John Melan Rayco
About John Melan Rayco
John Melan Rayco is a Solutions Engineer specializing in Cyber Security, currently employed at a confidential company since 2021. He has a background in IT administration and holds a Bachelor of Science degree in Computer Engineering from STI College.
Work at Confidential
John Melan Rayco has been employed as a Solutions Engineer in Cyber Security at Confidential since 2021. In this role, he focuses on enhancing the security posture of the organization by conducting vulnerability assessments and penetration testing. He utilizes various tools such as Tenable Nessus Pro, Metasploit Pro, and Kali Linux to identify and address potential security risks. Additionally, he collaborates with third-party security risk management platforms and Desktop-as-a-Service solutions, including Nutanix Xi Frame, to implement effective security measures.
Previous Experience at Achieve Without Borders
Prior to his current position, John worked as a Junior IT Administrator at Achieve Without Borders from 2018 to 2021 in Makati City. During his tenure, he was responsible for maintaining IT systems and supporting various technological initiatives. His experience in this role laid the foundation for his current expertise in cybersecurity and network management.
Education and Expertise
John Melan Rayco earned a Bachelor of Science degree in Computer Engineering from STI College, where he studied from 2013 to 2018. His educational background provides him with a solid foundation in computer systems and engineering principles, which he applies in his current role in cybersecurity. He continues to research and maintain proficiency in computer network exploitation, tools, techniques, and countermeasures.
Cybersecurity Skills and Responsibilities
In his role as a Solutions Engineer, John is involved in various cybersecurity tasks, including the installation, configuration, and implementation of cybersecurity products and tools such as firewalls, endpoint security solutions, SIEM, and data loss prevention systems. He analyzes scan reports and suggests remediation or mitigation plans for clients, ensuring that their networks remain secure. Additionally, he keeps track of new vulnerabilities across different network and security devices and collaborates with operations to plan code version upgrades.
Technical Contributions and Initiatives
John participates in capacity planning, network and systems design, and other IT initiatives that contribute to the overall security framework of his organization. He recommends, schedules, and performs network improvements, upgrades, and repairs, ensuring that the infrastructure remains robust and secure. His proactive approach to cybersecurity helps in mitigating risks and enhancing the organization's resilience against potential threats.