The Rise of AI-Powered Phishing
As cybercriminals embrace artificial intelligence, phishing has entered a terrifying new era, think perfectly crafted emails, deepfake voices, and weaponized chatbots. In this blog, I break down how AI is …
Read MoreI'm
A passionate cybersecurity professional leveraging my knowledge and skills in computer security and forensics to secure and protect organizations' digital assets and sensitive information from cyber threats. I aim to build a career in a dynamic and challenging work environment that allows me to grow professionally while contributing to the success of the company/organization. I am always eager to learn and develop new technical skills that will enhance my ability to identify and mitigate cyber risks, as well as utilize my analytical and problem-solving skills to provide effective solutions to complex cyber challenges.
I am a cybersecurity professional and an ICT associate from Nairobi, Kenya.
An intermediate cybersecurity professional leveraging my skills and knowledge in computer security and forensics to secure and protect organization's digital assets and sensitive information from cyber attacks.
A cybersecurity enthusiast with a passion for staying ahead of the game. Even though I'm relatively new to the field, I'm committed to learning and keeping up with the latest tech and cybersecurity infastructure trends. From spotting threats to managing risks, I've got a knack for tackling cybersecurity challenges with the unlimited skills and expertise I have gained so far in this field. Below are some of the skills I possess:
Dedicated cybersecurity practitioner with strong analytical skills combined with a proactive approach to cybersecurity challenges as depicted below:
Passionate cybersecurity professional leveraging my knowledge and skills in computer security and forensics to secure and protect organizations' digital assets and sensitive information from cyber threats.
Kabarak University, Nakuru
Completed coursework in cybersecurity fundamentals, network security, operating system security, computer forensics, digital evidence analysis, and cryptography.
Butula School
Always prepared.
ICT Authority, Kenya
The Training focused on educating participants about the latest trends and threats in cybersecurity and the potential of emerging technologies. The training covered a range of topics including cyber threat landscapes, best practices for safeguarding information, and the impact of new technologies such as AI, blockchain, and IoT on cybersecurity. Participants gained insights into practical measures for enhancing security posture and staying ahead of cyber threats, making it highly relevant for professionals in the field.
(ISC)2 Organization
This certification introduced me to the fundamentals of cybersecurity critical infastructure and how to identify and mitigate potentials vulnerabilities in an Organization network or system that could be exploited by attackers.
South-End Tech Limited, Nairobi
Micro Enterprise Support Program Trust (MESPT), Nairobi
Check out my recent articles and insights on cybersecurity and technology.
As cybercriminals embrace artificial intelligence, phishing has entered a terrifying new era, think perfectly crafted emails, deepfake voices, and weaponized chatbots. In this blog, I break down how AI is …
Read MoreThe NVIDIA RTX 4090 represents the cutting edge of consumer graphics technology, setting new standards for gaming and professional workloads. Released in October 2022, this flagship GPU has redefined what's …
Read MoreMy portfolio showcases my involvement in the development of two significant projects, The Child Protect Online System and The Evidence Management System. Through these endeavors, I've demonstrated my ability to contribute to impactful solutions addressing crucial issues in cybersecurity and law enforcement.
As a computer security and forensics professional, I am not limited to cybersecurity operations alone, I do offer a wide range of services based on the customer needs and preference. Below are some of the services that I offer to my employer and any other potential clients:
Skilled in simulating cyberattacks to identify and fix security vulnerabilities in networks, applications, and systems.
Experienced in scanning, analyzing, and reporting on weaknesses across IT infrastructures to prevent exploitation.
Efficient in identifying security breaches and executing technical responses to contain and mitigate threats.
Hands-on experience managing systems, networks, access control, and endpoint security in enterprise environments.
Engaged in continuous learning and certified in various domains including Google, IBM, ISC2, and APISEC.
Trained in securing APIs through best practices to protect sensitive data and prevent unauthorized access.
Proficient in managing user authentication, roles, and permissions to enforce security policies and minimize insider threats.
Well-versed in maintaining security documentation, audit trails, and ensuring adherence to internal policies and regulatory standards.
Let's chat! Reach me out via my email or phone attached below. Also, don't forget to attach your message about the kind of services you need for faster response. Thank you.