Six individuals on 16 Aug 2024 received their HTX scholarships during the Singapore Police Force Scholarship and MHA Scholarships Ceremony. Among them was Lim Kai Xian, who will be studying Information Security at the National University of Singapore (NUS). Let’s get to know him better!
Why did you choose HTX?
I chose HTX because I want to use technology to improve the safety and security of Singapore. HTX is the technological foundation for the Home Team and is where technology is created and used to improve the Home Team, whose mission resonates with me.
With my experience, I understand the pain points and places where the usage of technology can improve the Home Team. In addition, during my first few years after graduation, I hope to be able to learn as much as possible, and I believe that HTX is the place that will allow me to learn the most!
Why is Home Team close to you?
Serving in the police force during my National Service has given me a firsthand appreciation for the dedication of those who protect our nation. I'm deeply committed to using my skills to enhance internet safety and contribute to the Home Team's mission.
What are your interests in technology?
I have a broad interest in technology, encompassing both hardware and software development. However, my current passion lies in cybersecurity. I firmly believe that technology should be safe and accessible for everyone, and I'm dedicated to contributing to that goal through my skills and knowledge.
How have you practised your cybersecurity skills?
I've actively sharpened my cybersecurity skills through Capture-the-Flag (CTF) competitions since 2019. My achievements include winning first place in the Brainhack CDDC2021CTF, Gold in WorldSkills Singapore and the eXcellence Award in the HTX Investigators’ Challenge. I also continue to refine my penetration testing skills through platforms like Hackthebox and TryHackMe.
How else have you honed your cybersecurity skills?
In 2022, I completed an internship at NCS where I managed the cybersecurity needs of a client, including firewall configuration, privileged access management, log management, multi-factor authentication implementation, and endpoint system deployment. This experience was a valuable glimpse into real-life cybersecurity work.