CTI Analyst · Penetration Tester · Cloud Security Engineer
Securing systems. Hunting threats. Building resilience.
I like to think of myself as a "three-lane highway" professional: one lane paved by my early experience in telecommunications engineering, another strengthened by my expertise in cybersecurity and risk management, and the third grounded in customer service excellence.
Three interconnected domains — with cybersecurity at the center of everything I build.
From CTI analysis and MITRE ATT&CK-mapped threat reporting to hands-on penetration testing. Tracking APT campaigns, running VAPT programs, operating SIEM environments, and responding to incidents.
Architecting and securing cloud environments on Azure and AWS. Hybrid cloud configurations, secure server deployments, SIEM integration, and web application security.
Enterprise data center operations with full GRC compliance — ISO 27001, PCI-DSS, BCMS. Led VAPT programs, managed Active Directory, and maintained 99.9% uptime at PAIX.
From telecom engineering in Nairobi to cybersecurity research in Connecticut.
Real builds, real results — from cloud-native security labs to AI navigation platforms.
A full-stack AI navigation platform built for the DARPA LINC challenge. Integrates quantum navigation via Q-CTRL Ironstone Opal, PyTorch RL route optimization, and FALCON safe-zone evaluation.
Cloud-based cybersecurity lab on Azure using Microsoft Sentinel. Live honeypot, log forwarding pipeline, and real-time geo-visualization of global login attempts.
Collaborative hackathon project at Quinnipiac University. Also competed in Cyber Track executive breach scenario simulation placing 2nd.
Active in the regional cybersecurity community — from executive CxO forums to hands-on hacking events.
Organized by CxO Security Forum. Brings together regional Cyber Execs, InfoSec Association leaders, government agency representatives, and industry luminaries.
Quinnipiac University — Served as Student Ambassador Volunteer alongside government agency leaders and industry luminaries.
New Haven's premier 24-hour MLH hackathon at the University of New Haven. Sponsored by Microsoft, FactSet, and IBM.
Connecticut's community-driven security conference with CTF competitions, workshops, and elite speakers.
Competed in Spring HackQU coding track and Cyber Track executive breach scenario simulation.
Coding Track Repo →Active on Hack The Box pursuing CPTS. Write-ups for retired machines and CTF challenges on GitHub.
Currently pursuing CPTS from Hack The Box and CEH from EC-Council.
Long-term: threat intelligence at scale, building security programs across the African tech ecosystem, and pushing the boundaries of AI-assisted security operations.
Open to cybersecurity roles, research collaborations, CTF teams, and speaking opportunities.