About me

IT support specialist turned cybersecurity professional, blending endpoint management, network troubleshooting, and workflow automation with modern security practice. I focus on SIEM-driven monitoring, incident response, and secure architecture across Windows, macOS, and Linux, guided by NIST CSF/ISO 27001. Comfortable bridging users and engineering teams, I prioritize practical controls that protect data, systems, and people.

Areas of Expertise

  • Endpoint imaging, MDM and hardening (SCCM, Intune, Jamf); patching and secure configuration
  • SIEM-driven monitoring, log analysis, threat detection, and incident response
  • Network operations: routing/switching, VPNs/firewalls, segmentation (VLANs), and maintenance windows
  • Identity and infrastructure: Active Directory, DHCP, backups, virtualization (Hyper‑V, ESXi)
  • Security controls and compliance: NIST CSF, ISO 27001; vulnerability assessment and remediation

Tools & Platforms

  • Splunk
  • IBM QRadar
  • Microsoft Defender
  • Kaspersky
  • Nmap
  • Wireshark
  • SCCM
  • Microsoft Intune
  • Jamf
  • Active Directory
  • ServiceNow
  • ConnectWise
  • Veeam
  • Azure
  • Hyper‑V
  • ESXi

Core Skills & Expertise

Cybersecurity Skills

  • OSINT (Open‑Source Intelligence)
  • Log analysis (SIEM, Linux, Wireshark)
  • Incident response
  • Vulnerability scanning (Shodan, Nmap, Zenmap)
  • SIEM administration (Splunk, IBM QRadar)
  • Digital forensics (FTK Imager, Autopsy)
  • Security frameworks (NIST CSF, ISO 27001, MITRE ATT&CK)

Networking Skills

  • Router/switch configuration, VPN, firewalls, Wi‑Fi APs
  • Network troubleshooting
  • LAN/WAN design
  • Subnetting and IP addressing
  • Network segmentation (VLANs)

IT Skills

  • Network troubleshooting
  • Router/switch configuration, VPN, firewalls, Wi‑Fi APs
  • Network segmentation (VLANs)
  • Windows Server administration (Active Directory, DHCP, backup, MySQL)
  • macOS support (Jamf)
  • Windows 10/11 and Linux imaging & support
  • Backup and recovery (Veeam, Azure)
  • Virtualization (Hyper‑V, ESXi)
  • IT support and ticketing (Microsoft Dynamics)
  • Mobile device management (Microsoft Intune, Jamf)
  • Endpoint protection (Microsoft Defender, Kaspersky)
  • Remote monitoring and management (ConnectWise)
  • IT workflows and automation (ServiceNow)
  • Software deployment (SCCM, PXE boot)

Resume

Education

  1. Master of Science in Cybersecurity

    Aug 2024 — April 2026

    Grand Valley State University — Allendale, Michigan

    Developed advanced skills encompassing core cybersecurity principles (secure software engineering, applied cryptography, information security, data security and privacy, digital forensics, computer networking), alongside practical expertise in scripting, ethical hacking, leveraging machine learning for security analysis, and network monitoring techniques.

  2. Bachelor of Science in Information Technology

    Sep 2015 — Nov 2019

    Meru University of Science and Technology — Kenya

    Developed a strong foundation in ICT and software design/development, enabling the modeling, specification, design, and implementation of computer-based systems. Skills include coding, networking fundamentals, website design principles, system design methodologies, and database concepts.

Professional Experience

  1. Desktop Support Technician

    Aug 2024 — April 2025

    GVSU IT Services — Allendale, Michigan

    • Imaged macOS, Linux, and Windows using PXE, SCCM, and USB
    • Troubleshot Windows/macOS, printers, Outlook, network/VPN, internet access, and hardware issues
    • Delivered technical training; installed and updated software; managed MDM
    • Provided user support via phone, email, and ticketing systems
    • Escalated complex issues to specialized teams
    • Resolved escalated incidents from first‑level support
    • Managed devices with Jamf and Microsoft Intune
    • Deployed software and OS remotely with SCCM
    • Performed root cause analysis of escalated tickets and incidents
    • Administered users and devices with Windows Active Directory
  2. IT Support Specialist

    February 2023 — July 2024

    KCB Group — Nairobi, Kenya

    • Documented technical support, service requests, and incident resolutions in ticketing systems
    • Served as first point of contact across departments, resolving hardware, software, and connectivity issues in a fast‑paced banking environment
    • Collaborated with senior IT staff to troubleshoot complex issues and escalated unresolved cases
    • Worked closely with IT Security to provide technical expertise on threats affecting bank information assets
    • Delivered end‑user security awareness training on phishing and data protection best practices
    • Partnered with IT Security on incident response, phishing campaigns, vulnerability assessments, and security audits
  3. IT Support Specialist & Customer Service Manager

    September 2019 — January 2023

    Veda Waste Engineering & Veda Motors Ltd — Nairobi, Kenya

    • Designed and managed databases, analytics, and ICT systems to enable data collection, trend analysis, and security upgrades
    • Managed customer service representatives and ensured compliance with standards
    • Provided technical support and network administration, including software installation, troubleshooting, and secure infrastructure configuration
    • Led IT operations and staff training; coordinated company‑wide IT needs; supervised junior staff; developed strategies aligned to business objectives

Portfolio

Certifications

  • Certified Cloud Security Engineer (CCSE)

    Status: In progress

  • Google Cybersecurity

    Completion date: Dec 2025

  • Network Security

    Gained technical skills in network hardening practices that strengthen network systems over time. To prevent security breaches this involves securing applications over cloud systems and addressing the unique security challenges posed by cloud infrastructures.

  • Play It Safe: Manage Security Risks

    Gained skills on CISSP’s eight security domains; primary threats, risks, and vulnerabilities to business operations are identified and defined, along with a discussion of the threats, risks, and vulnerabilities entry-level security analysts focus on most. Additionally, NIST’s Risk Management Framework (RMF).

  • System Security Certified Professional (SSCP)

    Completion date: Sep 2025 • Issuer: ISC2

    Gained advanced technical skills and knowledge to implement, monitor, and administer IT infrastructure using security best practices, policies, and procedures across access controls, risk management, incident response, cryptography, network security, and systems/application security.

  • Cloud Security

    Completion: Jan 2025

    Gained skills on different cloud platforms.

Projects

  • Digital Forensics and Investigation

    Jan-April 2025

    Proficiently utilized industry-standard tools, including Autopsy and FTK Imager, to conduct comprehensive digital evidence acquisition, imaging, and integrity verification using hashing (MD5/SHA). Demonstrated expertise in multi-OS forensics, analyzing system artifacts from Windows Registry and performing live process and file analysis using Linux command-line tools. Gained hands-on experience in advanced analysis techniques, successfully performing keyword searching, data carving, and deleted file recovery from forensic images. Possess the ability to reconstruct event timelines and investigate user activity by analyzing metadata, file properties, and complex email headers. Applied structured investigative methodologies to a full case study (CTF), proving competence in managing and solving real-world digital forensics challenges.

  • Cybersecurity Homelab Deployment

    Nov 2024

    Designed and configured a personal cybersecurity lab to simulate real-world attack and defense scenarios & Exposing the perils to Internet Privacy through OSINT.

Blog

Coming Soon

Contact

Contact Form