Curriculum Vitae

Ivan Setiawan
I am a fresh graduate in Information Systems from Telkom University, 22 years old. I have strong time management skills, a creative mindset, and a responsible nature. I am proactive and reliable, with a great interest in technology and continuous learning.
September 2024
Telkom University
S1 • Sistem Informasi • IPK 3.67
Agustus 2023 - Desember 2023
Business Analyst
PT Gits Indonesia • Magang
Participated in the MBKM program through the Certified Internship and Independent Study (MSIB).
Identifying and translating business requirements into technical specifications for application development while ensuring solutions meet high standards and align with business objectives through effective collaboration with development teams and stakeholders.
Media
Juni 2023 - Agustus 2023
Data Engineer
PT Telekomunikasi Indonesia (Persero) Tbk • Magang
Directly involved in a project to create a bot-based data collection tool and extract, transform, and load data (ETL) into a cloud-based data warehouse as a requirement to fulfill agent performance analysis in Regional Operation Center (ROC), specifically in Assurance and Fulfillment divisions
Media
Februari 2023 - Juni 2023
Asisten Praktikum Manajemen Jaringan Komputer
Telkom University • Part Time
Responsible for making practicum modules and teaching modules about computer network management such as Configuring Static Routing, VLANs, Access Control Lists and DHCP Routers.
Media
September 2022 - Januari 2023
Asisten Praktikum Desain Jaringan Komputer
Telkom University • Part Time
Responsible for making practicum modules and teaching modules about computer network design such as basic configuration, subnetting and IPV4/IPV6 addressing
Media
Desember 2023
Cyber Security Analyst
Lembaga Sertifikasi Profesi Informatika - BNSP • LSP-INF.000.116.2023
Implementing information security principles for data protection, internet networks, and electronic transactions. Managing security policies, access controls, asset records, and software installations while identifying access control attacks.