About
A passionate cybersecurity professional leveraging my knowledge and skills in computer security and forensics to secure and protect organizations' digital assets and sensitive information from cyber threats. I aim to build a career in a dynamic and challenging work environment that allows me to grow professionally while contributing to the success of the company/organization. I am always eager to learn and develop new technical skills that will enhance my ability to identify and mitigate cyber risks, as well as utilize my analytical and problem-solving skills to provide effective solutions to complex cyber challenges.
Cybersecurity Service Provider & an ICT Associate
I am a cybersecurity professional and an ICT associate from Nairobi, Kenya.
- Phone: +254 111923456
- Email: partymeki@gmail.com
An intermediate cybersecurity professional leveraging my skills and knowledge in computer security and forensics to secure and protect organization's digital assets and sensitive information from cyber attacks.
Skills
A cybersecurity enthusiast with a passion for staying ahead of the game. Even though I'm relatively new to the field, I'm committed to learning and keeping up with the latest tech and cybersecurity infastructure trends. From spotting threats to managing risks, I've got a knack for tackling cybersecurity challenges with the unlimited skills and expertise I have gained so far in this field. Below are some of the skills I possess:
Resume
Dedicated cybersecurity practitioner with strong analytical skills combined with a proactive approach to cybersecurity challenges as depicted below:
Summary
Patrick Meki
Passionate cybersecurity professional leveraging my knowledge and skills in computer security and forensics to secure and protect organizations' digital assets and sensitive information from cyber threats.
- Nairobi, Kenya
- +254 111923456
- partymeki@gmail.com
Education
Bachelor in Computer Security & Forensics
Sep 2020 - April 2024
Kabarak University, Nakuru
Completed coursework in cybersecurity fundamentals, network security, operating system security, computer forensics, digital evidence analysis, and cryptography.
Kenya Certificate of Secondary Education (K.C.S.E)
Nov 2019
Butula School
Always prepared.
Skills & Certificates
Cybersecurity and Emerging Technologies Awareness Training
July 2024
ICT Authority, Kenya
The Training focused on educating participants about the latest trends and threats in cybersecurity and the potential of emerging technologies. The training covered a range of topics including cyber threat landscapes, best practices for safeguarding information, and the impact of new technologies such as AI, blockchain, and IoT on cybersecurity. Participants gained insights into practical measures for enhancing security posture and staying ahead of cyber threats, making it highly relevant for professionals in the field.
Certification in Cyber Security
Jan 2023 - July 2023
(ISC)2 Organization
This certification introduced me to the fundamentals of cybersecurity critical infastructure and how to identify and mitigate potentials vulnerabilities in an Organization network or system that could be exploited by attackers.
Professional Experience
ICT Infrastrcture Officer Intern
October 2024 - Present
Micro Enterprise Support Program Trust (MESPT), Nairobi
Roles & Responsibilities
- Proficiently utilizing FortiSIEM, a SIEM tool implemented by MESPT for security information and event management, ensuring robust monitoring and threat detection.
- Configures and maintains VoIP phones to facilitate efficient communication across the organization.
- Administers Active Directory services across multiple versions (Windows R8, 2008, R12, 2012), ensuring secure and efficient user management.
- Conducts regular server maintenance and checks to ensure optimal performance and uptime
- Manages Adobe E-sign processes to streamline document signing and approval workflows.
- Oversees Bitdefender security solutions to protect the organization’s digital assets from threats.
- Administers Microsoft 365 services, including user management, security configurations, and application support.
- Creates and maintains detailed documentation of IT support procedures and policies to ensure consistency and compliance.
- Offers support and minor configurations within Salesforce to enhance CRM functionalities.
- Provides comprehensive IT support, including troubleshooting and resolving issues related to printers and other peripherals.
- General ICT support, i.e Printer installation, Helpdesk support.
Cybersecurity Attachee
May 2023 - Aug 2023
Roles & Responsibilities
- Vulnerability assessment and penetration testing.
- Performing device configuration reviews to enhance network security.
- Implementation of Information security policies and procedures to ensure the company aligns with the best industry standards.
- Collaboration with other tech teams to solve problems fostering a culture of cybersecurity awareness and proactive risk mitigations
Portfolio
My portfolio showcases my involvement in the development of two significant projects, The Child Protect Online System and The Evidence Management System. Through these endeavors, I've demonstrated my ability to contribute to impactful solutions addressing crucial issues in cybersecurity and law enforcement.
Services
As a computer security and forensics professional, I am not limited to cybersecurity operations alone, I do offer a wide range of services based on the customer needs and preference. Below are some of the services that I offer to my employer and any other potential clients:
Penetration Testing
Analyzing an organization or company network security, its systems and any other critical infrastructure related to the company to look out for any potential vulnerabilities that could be exploited by attackers.
Vulnerability Assessment
Similar to pen testing with an aim to scan systems for weaknesses using automated tools search for security holes attackers might exploit. The process identifies, prioritizes (ranks by severity), and reports these weaknesses, allowing organizations/companies to fix them before they become a problem.
Incident Response
Entails the action plan for a cyberattack. It focuses on quickly identifying the security breach, containing the damage, eliminating the threat, recovering affected systems, and learning from the incident to prevent future attacks.
Computer Networking
Involves the protection of computer networks as the backbone of the digital world. Like a secure city, networks use firewalls, segmentation, encryption, and monitoring to safeguard critical infrastructure. This layered approach helps keep data safe and minimizes damage from cyberattacks.
Policy Development
Development of policies with clear rules, less risks to businesses help to set expectations for employees and reduce legal risks for organizations. This empowers employees to make good decisions and promote a positive work environment. Regularly reviewed policies keep everyone on the same page.
Web Development
Building dynamic web apps faster with Django! I specialize in Django web development, leveraging Python's power and Django's features to create secure and scalable web applications. I can handle user logins, databases, and routing, freeing you to focus on unique functionalities. Let's discuss your project and see how Django can bring your vision to life.
Contact
Let's chat! Reach me out via my email or phone attached below. Also, don't forget to attach your message about the kind of services you need for faster response. Thank you.