  • IT Service Catalogue

    Other creators
  • Freelance - Security Operations Center (SOC)

    - Monitor security events to detect threats
    - Perform first level of incident analysis on the customer alerts
    - Perform analysis on events raised by Security Operations applications and tools
    - Perform vulnerability assessment

    Other creators
  • TOTAL E&P SERVICE DESK TOOLS SOLUTION

    โ€ข Conduct data gathering and gap analysis
    โ€ข Design Procedure for Incident Management
    โ€ข Design Procedure for Problem Management
    โ€ข Design Procedure for Service Level Management
    โ€ข Create process deliverables as solution to address the problems
    โ€ข Ensuring that consulting deliverables of the project ran successfully within specified cost, time and budget

    Other creators
  • IT Security review & vulnerabily assessment @major mining contractor

    -

    - Review & revised IT security policy and procedures based on ISO 27002
    - Risk Assessment
    - Vulnerability Assessment
    - Report to client's management

    Other creators
  • Vulnerability Assessment

    -

    - Risk Assessment
    - Vulnerability Assessment
    - Make Report regarding Vulnerability Assessment and Risk Assessment

    Other creators
  • Vulnerability Assessment

    -

    - Risk Assessment
    - Vulnerability Assessment
    - Make Report regarding Vulnerability Assessment and Risk Assessment

    Other creators

View Rudyโ€™s full profile

  • See who you know in common
  • Get introduced
  • Contact Rudy directly
Join to view full profile

People also viewed

Explore collaborative articles

Weโ€™re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Add new skills with these courses

Rudyโ€™s public profile badge

Include this LinkedIn profile on other websites

Rudy Anggam P

Rudy Anggam P

Pentester | Red Team | Security Operation Center | Business Continuity Management | IT Service Management | IT Strategic Planning | IT Audit | IT Governance

  • company image for Confidential

    Senior Manager Cyber Security at Confidential

  • school image for BINUS University

    BINUS University

View profile badges