IT Specialist & Cybersecurity Practitioner


Professional Background

With over five years of industry experience following my IT degree from Victoria University (2017-2021) and specialized cybersecurity training at Monash University in 2022, I currently serve as an IT Specialist managing administrator systems, cyber security protections, IT infrastructure, and more for a prominent Australian company.

IT Infrastructure Management

My responsibilities include overseeing comprehensive network architecture and server environments that support business-critical operations. I have successfully implemented and maintained robust network security protocols, including firewall configurations and intrusion detection systems. Additionally, I have led the migration of key infrastructure components to cloud platforms, resulting in improved scalability, reduced operational costs, and enhanced disaster recovery capabilities.

IT Support and Technical Resolution

I provide high-level technical support, resolving complex hardware, software, and network issues while maintaining excellent user satisfaction. My comprehensive knowledge base documentation and self-service resources have reduced routine support and improved organizational knowledge sharing. Through proactive system monitoring, I prevent potential technical issues before they affect operations, minimizing downtime and ensuring business continuity.

License Management and Compliance

I have developed and implemented systematic approaches to software license management that ensure full organizational compliance while optimizing expenditure. This includes establishing a centralized license inventory system, conducting regular compliance audits, and negotiating favourable terms with software vendors. Through strategic license consolidation and utilization analysis, I have identified and eliminated redundancies, generating significant cost savings while maintaining all necessary operational capabilities.

Software Deployment and Management

My expertise extends to designing and executing efficient software deployment strategies across diverse organizational departments. I have established standardized software deployment protocols that incorporate thorough testing methodologies, staged rollouts, and comprehensive documentation. By implementing automated deployment tools and creating streamlined update processes, I have minimized disruption to business operations while ensuring systems remain current and secure against emerging vulnerabilities.

Hardware Deployment and Lifecycle Management

I oversee the complete hardware lifecycle, from needs assessment and procurement to configuration, deployment, and eventual decommissioning. Through developing standardized hardware specifications and implementing efficient procurement processes, I have reduced acquisition costs while maintaining high-quality standards. My implementation of comprehensive asset tracking and proactive replacement scheduling has minimized costly emergency replacements and extended equipment lifespans through appropriate maintenance protocols.

Cybersecurity Knowledge Resource

I share detailed write-ups of TryHackMe Capture The Flag (CTF) challenges. My technical expertise enables me to present complex security concepts in an accessible yet comprehensive manner, creating valuable resources for security professionals seeking to enhance their CTF and cybersecurity capabilities.