About

Fredric Lesomar

Cybersecurity & Tech Support

Learn more about me:

  • Website: www.fredriclesomar.my.id
  • Phone: +62 812 8522
  • City: Yogyakarta, ID

Meet an individual deeply immersed in the realm of cybersecurity. Armed with a passion for securing digital landscapes, this individual is dedicated to understanding and mitigating cyber threats. My journey involves staying abreast of the latest trends in cybersecurity, constantly refining their skills to combat evolving challenges.

With a solid foundation in information security, i have possess expertise in areas such as network security, encryption, vulnerability assessment, and incident response. This cybersecurity enthusiast is likely well-versed in the tools and techniques required to protect systems and data from malicious actors.

Happy Clients

Projects

Hours Of Support

Interests

Secure Code

Network Engineer

Server Hardening

Pentest

Big Data

Artificial Intelligence

Cloud Computing

Vulnerability Assessment

Resume

Check My Resume

Sumary

Tech Support & Abuse Department

2020 - Present

Technical support professionals play a crucial role in assisting individuals or organizations with their technological issues. This role requires a combination of technical expertise and strong communication skills.

  • Issue Resolution: Diagnosing and troubleshooting technical problems faced by customers or end-users. Providing step-by-step guidance to resolve hardware or software issues. Utilizing problem-solving skills to identify and implement effective solutions.
  • Customer Assistance: Offering timely and effective support to customers via various channels, such as phone, email, or chat. Ensuring a positive customer experience by addressing concerns and inquiries with professionalism and empathy. Managing and prioritizing customer issues to meet service-level agreements.
  • Product Knowledge: Staying informed about the latest updates and features of the products or services being supported. Continuously expanding technical knowledge to effectively address a wide range of issues.
  • Abuse Role: investigate, manage and mitigate instances of abuse reported by users, customers, or internal monitoring systems. This can include addressing issues related to harassment, fraud, unauthorized access, spam or any other activities that violate the organization's terms of service or code of conduct.

Education

Bachelor degree of Informatics Engineering

2019

STMIK Akakom, Yogyakarta, ID

Associate degree of Computer Engineering

2017

STMIK Akakom, Yogyakarta, ID

Professional Experience

Head of Red Team, Cybersecurity

2016 - 2020

Codelabs Network, Semarang, Javanese

  • Analyze security systems and seek improvements on a continuous basis
  • Monitoring networks and systems for security breaches or intrusions
  • Leading incident response activities
  • Leading investigations into how breaches happen
  • Developing automation scripts to handle and track incidents
  • Conducting penetration testing

SysAdmin

2017 - 2018

PT.Ekowisata Papua Tour and Travel, Biak, Papua

  • Install, configure, and maintain server hardware and software.
  • Design, implement, and manage the organization's network infrastructure.
  • Implement and maintain security measures to protect the organization's systems and data.
  • Develop and execute backup and recovery plans to ensure data integrity and availability in case of system failures or disasters.
  • Diagnose and resolve hardware, software, and network issues.
  • Keep systems up-to-date by applying patches, updates, and security fixes.
  • Provide technical support to end-users, assisting them with software and hardware issues.
  • Managed automation tools and scripts to streamline repetitive tasks and improve overall efficiency in system administration and more.

Services

My Services

Managed Server

Install, Configure. This can include tasks such as software updates, security monitoring, backup management and more.

Pentest

A penetration tester, Performing simulated cyber attacks to exploit identified vulnerabilities.

Vulnerability Assessment

A Vulnerability Assessment (VA) is a systematic examination of an information system or product to identify and assess security vulnerabilities.

Web Development

Web development is a field that involves the creation and maintenance of websites and web applications. It encompasses a range of tasks, from designing the visual layout of a site to implementing the functionality that makes it work.

Secure Code

This helps in identifying and addressing security vulnerabilities early in the development process, reducing the risk of security breaches and ensuring that the final product is more resilient to attacks

Server Hardening

Server hardening is a process of securing a server by reducing its attack surface and minimizing vulnerabilities. This involves implementing various security measures to protect the server and its data from unauthorized access, malicious activities, and potential threats.

Portfolio

My Works

  • All
  • App
  • Card
  • Web

App 1

App

Web 3

Web

App 2

App

Card 2

Card

Web 2

Web

App 3

App

Card 1

Card

Card 3

Card

Web 3

Web

Contact

Hub Me

My Address

[secret-addr], Indonesia

Social Profiles

Call Me

+62 812 8522

Touch by Heart