Centralized Authentication System using Single Sign-On (SSO)
Summary
Developed a secure web-based SSO system for multiple cybersecurity tools, integrating role-based access control and session management to enhance security and user experience.
Detail-oriented Jr. Cybersecurity Analyst with practical experience in network security, vulnerability management, and system administration, complemented by a strong foundation in secure network design and threat detection. Proven ability to conduct risk assessments, implement secure communication protocols, and provide technical support, eager to apply expertise in cloud infrastructure migration and digital security for non-profit journalism organizations.
Security Systems Administrator
→
Summary
Security Systems Administrator at LayerFF.tech Cybersecurity Platform, responsible for implementing robust access controls and ensuring system integrity for remote development teams.
Highlights
Implemented role-based access control (RBAC) and user authentication mechanisms, enhancing system integrity and security posture.
Monitored system logs, IDS alerts, and access records for anomalies, escalating incidents to maintain continuous security.
Managed SSH key policies, privileged access, and secure configuration baselines, fortifying remote development environments.
Collaborated with developers and researchers to ensure privacy and security compliance, meeting industry standards.
Freelance Cybersecurity Consultant
Uganda, Uganda
→
Summary
Freelance Cybersecurity Consultant providing comprehensive cybersecurity risk assessments and secure communication solutions for NGOs and individuals in Uganda.
Highlights
Conducted cybersecurity risk assessments for NGOs and individuals, aligning findings with established cybersecurity frameworks to identify and mitigate vulnerabilities.
Implemented secure communication setups using Signal and ProtonMail, training over 50 users on digital hygiene and vulnerability management.
Managed incident response by guiding users through account compromise recovery processes and documenting protocols, reducing potential impact.
Collaborated directly with clients to review security findings, document action items, and support vulnerability scanning/remediation tracking.
Cybersecurity and Networking Intern
Uganda, Uganda
→
Summary
Cybersecurity and Networking Intern at MANTRA TECHNOLOGIES, responsible for configuring and maintaining critical network infrastructure and supporting secure network operations.
Highlights
Configured and maintained essential network hardware, including routers, switches, firewalls, and servers, ensuring robust network operations.
Managed LAN, WAN, VPN, and wireless networks, adhering to cybersecurity frameworks and industry best practices.
Diagnosed and resolved network connectivity, hardware, and software issues, providing critical network and security troubleshooting.
Provided technical support to end users and IT teams, contributing to comprehensive documentation for network security protocols.
Bachelor
Cybersecurity and Networking
Incident Response, Risk Assessment, Threat Analysis, Vulnerability Management, Firewalls, SIEM Tools, Endpoint Detection, Cybersecurity Frameworks, Anonymity Tools, Circumvention Technologies, Secure Network Design, Network Security Protocols, Digital Hygiene, Vulnerability Scanning, Remediation Tracking, RBAC, User Authentication, System Integrity, IDS Alerts, SSH Key Policies, Privileged Access, Secure Configuration Baselines, Privacy and Security Compliance, OAuth2, JWT, SSO, VPN, DDoS Protection, Digital Security.
Windows, MacOS, Linux Systems, Command Line, SSH, Basic Administration.
Routers, Switches, Servers, LAN, WAN, Wireless Networks, Network Troubleshooting, Web Hosting Concepts, VPS, DNS, SSL/TLS, Email Hosting (MX records, SPF/DKIM), Cloud Infrastructure, Hosting Providers, Migration Planning, Technical Documentation, WordPress, Nextcloud, Docker, Nginx, CMS Migration.
PostgreSQL.
Python (Flask).
Client Training, Digital Security Awareness, Secure Communication, Data Protection, Remote Collaboration, English Communication, Technical Documentation, Member Communication, Stakeholder Engagement.
Eagerness To Learn, Entry-level Certifications, Healthcare IT Exposure.
ISC2 Member.
Hack the Box CTF Challenges, TryHackMe CTF Challenges.
Journalism, Media Freedom, Digital Security, Open Source, Non-profit Support.
Summary
Developed a secure web-based SSO system for multiple cybersecurity tools, integrating role-based access control and session management to enhance security and user experience.