Aspiring cybersecurity researcher with a focus on medical device security, specifically in IoT and MIDs. Through Ph.D. Research, delved into risks and vulnerabilities in medical device cybersecurity to enhance safety, privacy, and resilience in healthcare systems. Strong background in IT, networking, and cybersecurity. Dedicated and detail-oriented researcher with six years of experience as a results-driven IT network specialist and technician. Skilled in troubleshooting IT issues and managing customer service ticketing. Actively seeking a challenging position to leverage academic background and research expertise in cybersecurity and medical technology.
• Checking CCTV system using Lenel system
• Access control Management and Monitor Event Logs
• Respond to alarms using Alarm Monitoring System
• Access management of staff, managers, directors, visitors, contractors coming on site from overseas as well as from interstates to Sydney sites
• Meet with the new starters in project rooms to take their photos and arrange their access to the site by issuing card after identifying the badge ID and cardholder number (payroll number)
• Manage the requests of access control to the lifts and speeds tile in cooperation with base building security management & manage the home floor change request too.
• Manage the security office stationary by ordering from suppliers the needed stuff.
• Manage the transfer of employees from Sydney site to interstate sites by informing the interstate workplace (HR) about it.
• Manage the transfer of employees from interstate to Sydney offices by activating or giving access to them to use Sydney site
• Create 3 different types of reports on monthly basis for the facility manager- Access denials, grants, badge events report, FCR & MCR reports and Lobby Access report
• Use the Serra view system to program the Tokens of the staff who use some facilities at EY site.
• Manage the project room reservation & access control to the users want to get access to the project room after getting an approval from EY reserve team
• Conduct meeting on weekly basis with Facility management to discuss the security operations at EY
• Manage different types of cards such as : Temporary passes ; Contractor passes ; Visitor passes ; International passes
• Operate and control closed-circuit television (CCTV) system. Systems that are used at IAG are the Security Help Desk system to monitor IAG site as well as the true vision navigator 6 to monitor IAG sites across all over Australia
• Operating the Forcefield System (Integrated security management platform) which combines access control, intrusion detection and video surveillance into a single, unified system. Plus, Control doors, alarms, user access from a single operator screen on a Windows PC.
• Supports all Challenger control panels, doors, cameras and alarm points from map display
• Device status and video verification of alarms
• Automation of tasks based on specific events and operator actions
• Monitor Event triggers and logs and monitor the alarm system
• Disable, enable and log access card as lost via the use of forcefield system
• Track user activities through event logs
• Report urgent matters such as Communications down, increase in communications room temperature and tamper at Communication cabinets, and low batteries
• Respond to fire trip in case it occurs on site
• Respond to critical calls in case staff press the duress alarm, as a controller, call the staff, check if he/ she is all right. In case, they are in trouble, inform the managers to take an action such as contacting police, and prepare the footages for the police.
• Deal with different types of alarms such as REED alarm, Multiple PIR Alarm, Duress Alarm, Holdup Alarm, Single PIR.
Gartner system (locker Management system)
• In the event of forced entry, an alarm is displayed on the network PC. For maximum security, a customizable alarm message can be sent concurrently via e-mail to the intended user
• Occupancy monitoring: When locker space is at a premium, operators can see in real-time which lockers are in use making it possible to direct people to available locker
• Locker Usage Data: All actions are logged in the software, making it possible to know who has opened which locker and when.
• Remote Locker Control: remotely unlock the locker for the user
• WEB INTERFACE Via the web interface, operators can monitor the occupancy and alarm status, add new users, make locker reservations, and view locker usage reports
Gallagher system (An access control solution)
• Set door and zone entry rules
• Monitor access points to know ‘where, when and why’ people are on your site at all times
• Proactively manage site access by integrating with existing HR systems to share information about clearances, credentials, inductions, required permits, licenses and other competencies for card holders
• Manage and control access for visitors
• respond rapidly with a reliable and effective emergency management system, including lockdowns and alerts
• Manage intruder alarms
• Manage cardholders, including their access, cards and photo identification.
• Monitor alarms and control all system aspects