Patrick Meki

I'm

About

A passionate cybersecurity professional leveraging my knowledge and skills in computer security and forensics to secure and protect organizations' digital assets and sensitive information from cyber threats. I aim to build a career in a dynamic and challenging work environment that allows me to grow professionally while contributing to the success of the company/organization. I am always eager to learn and develop new technical skills that will enhance my ability to identify and mitigate cyber risks, as well as utilize my analytical and problem-solving skills to provide effective solutions to complex cyber challenges.

Cybersecurity Service Provider & an ICT Associate

I am a cybersecurity professional and an ICT associate from Nairobi, Kenya.



An intermediate cybersecurity professional leveraging my skills and knowledge in computer security and forensics to secure and protect organization's digital assets and sensitive information from cyber attacks.

Skills

A cybersecurity enthusiast with a passion for staying ahead of the game. Even though I'm relatively new to the field, I'm committed to learning and keeping up with the latest tech and cybersecurity infastructure trends. From spotting threats to managing risks, I've got a knack for tackling cybersecurity challenges with the unlimited skills and expertise I have gained so far in this field. Below are some of the skills I possess:

Linux Administration Advanced
Vulnerability assessment Intermediate
Incident Detection and Response Intermediate
Penetration testing Intermediate
IT Infrastructure Management Intermediate
Cybersecurity Awareness & Training Advanced

Resume

Dedicated cybersecurity practitioner with strong analytical skills combined with a proactive approach to cybersecurity challenges as depicted below:

Summary

Patrick Meki

Passionate cybersecurity professional leveraging my knowledge and skills in computer security and forensics to secure and protect organizations' digital assets and sensitive information from cyber threats.

  • Nairobi, Kenya

Education

Bachelor in Computer Security & Forensics

Sep 2020 - April 2024

Kabarak University, Nakuru

Completed coursework in cybersecurity fundamentals, network security, operating system security, computer forensics, digital evidence analysis, and cryptography.

Kenya Certificate of Secondary Education (K.C.S.E)

Nov 2019

Butula School

Always prepared.

Skills & Certificates

Cybersecurity and Emerging Technologies Awareness Training

July 2024

ICT Authority, Kenya

The Training focused on educating participants about the latest trends and threats in cybersecurity and the potential of emerging technologies. The training covered a range of topics including cyber threat landscapes, best practices for safeguarding information, and the impact of new technologies such as AI, blockchain, and IoT on cybersecurity. Participants gained insights into practical measures for enhancing security posture and staying ahead of cyber threats, making it highly relevant for professionals in the field.

Certification in Cyber Security

Jan 2023 - July 2023

(ISC)2 Organization

This certification introduced me to the fundamentals of cybersecurity critical infastructure and how to identify and mitigate potentials vulnerabilities in an Organization network or system that could be exploited by attackers.

Professional Experience

Cybersecurity & IT Risk Analyst

May 2024 - Present

South-End Tech Limited, Nairobi

Roles & Responsibilities
  • Testing and evaluating cybersecurity products with partners for improvement suggestions.
  • Monitoring systems for intrusions and detecting unauthorized activity.
  • Designing/upgrading security systems and analyzing emerging threats.
  • Investigating security alerts and providing incident response with recommendations.
  • Identifying system weaknesses and implementing controls like firewalls and encryption.
  • Assisting in delivering cybersecurity risk solutions and advising staff on threats like spam and malicious emails.
  • Generating cybersecurity reports for both technical and non-technical stakeholders.

ICT Infrastrcture Intern

October 2024 - March 2025

Micro Enterprise Support Program Trust (MESPT), Nairobi

Roles & Responsibilities
  • Proficiently utilizing FortiSIEM, a SIEM tool implemented by MESPT for security information and event management, ensuring robust monitoring and threat detection.
  • Configures and maintains VoIP phones to facilitate efficient communication across the organization.
  • Administers Active Directory services across multiple versions (Windows R8, 2008, R12, 2012), ensuring secure and efficient user management.
  • Conducts regular server maintenance and checks to ensure optimal performance and uptime
  • Manages Adobe E-sign processes to streamline document signing and approval workflows.
  • Oversees Bitdefender security solutions to protect the organization's digital assets from threats.
  • Administers Microsoft 365 services, including user management, security configurations, and application support.
  • Creates and maintains detailed documentation of IT support procedures and policies to ensure consistency and compliance.
  • Offers support and minor configurations within Salesforce to enhance CRM functionalities.
  • Provides comprehensive IT support, including troubleshooting and resolving issues related to printers and other peripherals.
  • General ICT support, i.e Printer installation, Helpdesk support.

Cybersecurity Attachee

May 2023 - Aug 2023

Zydii Limited, Nairobi

Roles & Responsibilities
  • Vulnerability assessment and penetration testing.
  • Performing device configuration reviews to enhance network security.
  • Implementation of Information security policies and procedures to ensure the company aligns with the best industry standards.
  • Collaboration with other tech teams to solve problems fostering a culture of cybersecurity awareness and proactive risk mitigations

Latest Blog Posts

Check out my recent articles and insights on cybersecurity and technology.

The Rise of AI-Powered Phishing

May 22, 2025 Cybersecurity Threat Intelligence

As cybercriminals embrace artificial intelligence, phishing has entered a terrifying new era, think perfectly crafted emails, deepfake voices, and weaponized chatbots. In this blog, I break down how AI is …

Read More

NVIDIA RTX 4090: The Pinnacle of Gaming Graphics Technology

February 25, 2025 Hardware Tech News and Insights

The NVIDIA RTX 4090 represents the cutting edge of consumer graphics technology, setting new standards for gaming and professional workloads. Released in October 2022, this flagship GPU has redefined what's …

Read More

Portfolio

My portfolio showcases my involvement in the development of two significant projects, The Child Protect Online System and The Evidence Management System. Through these endeavors, I've demonstrated my ability to contribute to impactful solutions addressing crucial issues in cybersecurity and law enforcement.

  • All
  • CPS
  • EMS

Services

As a computer security and forensics professional, I am not limited to cybersecurity operations alone, I do offer a wide range of services based on the customer needs and preference. Below are some of the services that I offer to my employer and any other potential clients:

Penetration Testing

Skilled in simulating cyberattacks to identify and fix security vulnerabilities in networks, applications, and systems.

Vulnerability Assessment

Experienced in scanning, analyzing, and reporting on weaknesses across IT infrastructures to prevent exploitation.

Incident Detection & Response

Efficient in identifying security breaches and executing technical responses to contain and mitigate threats.

IT Infrastructure Management

Hands-on experience managing systems, networks, access control, and endpoint security in enterprise environments.

Cybersecurity Awareness & Training

Engaged in continuous learning and certified in various domains including Google, IBM, ISC2, and APISEC.

API Security

Trained in securing APIs through best practices to protect sensitive data and prevent unauthorized access.

Identity and Access Management

Proficient in managing user authentication, roles, and permissions to enforce security policies and minimize insider threats.

Security Compliance & Audit Support

Well-versed in maintaining security documentation, audit trails, and ensuring adherence to internal policies and regulatory standards.

Web Development

Building dynamic web apps faster with Django!

Contact

Let's chat! Reach me out via my email or phone attached below. Also, don't forget to attach your message about the kind of services you need for faster response. Thank you.

Location:

Nairobi, Kenya

Loading
Your message has been sent. Thank you!