0

🎓 M.Sc. Cyber Security — SUTD Singapore
Scroll
AUTOMOTIVE • CCC DIGITAL KEY • CYBER SECURITY • AI • MACHINE LEARNING • UWB • FEDERATED LEARNING • BLE • THREAT INTELLIGENCE • Semiconductor Design •  AUTOMOTIVE • CCC DIGITAL KEY • CYBER SECURITY • AI • MACHINE LEARNING • UWB • FEDERATED LEARNING • BLE • THREAT INTELLIGENCE • Semiconductor Design • 
Watson
About

Driving business growth in automotive electronics across Asia-Pacific. With deep expertise spanning CCC Digital Key, cybersecurity, and AI — I bridge the gap between engineering excellence, security-first thinking, and strategic business development for global OEMs. Currently leading acquisition & quotation at Aumovio Singapore, within the Business Development & Acquisition APAC division.

🎓
Master of Science (M.Sc.)
Cyber Security
Singapore University of Technology and Design (SUTD)
0
OEM Partners
0
Years Exp.
0
Domains
DEEP LEARNING • ACQUISITION • ZERO TRUST • LEADERSHIP • NEURAL NETWORKS • SINGAPORE • SUTD • CRYPTOGRAPHY •  DEEP LEARNING • ACQUISITION • ZERO TRUST • LEADERSHIP • NEURAL NETWORKS • SINGAPORE • SUTD • CRYPTOGRAPHY • 
AUTOMOTIVE

Automotive Electronics

Deep technical expertise in vehicle access, connectivity, and control systems

🔑

CCC Digital Key

Car Connectivity Consortium Digital Key standard — enabling smartphone-based secure vehicle access using NFC, BLE, and UWB for next-gen keyless experience.

Learn about CCC Digital Key
📡

UWB Technology

Ultra-Wideband integration for secure vehicle access, precise localization, and anti-relay attack protection.

📶

BLE Connectivity

Bluetooth Low Energy solutions for smartphone-as-key, proximity detection, and seamless user authentication.

ECU Development

Electronic Control Unit design from specification through validation, automotive-grade quality and compliance.

🚗

PASE & Body Control

Passive Start Entry and body control module integration delivering seamless driver experience across platforms.

📈

Business Development

Strategic customer acquisition across APAC, pipeline management, competitive analysis, and OEM relationship building.

SECURITY

Cyber Security

Comprehensive knowledge across the cybersecurity landscape — from offensive to defensive

🔐

Cryptography & PKI

Symmetric & asymmetric encryption, digital signatures, certificate management, HSMs, and post-quantum cryptography readiness.

🛡

Network Security

Firewalls, IDS/IPS, VPN, network segmentation, DDoS mitigation, and zero trust network architecture (ZTNA).

🔎

Penetration Testing

Ethical hacking, vulnerability assessment, OWASP Top 10, red teaming, social engineering, and exploit development.

🛠

Security Operations

SOC operations, SIEM, threat hunting, incident response, digital forensics, malware analysis, and threat intelligence.

Governance & Compliance

ISO 27001, NIST CSF, GDPR, risk management frameworks, security auditing, and regulatory compliance programs.

Cloud & App Security

Cloud security architecture (AWS/Azure/GCP), container security, DevSecOps, secure SDLC, and API security.

💻

Endpoint & IoT Security

EDR/XDR, mobile security, automotive cybersecurity (ISO/SAE 21434), embedded systems hardening, and IoT device protection.

👥

Identity & Access Mgmt

IAM, multi-factor authentication, SSO, privileged access management (PAM), zero trust identity, and biometric security.

🌐

Cyber Threat Intelligence

MITRE ATT&CK framework, threat modeling, dark web monitoring, APT analysis, and intelligence-driven defense strategies.

AI

AI & Machine Learning

From classical ML to cutting-edge federated learning and privacy-preserving AI

🧠

Machine Learning

Supervised & unsupervised learning, ensemble methods, SVMs, decision trees, regression, clustering, and dimensionality reduction.

🤖

Deep Learning

CNNs, RNNs, LSTMs, transformers, GANs, autoencoders, attention mechanisms, and neural architecture search.

🔬

Federated Learning

Privacy-preserving distributed ML, federated averaging (FedAvg), secure aggregation, differential privacy, and cross-device/cross-silo FL.

💬

Natural Language Processing

Text classification, sentiment analysis, named entity recognition, large language models, and conversational AI systems.

👁

Computer Vision

Object detection, image segmentation, facial recognition, video analytics, and autonomous perception systems.

📐

AI Ethics & Explainability

Responsible AI, bias detection & mitigation, model interpretability (SHAP/LIME), fairness metrics, and AI governance frameworks.

💪

Reinforcement Learning

Q-learning, policy gradients, multi-agent RL, reward shaping, and applications in robotics & autonomous systems.

🔒

AI Security

Adversarial ML, model poisoning, data privacy attacks, robustness testing, and secure AI deployment pipelines.

📊

MLOps & Deployment

Model lifecycle management, CI/CD for ML, containerized inference, edge AI deployment, and real-time model monitoring.

OEM Experience

Trusted by the world's leading automotive brands

Honda Mazda Mercedes-Benz Suzuki Toyota Honda Mazda Mercedes-Benz Suzuki Toyota

Open to conversations about automotive innovation, cybersecurity strategy, AI research, and business growth.

Automotive Cyber Security AI & ML
Connect on LinkedIn
Press L for LinkedIn