Cybersecurity student at Asia Pacific University, majoring in Computer Science with a strong interest in system hardening, threat prevention, and network defense. Skilled in Linux environments, especially RHEL, with hands-on experience in command-line tools, user management, and service configuration. Proficient in SQL for querying and forensic tasks, and actively sharpen skills through CTF challenges. Involved in cybersecurity-related extracurriculars like the APU Red Hat Academy Club, with a proven ability to collaborate in diverse teams. Known for adaptability and critical thinking, especially when solving technical problems under pressure. Motivated to gain internship experience in blue team or SOC roles focused on monitoring, incident response, and digital defense.
Password Requirement Automaton Design (Computing Theory Project)
Designed a Non-deterministic Finite Automaton (NFA) to enforce password requirements including length, character types, and sequence rules. This project applied theoretical computing concepts to simulate real-world security constraints, strengthening understanding of language models and logic structure in password systems.
Created a C++ application to handle a financial fraud dataset by organizing transactions based on payment channels and sorting them by location using appropriate algorithms. Implemented functions to search transaction types and export selected data to JSON using the nlohmann/jsonlibrary, showcasing skills in file handling, data structures, and algorithm optimization.
Developed a full-featured C++ system for managing the APU Esports Championship (APUEC), handling match scheduling, fair player progression through knockout stages, registration and last-minute queue management, live stream spectator prioritization, and match result logging. The system was built with modular logic to handle real-time player and event data efficiently.
Actively participated in international Capture The Flag (CTF) competitions such as CornCTF 2025, Crypto CTF, and Google CTF, with a focus on reverse engineering, cryptography, and binary exploitation. Authored detailed technical writeups including the PwnBank challenge, analyzing reverse engineering logic, memory behavior, and exploitation techniques.
Currently drafting an academic paper titled "ID3 Fails to Detect Evolving E-Commerce Frauds: A SurpriseNet-Based Solution to Improve Transactional Security for Online Buyers." The research critiques the limitations of the ID3 algorithm in handling dynamic fraud patterns and proposes an original SurpriseNet-based system architecture to improve fraud detection accuracy in online transactions. The system design was developed prior to the literature review, demonstrating proactive problem-solving and conceptual innovation in addressing real-world e-commerce security concerns.
Built a text-based library management system using x86 Assembly (TASM) that includes login authentication with ROT13 password hashing, masked password input, and BIOS-level UI. The system supports dynamic book borrowing, returning, fine calculation, and availability updates, demonstrating low-level programming skills and hardware interfacing.
Developed a Java-based graphical food ordering system using Swing components to manage vendor menus, orders, and customer interactions. This assignment enhanced object-oriented programming skills and user interface development with event-driven architecture.
Created a system prototype for a fictional waterpark, focusing on user interaction, stakeholder requirements, UI layout, and system design. The project followed structured development methodology practices including early-stage wireframes, mockups, and user stories.
Configured a Red Hat Enterprise Linux (RHEL) environment involving host-client communication, SSH access, service management, and permission control. This assignment provided practical system administration experience using CLI tools and Red Hat conventions.
Analyzed a web hacking trends dataset using R and SQL, performing data cleaning, transformation, and visualization to highlight attack patterns over time. Applied statistical and graphical techniques to derive insights into cybersecurity event frequency and types.
Built an enterprise-grade network model in Cisco Packet Tracer for Australia and KL featuring DHCPv4 across LANs, WLAN with WPA2 and VLANs, OSPF/static routing, HSRP failover, EtherChannel for link redundancy, and port security to mitigate Layer 2 attacks. Internal services like FTP, DNS, and web servers were also configured across KL and Australia networks.
Designed a four-branch enterprise network infrastructure for KL, Penang, Ipoh, and Melaka using Cisco Packet Tracer. The project involved developing a complete logical topology, creating a subnetted IP addressing scheme, and configuring routers, switches, and end devices with justification for each configuration. Emphasized topology efficiency, device roles, scalability, and routing methods in line with enterprise standards.
Built a Restaurant Point of Sales (POS) system using Python, including initial pseudocode/flowchart design followed by full implementation. The system handled menu items, billing, table management, and simple data logging. This assignment emphasized the software development lifecycle — from design logic to functional coding and final documentation with a live demo.
Organized and operated an open booth at Asia Pacific University as part of a co-curricular initiative. Successfully attracted foot traffic, engaged visitors, and generated a profit through well-executed planning and marketing strategies. Demonstrated teamwork, customer interaction, budgeting, and real-time decision-making under an event environment.
Developed a multi-role hotel management system using C# in a team setting where each member took on a different system role. The project included login systems and role-based access for administrators, staff, customers, and guests. Key features included room management, user registration, check-in/check-out, booking history tracking, and reservation handling. The system highlighted object-oriented programming, user interface design, and logical role separation.
se