Schleswig

Schleswig

$15/hr
Cybersecurity Analyst and Software developer
Reply rate:
-
Availability:
Hourly ($/hour)
Location:
Nairobi, Nairobi, Kenya
Experience:
2 years
Ludwig Murimi Munyi, P.O Box-, Nairobi, Kenya Phone number: - LinkedIn: https://www.linkedin.com/in/ludwig-murimi/ Email:- Information security Analyst Cyber security and information security professional actively looking for a cyber security role. Building my skills in protecting an organization's information systems by identifying, analyzing, and mitigating security threats and specializing in threat detection, incident response, governance, risk assessment, and compliance (GRC) to ensure the confidentiality, integrity, and availability of critical data as technical areas of Information and data security. Practical Projects Skills: Live SOC Monitoring(LetsDefend): ●​ Monitored real time security alerts,utilizing network security measures, ●​ Conducted security auditing to ensure compliance with standards ●​ Participated in Security Operations Center for incident response ●​ Performed triage environments. ●​ Improved incident response time by 25% in virtual SOC environments ●​ Developed Comprehensive security strategy. ●​ Reduced false positives by 30% during Live SOC Monitoring through efficient alert triage Live SOC Monitoring and simulations(Cybrary): ●​ Engaged in security monitoring to detect and respond to security incidents. ●​ Security analytics for potential security breaches. ●​ Performed log analysis for detecting threats. ●​ Reduced false positives by 43% during Live SOC Monitoring through efficient alert triage ●​ Created visual reports that informed team actions and improved SOC workflow ●​ Implemented Security Information Event Management(SIEM) solutions ●​ Security Operations Center analysis ●​ Improved incident response time by 30% in virtual SOC environments SOC Analyst Simulations (TryHackMe): ●​ Investigated real-world security incidents in a simulated SOC environment ●​ Detecting threats and responding to cyber-attacks ●​ Created security documentation during security process ●​ Engaged in security risk management to mitigate potential threats ●​ Utilized wireshark for network traffic analysis ●​ Reduced false positives by 32% during Live SOC Monitoring through efficient alert triage ●​ Promoted cyber security best practices for security. ●​ Improved incident response time by 35% in virtual SOC environment ●​ Translated analytical insights into measurable security improvements ●​ Implemented Security Information Event Management tools for incidents. CyberDefenders Blue Team Labs Participation: ●​ Vulnerability Assessment and Management. ●​ Automated security processes to improve incident response ●​ Managed security Incident management to ensure effective responses ●​ Leveraged threat intelligence to stay at bay on emerging cyber threats ●​ Translated analytical insights into measurable security improvements ●​ Performing security testing ●​ Conducted digital forensics and Malware analysis to investigate security breaches. KC7(KQL101) Microsoft Azure Hacking labs: ●​ Ensured Security Compliance with industry regulations ●​ Performed application security assessment to identify weaknesses ●​ Conducted risk assessment and management to identify weaknesses ●​ Implemented Azure Security measures to protect cloud resources, ●​ Performed threat analysis to understand potential risks. ●​ Conducted Log Analysis and Visualization to identify potential security breaches. ●​ Implemented cloud security measures to protect data in the Azure cloud. ●​ Red & Blue Teaming Support ●​ Improved incident response time by 42% in virtual SOC environments ●​ Reduced false positives by 51% during Live SOC Monitoring through efficient alert triage ●​ Used log analysis to detect anomalies and enhance detections ●​ Established Security protocols to mitigate vulnerabilities ●​ Applied data-driven decisions to improve threat identification and response strategies ●​ Created virtual reports that informed teams actions and improved SOC workflow Cisco (Ethical hacking): ●​ Performed Security threat assessments to identify potential risks. ●​ Implemented network security measures for protection of assets. ●​ Conducted penetration testing for weakness vulnerability. ●​ Established security governance to mitigate risks ●​ Configured cisco security devices for network security. ●​ Conducted vulnerability assessments to identify weaknesses in systems ●​ Maintained high security compliance with industry regulations and standards ●​ Engaged in security monitoring to detect and respond to security incidents ●​ Documentation of reports and findings to improve response strategies Trainings and Certification: Security Operations Center, (Cybrary): ●​ Excellent time management and task prioritization in remote learning and project delivery. ●​ Project delivery in remote and hybrid environments in live SOC monitoring and SOC analysis simulations. ●​ Adaptable and proactive in virtual environments ensuring consistent performance and accountability of security reviews. ●​ Demonstrated Strong self-motivation and discipline during self paced program. ●​ Experience in Documenting incidents and reporting findings in remote SOC Settings Google Cyber Security Certificate: ●​ Hands-on skills labs in linux, MySQl, and Python. ●​ Collaborate with remote teams using Google Meet, Zoom and Slack. ●​ Maintained clear communications and teamwork during Virtual Security Operations Center simulations and incident response ●​ Demonstrated Strong self-motivation and discipline during self paced program ●​ Excellent time management and task prioritization in remote learning and project delivery. Stack-up: ●​ Developing and creating basic web application ●​ JavaScript “ReactJS, NodeJS, AngularJS” ●​ HTML5 and CSS ●​ Databases “MongoDB, MySql, Oracle and Postgresql ” ●​ Python “Django, Flask”. Skills: ●​ ●​ ●​ ●​ ●​ ●​ ●​ ●​ ●​ ●​ ●​ Threat detection, Incident response, Governance, Risk Assessment and management, and Compliance (GRC), Third Party Risk Management Identify and Access Management(IAM), Security Education and Awareness. Vulnerability assessment and management Security Architecture Cloud Security management Data loss Protection and Recovery techniques Network traffic analysis and Assessment Intrusion, Intrusion Detection & Prevention systems( IDS & IPS ), Databases “MySql, MongoDB, Postgresql, KQL101” assessment, management and analysis. Education and Professional Qualification: ●​ Diploma in Certified Information Systems Security Professional ( CISSP - 2019 ) Alison Study Group, February 2025 - Present ●​ Diploma in Digital Forensics - Alison Study Group, February 2025 . ●​ Diploma in ISO 27001:2022 Information Security Management System (ISMS) Alison Study Group, January 2025 . ●​ Certified Cyber Security Analyst, Inceptor Institute of Technology – July 2024. ●​ Certified Software Engineer, Moringa School - August 2022. ●​ Certified in Computer Packages, GlobalSide College - November 2021. LANGUAGES: ●​ English ●​ Kiswahili
Get your freelancer profile up and running. View the step by step guide to set up a freelancer profile so you can land your dream job.