Kaspersky vs Bitdefender vs ESET vs eScan
When it comes out to AV protection, four global solutions stands out and here is why...
Read MoreI am driven to be at the top of my game by contributing to meaningful cybersecurity projects that benefit both the community and the organizations I work with now and in the future. I aim to leverage the skills and knowledge I gain daily to build a career in a dynamic, challenging environment that fully utilizes my experience while allowing me to grow as I contribute to its success. Every day in cybersecurity is a challenge, and I am eager to keep learning, developing new technical skills, and applying my analytical and problem-solving abilities to effectively identify and mitigate cyber risks.
A solid foundation in vulnerability assessment, system administration, and modern software development.
Dedicated cybersecurity practitioner with strong analytical skills and a proactive approach to cybersecurity challenges.
Leveraging my knowledge and skills in computer security and forensics to secure and protect organizations' digital assets and sensitive information from cyber threats.
Kabarak University, Nakuru
Completed coursework in cybersecurity fundamentals, network security, operating system security, computer forensics, digital evidence analysis, and cryptography.
Butula School
Always prepared.
FORTINET Institute
The badge recognizes a fundamental understanding of the cyber threat landscape.
Cyber Retaliator Solutions
Technical enablement course in Standss and SMBsecure equipped me with the essential skills and knowledge to effectively utilize and implement this solution.
Kenyatta University Teaching, Referral and Research Hospital (KUTRRH), Nairobi
South-End Tech Limited, Nairobi
Micro Enterprise Support Program Trust (MESPT), Nairobi
Check out my recent blogs on cybersecurity and technology.
When it comes out to AV protection, four global solutions stands out and here is why...
Read MoreA wide range of cybersecurity and IT services tailored to meet your organization's needs.
Skilled in simulating cyberattacks to identify and fix security vulnerabilities in networks, applications, and systems.
Experienced in scanning, analyzing, and reporting on weaknesses across IT infrastructures to prevent exploitation.
Efficient in identifying security breaches and executing technical responses to contain and mitigate threats.
Hands-on experience managing systems, networks, access control, and endpoint security in enterprise environments.
Running awareness training on most basic threats users can be aware of and be on the look-out.
Trained in securing APIs through best practices to protect sensitive data and prevent unauthorized access.
Proficient in managing user authentication, roles, and permissions to enforce security policies.
Well-versed in maintaining security documentation, audit trails, and ensuring adherence to regulatory standards.
Building dynamic web apps faster with Django!
Let's chat! Reach me directly via email below. Don't forget to attach your message about the services you need for immediate response.
Nairobi, Kenya