SlideShare una empresa de Scribd logo
1 de 6
Descargar para leer sin conexión
Gabriel Ong Yoke Keat
Confidential
Personal Details Language Ability
Address : Woodlands Drive 16 Block 585 English :Reading/writing/spoken
#06-70 Singapore 730585 Mandarin : Reading/writing/spoken
Mobile phone : +65 9145 4568
Home Phone :+65 6646 3852
E-Mail : Gabriel.ong@live.com
Date of Birth : 23/01/1975
Age : 41
Nationality : Singapore
Status : Married
Competency and Experience
1. Highly competent and result-proven professional with extensive experience building and managing
teams that manage and implement critical physical security and surveillance system project for
Data Center ,Commercial building factory and retail shops.
2. Project management for Physical security, card access and CCTV system installation.
3. Managing of Vendor and system integrator
4. Local Area Network project implementation.
5. IT infrastructure project implementation together with physical security system implementation
include SDK customize software implementation with different IT vendors.
6. Write or review security-related documents, such as incident reports, proposals, and tactical or
strategic initiatives.
7. Train subordinate security professionals or other organization members in security rules and
procedures.
8. Review financial reports to ensure efficiency and quality of security operations. Develop budgets
for security operations and order security-related supplies and equipment as needed.
9. Coordinate security operations or activities with public law enforcement, fire and other agencies.
10. Respond to medical emergencies, bomb threats, fire alarms, or intrusion alarms, following
emergency response procedures.
11. Assist in emergency management and contingency planning.
12. Recommend security procedures for security call centers, operations centers, domains, asset
classification systems, system acquisition, system development, system maintenance, access
control, program models, or reporting tools.
13. Prepare reports or make presentations on internal investigations, losses, or violations of regulations,
policies and procedures.
14. Identify, investigate, or resolve security breaches.
15. Monitor security policies, programs or procedures to ensure compliance with internal security
policies, licensing requirements, or applicable government security requirements, policies, and
directives.
16. Analyze and evaluate security operations to identify risks or opportunities for improvement.
17. Create or implement security standards, policies, and procedures.
18. Conduct, support, or assist in governmental reviews, internal corporate evaluations, or assessments
of the overall effectiveness of the facilities security processes.
19. Conduct physical examinations of property to ensure compliance with security policies and
regulations.
20. Communicate security status, updates, and actual or potential problems, using established
protocols.
21. Collect and analyze security data to determine security needs, security program goals, or program
accomplishments.
22. Plan, direct, and coordinate security activities to safeguard company assets, employees, guests, or
others on company property.
23. Competent in some physical security system , CCTV NVR systems configuration and
intrusion alarms implementation.
Employment History
Oct 2014 - Dec 2015 Guidepost Solutions LLC (New York /USA)
http://www.guidepostsolutions.com
Title: Data center physical security consultant, serving Microsoft
Northeast Asia
Responsibilities in this role:
 Physical Security Threat Vulnerability Risk Assessment (TVRA) for Microsoft Northeast
Asia Data Centers
 Implement and manage Microsoft Data Center Physical access control and surveillance
system
 Design ,review and audit security procedures and system performance specifications
 Liaison with security integrator/vendors and Microsoft Data Center Managers from
various countries in North Asia for operation improvement and issue resolution
 Risk assessment for existing data centre 
 Negotiation of quotation with security integrator and ensuring of ROIs (Return of
investment) for Microsoft
 Review new build data center system drawing with architect 

Notable Achievement in this role:
Take over a failed Data Center physical security system project from another consultant. In
less than one month, identified and remediated all defective/sub-standard components and
completed the revamp of the new physical security system for Microsoft China Data Center
within time-line and budget.
May 2013 - Sept 2014 Stanley Security (Singapore)
http://www.infocomsec.com
Title: Project Engineer/System Administrator
Responsibilities in this role:
 On-site support for Physical security and surveillance systems for commercial and
industrial building
 Risk Assessment and quality assurance
 Testing and commissioning of new Lenel, Pelco DVR and other CCTV storage server
 Provide technical advisory to existing clients
 System administration for in-house IT systems
April 2011 - April 2013 Chubb Security (Singapore)
http://www.chubb.com.sg/
Title: Assistant Systems Manager
Responsibilities in this role:
 Managing a team of engineers in the implementation and support of physical security and
surveillance systems, specialize in Bank Branches and ATM kiosk
 Pre-sales support, including design of new physical security system, fire alarm system,
CCTV surveillance system and liaising will all the vendors for product pricing negotiation
 Risk assessment and quality assurance for all completed project works
 Conducting security training and safety program for clients
June 2007 - April 2011 ICD Security (Beijing/China)
http://www.icdsecurity.com
Title: Project manager/Security programming manager
Responsibilities in this role:

 Managing a team of engineer in the implementation and support of physical security and
surveillance systems for MNC in China major cities such as Beijing and Shanghai
 Risk assessment and quality assurance for all completed project works
 Liaising with local authority for project involving Municipal departments
 Formulation of security policies for clients
 Conducting security training and safety program for clients
Notable Achievement in this role included:
In 2009, promoted to Project Manager and transfer from Singapore to Beijing office to handle
major implementation projects. In 2010, working with Apple Retail Division for Asia,
successfully implemented physical security system, CCTV surveillance system and intruder
alarm system for Apple Inc biggest retail store in China - Apple Joy City (Beijing). Received
positive feedback from Apple Senior Vice President of Retail China for fulfilling all the
stringent requirements and tight schedule deadline prior to store official opening. Also,
successful revamped the security policy for Microsoft Asia office with full acceptance from
Microsoft US HQ Redmond’s and received positive feedback from Microsoft regional
Security manager on the result delivered.
2003 - June 2007 Outsourced IT Services
Title: System Engineer attached to JP Morgan, AIG Singapore and
Keppel Offshore Marine
Responsibilities in this role:

 Windows Server Administration (Windows server 2003)
 Windows OS, Microsoft Office and Microsoft Outlook applications support
 End user Helpdesk service and Desktop support.
Notable Achievement in this role included:
Consistently received good feedback and compliment from clients for going the extra mile to
resolve customer queries and problems effectively.
Education
Date School/Institution Qualifications obtained
2006 - 2008 University of Sunderland (UK) BA (Hon) In Business Management
Professional Certification
1. Lenel Certification Silver Certified for OnGuard Security Management Software
2. Pelco Endura certified (Pelco Global Training Institute)
3. Risk Management Course ( BizSAFE Level 2 Conducted by The SCAL Academy)
4. A+ Comptia Certification (The Computing Technology Industry Association)
IT Technical Skills
 LAN Network Management
 Microsoft Server 2003
 Microsoft SQL
 Microsoft Exchange server
 Microsoft Office Applications Support (Excel, FrontPage, PowerPoint, Visio, Word)
 Computer hardware assembly and troubleshooting
 Microsoft Windows Desktop (Vista, Windows 7, Windows 8.1) troubleshooting
Community Service
Strong believer that volunteerism contribute and make a difference to the community and the
lives of others. Since 2012, actively involve with Grassroots communities to help address
local issues and render social assistance to the needy.

Más contenido relacionado

La actualidad más candente

IT1204 - Software Engineering -L8
IT1204 - Software Engineering -L8IT1204 - Software Engineering -L8
IT1204 - Software Engineering -L8BakerTilly US
 
NPryadko-LinkedInResume
NPryadko-LinkedInResumeNPryadko-LinkedInResume
NPryadko-LinkedInResumeNadia Pryadko
 
What’s making way for secure sdlc
What’s making way for secure sdlcWhat’s making way for secure sdlc
What’s making way for secure sdlcAvancercorp
 
Howard Plotnicov Resume_2016
Howard Plotnicov Resume_2016 Howard Plotnicov Resume_2016
Howard Plotnicov Resume_2016 Howard Plotnicov
 
Resume-Jasim Ali
Resume-Jasim AliResume-Jasim Ali
Resume-Jasim AliJasim Ali
 
Integra tech profile -2017
Integra tech profile -2017Integra tech profile -2017
Integra tech profile -2017Integra Tech Sg
 
NicoleColeman___Resume update_03.02.2016
NicoleColeman___Resume update_03.02.2016NicoleColeman___Resume update_03.02.2016
NicoleColeman___Resume update_03.02.2016Nicole Coleman
 
Firoz_declaration.docx
Firoz_declaration.docxFiroz_declaration.docx
Firoz_declaration.docxFirozkumar2
 
EricMorrisFinalResume
EricMorrisFinalResumeEricMorrisFinalResume
EricMorrisFinalResumeEric Morris
 
Comp tia network_n10-005
Comp tia network_n10-005Comp tia network_n10-005
Comp tia network_n10-005sunil kumar
 
EMEIA_DivyaBRavichandran_Jan2016_CV
EMEIA_DivyaBRavichandran_Jan2016_CVEMEIA_DivyaBRavichandran_Jan2016_CV
EMEIA_DivyaBRavichandran_Jan2016_CVDivya Ravichandran
 
Resume - Uyapo Kenosi
Resume - Uyapo KenosiResume - Uyapo Kenosi
Resume - Uyapo KenosiBoyce Kenosi
 
Dwane Tuitt CV 2017.
Dwane Tuitt CV 2017.Dwane Tuitt CV 2017.
Dwane Tuitt CV 2017.Dwane Tuitt
 
PT Application Inspector SSDL Edition product brief
PT Application Inspector SSDL Edition product briefPT Application Inspector SSDL Edition product brief
PT Application Inspector SSDL Edition product briefValery Boronin
 

La actualidad más candente (20)

IT1204 - Software Engineering -L8
IT1204 - Software Engineering -L8IT1204 - Software Engineering -L8
IT1204 - Software Engineering -L8
 
NPryadko-LinkedInResume
NPryadko-LinkedInResumeNPryadko-LinkedInResume
NPryadko-LinkedInResume
 
AdeyemiOlaleye_updated
AdeyemiOlaleye_updatedAdeyemiOlaleye_updated
AdeyemiOlaleye_updated
 
What’s making way for secure sdlc
What’s making way for secure sdlcWhat’s making way for secure sdlc
What’s making way for secure sdlc
 
Howard Plotnicov Resume_2016
Howard Plotnicov Resume_2016 Howard Plotnicov Resume_2016
Howard Plotnicov Resume_2016
 
Charles M Cottrell
Charles M CottrellCharles M Cottrell
Charles M Cottrell
 
Resume-Jasim Ali
Resume-Jasim AliResume-Jasim Ali
Resume-Jasim Ali
 
Integra tech profile -2017
Integra tech profile -2017Integra tech profile -2017
Integra tech profile -2017
 
NicoleColeman___Resume update_03.02.2016
NicoleColeman___Resume update_03.02.2016NicoleColeman___Resume update_03.02.2016
NicoleColeman___Resume update_03.02.2016
 
Danish's Resume
Danish's ResumeDanish's Resume
Danish's Resume
 
Firoz_declaration.docx
Firoz_declaration.docxFiroz_declaration.docx
Firoz_declaration.docx
 
EricMorrisFinalResume
EricMorrisFinalResumeEricMorrisFinalResume
EricMorrisFinalResume
 
Comp tia network_n10-005
Comp tia network_n10-005Comp tia network_n10-005
Comp tia network_n10-005
 
Resume
ResumeResume
Resume
 
EMEIA_DivyaBRavichandran_Jan2016_CV
EMEIA_DivyaBRavichandran_Jan2016_CVEMEIA_DivyaBRavichandran_Jan2016_CV
EMEIA_DivyaBRavichandran_Jan2016_CV
 
My Work profile
My Work profileMy Work profile
My Work profile
 
Resume - Uyapo Kenosi
Resume - Uyapo KenosiResume - Uyapo Kenosi
Resume - Uyapo Kenosi
 
Resume (CV) Naeem Ahmad (Sales Manager)
Resume (CV) Naeem Ahmad (Sales Manager)Resume (CV) Naeem Ahmad (Sales Manager)
Resume (CV) Naeem Ahmad (Sales Manager)
 
Dwane Tuitt CV 2017.
Dwane Tuitt CV 2017.Dwane Tuitt CV 2017.
Dwane Tuitt CV 2017.
 
PT Application Inspector SSDL Edition product brief
PT Application Inspector SSDL Edition product briefPT Application Inspector SSDL Edition product brief
PT Application Inspector SSDL Edition product brief
 

Destacado

Metodologia de la Investigacion
Metodologia de la InvestigacionMetodologia de la Investigacion
Metodologia de la InvestigacionAndy I. Andrade
 
大学生活のスマートアカウントマネジメント
大学生活のスマートアカウントマネジメント大学生活のスマートアカウントマネジメント
大学生活のスマートアカウントマネジメントstucon
 
Redes (Bertossi-Giuliani)
Redes (Bertossi-Giuliani)Redes (Bertossi-Giuliani)
Redes (Bertossi-Giuliani)Emanuel Sosa
 
Integrating Content, Search & Social | Pubcon Las Vegas 2016
Integrating Content, Search & Social | Pubcon Las Vegas 2016Integrating Content, Search & Social | Pubcon Las Vegas 2016
Integrating Content, Search & Social | Pubcon Las Vegas 2016Casie Gillette
 
BrightonSEO - International Targeting with Hreflang Tags
BrightonSEO - International Targeting with Hreflang TagsBrightonSEO - International Targeting with Hreflang Tags
BrightonSEO - International Targeting with Hreflang TagsOban International
 
1. introducción (Metodología de la Investigación)
1. introducción (Metodología de la Investigación)1. introducción (Metodología de la Investigación)
1. introducción (Metodología de la Investigación)Laura O. Eguia Magaña
 
Smoothing Filters in Spatial Domain
Smoothing Filters in Spatial DomainSmoothing Filters in Spatial Domain
Smoothing Filters in Spatial DomainMadhu Bala
 
Diversos Tipos de Conocimiento - Dra Eneida Matos
Diversos Tipos de Conocimiento - Dra Eneida MatosDiversos Tipos de Conocimiento - Dra Eneida Matos
Diversos Tipos de Conocimiento - Dra Eneida Matosug-dipa
 
Coping with Complexity in Healthcare: Enabling Sense-Making Through Great UX ...
Coping with Complexity in Healthcare: Enabling Sense-Making Through Great UX ...Coping with Complexity in Healthcare: Enabling Sense-Making Through Great UX ...
Coping with Complexity in Healthcare: Enabling Sense-Making Through Great UX ...Medullan
 
Deep diving into featured snippets: How to earn more and rise to the top.
Deep diving into featured snippets: How to earn more and rise to the top.Deep diving into featured snippets: How to earn more and rise to the top.
Deep diving into featured snippets: How to earn more and rise to the top.Rob Bucci
 
Image Enhancement in Spatial Domain
Image Enhancement in Spatial DomainImage Enhancement in Spatial Domain
Image Enhancement in Spatial DomainDEEPASHRI HK
 
Local Intent - Pubcon Austin 2016
Local Intent - Pubcon Austin 2016Local Intent - Pubcon Austin 2016
Local Intent - Pubcon Austin 2016Jordan Kasteler
 
Metodologia de la investigacion
Metodologia de la investigacionMetodologia de la investigacion
Metodologia de la investigacionNaida Labra
 
Digital image processing img smoothning
Digital image processing img smoothningDigital image processing img smoothning
Digital image processing img smoothningVinay Gupta
 

Destacado (18)

Metodologia de la Investigacion
Metodologia de la InvestigacionMetodologia de la Investigacion
Metodologia de la Investigacion
 
大学生活のスマートアカウントマネジメント
大学生活のスマートアカウントマネジメント大学生活のスマートアカウントマネジメント
大学生活のスマートアカウントマネジメント
 
Social Ads Strategies That Capture Audiences & Convert
Social Ads Strategies That Capture Audiences & ConvertSocial Ads Strategies That Capture Audiences & Convert
Social Ads Strategies That Capture Audiences & Convert
 
Transforma 1
Transforma 1Transforma 1
Transforma 1
 
Redes (Bertossi-Giuliani)
Redes (Bertossi-Giuliani)Redes (Bertossi-Giuliani)
Redes (Bertossi-Giuliani)
 
Maple Fly International
Maple Fly InternationalMaple Fly International
Maple Fly International
 
Integrating Content, Search & Social | Pubcon Las Vegas 2016
Integrating Content, Search & Social | Pubcon Las Vegas 2016Integrating Content, Search & Social | Pubcon Las Vegas 2016
Integrating Content, Search & Social | Pubcon Las Vegas 2016
 
BrightonSEO - International Targeting with Hreflang Tags
BrightonSEO - International Targeting with Hreflang TagsBrightonSEO - International Targeting with Hreflang Tags
BrightonSEO - International Targeting with Hreflang Tags
 
1. introducción (Metodología de la Investigación)
1. introducción (Metodología de la Investigación)1. introducción (Metodología de la Investigación)
1. introducción (Metodología de la Investigación)
 
Smoothing Filters in Spatial Domain
Smoothing Filters in Spatial DomainSmoothing Filters in Spatial Domain
Smoothing Filters in Spatial Domain
 
Diversos Tipos de Conocimiento - Dra Eneida Matos
Diversos Tipos de Conocimiento - Dra Eneida MatosDiversos Tipos de Conocimiento - Dra Eneida Matos
Diversos Tipos de Conocimiento - Dra Eneida Matos
 
Coping with Complexity in Healthcare: Enabling Sense-Making Through Great UX ...
Coping with Complexity in Healthcare: Enabling Sense-Making Through Great UX ...Coping with Complexity in Healthcare: Enabling Sense-Making Through Great UX ...
Coping with Complexity in Healthcare: Enabling Sense-Making Through Great UX ...
 
Metodología de la investigación tao
Metodología de la investigación taoMetodología de la investigación tao
Metodología de la investigación tao
 
Deep diving into featured snippets: How to earn more and rise to the top.
Deep diving into featured snippets: How to earn more and rise to the top.Deep diving into featured snippets: How to earn more and rise to the top.
Deep diving into featured snippets: How to earn more and rise to the top.
 
Image Enhancement in Spatial Domain
Image Enhancement in Spatial DomainImage Enhancement in Spatial Domain
Image Enhancement in Spatial Domain
 
Local Intent - Pubcon Austin 2016
Local Intent - Pubcon Austin 2016Local Intent - Pubcon Austin 2016
Local Intent - Pubcon Austin 2016
 
Metodologia de la investigacion
Metodologia de la investigacionMetodologia de la investigacion
Metodologia de la investigacion
 
Digital image processing img smoothning
Digital image processing img smoothningDigital image processing img smoothning
Digital image processing img smoothning
 

Similar a Experienced Security Professional

Beng Chuan LIM_March 2015_CV
Beng Chuan LIM_March 2015_CVBeng Chuan LIM_March 2015_CV
Beng Chuan LIM_March 2015_CVBeng Chuan Lim
 
CV of IT Security Professional
CV of IT Security ProfessionalCV of IT Security Professional
CV of IT Security ProfessionalAjay Upadhyay
 
Thomas reinheimer resume 04152016
Thomas reinheimer resume 04152016Thomas reinheimer resume 04152016
Thomas reinheimer resume 04152016Tom Reinheimer
 
Ahmed Sami Ahmed CV v8.0 Decision Support & Technology Director
Ahmed Sami Ahmed CV v8.0 Decision Support & Technology DirectorAhmed Sami Ahmed CV v8.0 Decision Support & Technology Director
Ahmed Sami Ahmed CV v8.0 Decision Support & Technology DirectorAhmed Sami
 
NUS-ISS Digital Architecture Information Session
NUS-ISS Digital Architecture Information SessionNUS-ISS Digital Architecture Information Session
NUS-ISS Digital Architecture Information Sessionengtsze
 
Akil_Malcolm_resume
Akil_Malcolm_resumeAkil_Malcolm_resume
Akil_Malcolm_resumeAkil Malcolm
 
IT Manager (20160510)
IT Manager (20160510)IT Manager (20160510)
IT Manager (20160510)kelvin chak
 
Beng Chuan LIM_February 2016_CV
Beng Chuan LIM_February 2016_CVBeng Chuan LIM_February 2016_CV
Beng Chuan LIM_February 2016_CVBeng Chuan Lim
 
Resume - Mohamed Aman Mohamed Elhelw-Jun 2016
Resume - Mohamed Aman Mohamed Elhelw-Jun 2016Resume - Mohamed Aman Mohamed Elhelw-Jun 2016
Resume - Mohamed Aman Mohamed Elhelw-Jun 2016Mohamed Aman Elhelw
 
Resume_IshitaKundu_CISA
Resume_IshitaKundu_CISAResume_IshitaKundu_CISA
Resume_IshitaKundu_CISAIshita Kundu
 
Security-by-Design in Enterprise Architecture
Security-by-Design in Enterprise ArchitectureSecurity-by-Design in Enterprise Architecture
Security-by-Design in Enterprise ArchitectureThe Open Group SA
 
Ahmed Sami C.V. V.9 E-Learning Co-ordinator
Ahmed Sami C.V. V.9 E-Learning Co-ordinatorAhmed Sami C.V. V.9 E-Learning Co-ordinator
Ahmed Sami C.V. V.9 E-Learning Co-ordinatorAhmed Sami
 
Shakil_SAP_Security resume
Shakil_SAP_Security resumeShakil_SAP_Security resume
Shakil_SAP_Security resumeSHAKIL TIRMIZI
 
My CV-Jan-2016
My CV-Jan-2016My CV-Jan-2016
My CV-Jan-2016Adel Zayed
 

Similar a Experienced Security Professional (20)

Beng Chuan LIM_March 2015_CV
Beng Chuan LIM_March 2015_CVBeng Chuan LIM_March 2015_CV
Beng Chuan LIM_March 2015_CV
 
CV of IT Security Professional
CV of IT Security ProfessionalCV of IT Security Professional
CV of IT Security Professional
 
Thomas reinheimer resume 04152016
Thomas reinheimer resume 04152016Thomas reinheimer resume 04152016
Thomas reinheimer resume 04152016
 
Ahmed Sami Ahmed CV v8.0 Decision Support & Technology Director
Ahmed Sami Ahmed CV v8.0 Decision Support & Technology DirectorAhmed Sami Ahmed CV v8.0 Decision Support & Technology Director
Ahmed Sami Ahmed CV v8.0 Decision Support & Technology Director
 
NUS-ISS Digital Architecture Information Session
NUS-ISS Digital Architecture Information SessionNUS-ISS Digital Architecture Information Session
NUS-ISS Digital Architecture Information Session
 
Sreenivasan.L
Sreenivasan.LSreenivasan.L
Sreenivasan.L
 
Resume
ResumeResume
Resume
 
Cv for ala' zayadeen
Cv for  ala' zayadeen Cv for  ala' zayadeen
Cv for ala' zayadeen
 
Akil_Malcolm_resume
Akil_Malcolm_resumeAkil_Malcolm_resume
Akil_Malcolm_resume
 
Chintakunta
ChintakuntaChintakunta
Chintakunta
 
IT Manager (20160510)
IT Manager (20160510)IT Manager (20160510)
IT Manager (20160510)
 
Beng Chuan LIM_February 2016_CV
Beng Chuan LIM_February 2016_CVBeng Chuan LIM_February 2016_CV
Beng Chuan LIM_February 2016_CV
 
Resume - Mohamed Aman Mohamed Elhelw-Jun 2016
Resume - Mohamed Aman Mohamed Elhelw-Jun 2016Resume - Mohamed Aman Mohamed Elhelw-Jun 2016
Resume - Mohamed Aman Mohamed Elhelw-Jun 2016
 
Resume2016
Resume2016Resume2016
Resume2016
 
Resume_IshitaKundu_CISA
Resume_IshitaKundu_CISAResume_IshitaKundu_CISA
Resume_IshitaKundu_CISA
 
Security-by-Design in Enterprise Architecture
Security-by-Design in Enterprise ArchitectureSecurity-by-Design in Enterprise Architecture
Security-by-Design in Enterprise Architecture
 
Santoshi_CV_Latest
Santoshi_CV_LatestSantoshi_CV_Latest
Santoshi_CV_Latest
 
Ahmed Sami C.V. V.9 E-Learning Co-ordinator
Ahmed Sami C.V. V.9 E-Learning Co-ordinatorAhmed Sami C.V. V.9 E-Learning Co-ordinator
Ahmed Sami C.V. V.9 E-Learning Co-ordinator
 
Shakil_SAP_Security resume
Shakil_SAP_Security resumeShakil_SAP_Security resume
Shakil_SAP_Security resume
 
My CV-Jan-2016
My CV-Jan-2016My CV-Jan-2016
My CV-Jan-2016
 

Experienced Security Professional

  • 1. Gabriel Ong Yoke Keat Confidential Personal Details Language Ability Address : Woodlands Drive 16 Block 585 English :Reading/writing/spoken #06-70 Singapore 730585 Mandarin : Reading/writing/spoken Mobile phone : +65 9145 4568 Home Phone :+65 6646 3852 E-Mail : Gabriel.ong@live.com Date of Birth : 23/01/1975 Age : 41 Nationality : Singapore Status : Married Competency and Experience 1. Highly competent and result-proven professional with extensive experience building and managing teams that manage and implement critical physical security and surveillance system project for Data Center ,Commercial building factory and retail shops. 2. Project management for Physical security, card access and CCTV system installation. 3. Managing of Vendor and system integrator 4. Local Area Network project implementation. 5. IT infrastructure project implementation together with physical security system implementation include SDK customize software implementation with different IT vendors. 6. Write or review security-related documents, such as incident reports, proposals, and tactical or strategic initiatives. 7. Train subordinate security professionals or other organization members in security rules and procedures. 8. Review financial reports to ensure efficiency and quality of security operations. Develop budgets for security operations and order security-related supplies and equipment as needed. 9. Coordinate security operations or activities with public law enforcement, fire and other agencies. 10. Respond to medical emergencies, bomb threats, fire alarms, or intrusion alarms, following emergency response procedures.
  • 2. 11. Assist in emergency management and contingency planning. 12. Recommend security procedures for security call centers, operations centers, domains, asset classification systems, system acquisition, system development, system maintenance, access control, program models, or reporting tools. 13. Prepare reports or make presentations on internal investigations, losses, or violations of regulations, policies and procedures. 14. Identify, investigate, or resolve security breaches. 15. Monitor security policies, programs or procedures to ensure compliance with internal security policies, licensing requirements, or applicable government security requirements, policies, and directives. 16. Analyze and evaluate security operations to identify risks or opportunities for improvement. 17. Create or implement security standards, policies, and procedures. 18. Conduct, support, or assist in governmental reviews, internal corporate evaluations, or assessments of the overall effectiveness of the facilities security processes. 19. Conduct physical examinations of property to ensure compliance with security policies and regulations. 20. Communicate security status, updates, and actual or potential problems, using established protocols. 21. Collect and analyze security data to determine security needs, security program goals, or program accomplishments. 22. Plan, direct, and coordinate security activities to safeguard company assets, employees, guests, or others on company property. 23. Competent in some physical security system , CCTV NVR systems configuration and intrusion alarms implementation.
  • 3. Employment History Oct 2014 - Dec 2015 Guidepost Solutions LLC (New York /USA) http://www.guidepostsolutions.com Title: Data center physical security consultant, serving Microsoft Northeast Asia Responsibilities in this role:  Physical Security Threat Vulnerability Risk Assessment (TVRA) for Microsoft Northeast Asia Data Centers  Implement and manage Microsoft Data Center Physical access control and surveillance system  Design ,review and audit security procedures and system performance specifications  Liaison with security integrator/vendors and Microsoft Data Center Managers from various countries in North Asia for operation improvement and issue resolution  Risk assessment for existing data centre   Negotiation of quotation with security integrator and ensuring of ROIs (Return of investment) for Microsoft  Review new build data center system drawing with architect   Notable Achievement in this role: Take over a failed Data Center physical security system project from another consultant. In less than one month, identified and remediated all defective/sub-standard components and completed the revamp of the new physical security system for Microsoft China Data Center within time-line and budget.
  • 4. May 2013 - Sept 2014 Stanley Security (Singapore) http://www.infocomsec.com Title: Project Engineer/System Administrator Responsibilities in this role:  On-site support for Physical security and surveillance systems for commercial and industrial building  Risk Assessment and quality assurance  Testing and commissioning of new Lenel, Pelco DVR and other CCTV storage server  Provide technical advisory to existing clients  System administration for in-house IT systems April 2011 - April 2013 Chubb Security (Singapore) http://www.chubb.com.sg/ Title: Assistant Systems Manager Responsibilities in this role:  Managing a team of engineers in the implementation and support of physical security and surveillance systems, specialize in Bank Branches and ATM kiosk  Pre-sales support, including design of new physical security system, fire alarm system, CCTV surveillance system and liaising will all the vendors for product pricing negotiation  Risk assessment and quality assurance for all completed project works  Conducting security training and safety program for clients
  • 5. June 2007 - April 2011 ICD Security (Beijing/China) http://www.icdsecurity.com Title: Project manager/Security programming manager Responsibilities in this role:   Managing a team of engineer in the implementation and support of physical security and surveillance systems for MNC in China major cities such as Beijing and Shanghai  Risk assessment and quality assurance for all completed project works  Liaising with local authority for project involving Municipal departments  Formulation of security policies for clients  Conducting security training and safety program for clients Notable Achievement in this role included: In 2009, promoted to Project Manager and transfer from Singapore to Beijing office to handle major implementation projects. In 2010, working with Apple Retail Division for Asia, successfully implemented physical security system, CCTV surveillance system and intruder alarm system for Apple Inc biggest retail store in China - Apple Joy City (Beijing). Received positive feedback from Apple Senior Vice President of Retail China for fulfilling all the stringent requirements and tight schedule deadline prior to store official opening. Also, successful revamped the security policy for Microsoft Asia office with full acceptance from Microsoft US HQ Redmond’s and received positive feedback from Microsoft regional Security manager on the result delivered. 2003 - June 2007 Outsourced IT Services Title: System Engineer attached to JP Morgan, AIG Singapore and Keppel Offshore Marine Responsibilities in this role:   Windows Server Administration (Windows server 2003)  Windows OS, Microsoft Office and Microsoft Outlook applications support  End user Helpdesk service and Desktop support. Notable Achievement in this role included: Consistently received good feedback and compliment from clients for going the extra mile to resolve customer queries and problems effectively.
  • 6. Education Date School/Institution Qualifications obtained 2006 - 2008 University of Sunderland (UK) BA (Hon) In Business Management Professional Certification 1. Lenel Certification Silver Certified for OnGuard Security Management Software 2. Pelco Endura certified (Pelco Global Training Institute) 3. Risk Management Course ( BizSAFE Level 2 Conducted by The SCAL Academy) 4. A+ Comptia Certification (The Computing Technology Industry Association) IT Technical Skills  LAN Network Management  Microsoft Server 2003  Microsoft SQL  Microsoft Exchange server  Microsoft Office Applications Support (Excel, FrontPage, PowerPoint, Visio, Word)  Computer hardware assembly and troubleshooting  Microsoft Windows Desktop (Vista, Windows 7, Windows 8.1) troubleshooting Community Service Strong believer that volunteerism contribute and make a difference to the community and the lives of others. Since 2012, actively involve with Grassroots communities to help address local issues and render social assistance to the needy.