Patrick Meki

I'm

About

A passionate cybersecurity professional leveraging my knowledge and skills in computer security and forensics to secure and protect organizations' digital assets and sensitive information from cyber threats. I aim to build a career in a dynamic and challenging work environment that allows me to grow professionally while contributing to the success of the company/organization. I am always eager to learn and develop new technical skills that will enhance my ability to identify and mitigate cyber risks, as well as utilize my analytical and problem-solving skills to provide effective solutions to complex cyber challenges.

Cybersecurity Service Provider & an ICT Associate

I am a cybersecurity professional and an ICT associate from Nairobi, Kenya.



An intermediate cybersecurity professional leveraging my skills and knowledge in computer security and forensics to secure and protect organization's digital assets and sensitive information from cyber attacks.

Skills

A cybersecurity enthusiast with a passion for staying ahead of the game. Even though I'm relatively new to the field, I'm committed to learning and keeping up with the latest tech and cybersecurity infastructure trends. From spotting threats to managing risks, I've got a knack for tackling cybersecurity challenges with the unlimited skills and expertise I have gained so far in this field. Below are some of the skills I possess:

Linux Administration Advanced
Vulnerability assessment Intermediate
Incident response Intermediate
Penetration testing Intermediate
Computer networking Intermediate
Django framework Intermediate

Resume

Dedicated cybersecurity practitioner with strong analytical skills combined with a proactive approach to cybersecurity challenges as depicted below:

Summary

Patrick Meki

Passionate cybersecurity professional leveraging my knowledge and skills in computer security and forensics to secure and protect organizations' digital assets and sensitive information from cyber threats.

Education

Bachelor in Computer Security & Forensics

Sep 2020 - April 2024

Kabarak University, Nakuru

Completed coursework in cybersecurity fundamentals, network security, operating system security, computer forensics, digital evidence analysis, and cryptography.

Kenya Certificate of Secondary Education (K.C.S.E)

Nov 2019

Butula School

Always prepared.

Skills & Certificates

Cybersecurity and Emerging Technologies Awareness Training

July 2024

ICT Authority, Kenya

The Training focused on educating participants about the latest trends and threats in cybersecurity and the potential of emerging technologies. The training covered a range of topics including cyber threat landscapes, best practices for safeguarding information, and the impact of new technologies such as AI, blockchain, and IoT on cybersecurity. Participants gained insights into practical measures for enhancing security posture and staying ahead of cyber threats, making it highly relevant for professionals in the field.

Certification in Cyber Security

Jan 2023 - July 2023

(ISC)2 Organization

This certification introduced me to the fundamentals of cybersecurity critical infastructure and how to identify and mitigate potentials vulnerabilities in an Organization network or system that could be exploited by attackers.

Professional Experience

ICT Infrastrcture Officer Intern

October 2024 - Present

Micro Enterprise Support Program Trust (MESPT), Nairobi

Roles & Responsibilities
  • Proficiently utilizing FortiSIEM, a SIEM tool implemented by MESPT for security information and event management, ensuring robust monitoring and threat detection.
  • Configures and maintains VoIP phones to facilitate efficient communication across the organization.
  • Administers Active Directory services across multiple versions (Windows R8, 2008, R12, 2012), ensuring secure and efficient user management.
  • Conducts regular server maintenance and checks to ensure optimal performance and uptime
  • Manages Adobe E-sign processes to streamline document signing and approval workflows.
  • Oversees Bitdefender security solutions to protect the organization’s digital assets from threats.
  • Administers Microsoft 365 services, including user management, security configurations, and application support.
  • Creates and maintains detailed documentation of IT support procedures and policies to ensure consistency and compliance.
  • Offers support and minor configurations within Salesforce to enhance CRM functionalities.
  • Provides comprehensive IT support, including troubleshooting and resolving issues related to printers and other peripherals.
  • General ICT support, i.e Printer installation, Helpdesk support.

Cybersecurity Attachee

May 2023 - Aug 2023

Zydii Limited, Nairobi

Roles & Responsibilities
  • Vulnerability assessment and penetration testing.
  • Performing device configuration reviews to enhance network security.
  • Implementation of Information security policies and procedures to ensure the company aligns with the best industry standards.
  • Collaboration with other tech teams to solve problems fostering a culture of cybersecurity awareness and proactive risk mitigations

Portfolio

My portfolio showcases my involvement in the development of two significant projects, The Child Protect Online System and The Evidence Management System. Through these endeavors, I've demonstrated my ability to contribute to impactful solutions addressing crucial issues in cybersecurity and law enforcement.

  • All
  • CPS
  • EMS

Services

As a computer security and forensics professional, I am not limited to cybersecurity operations alone, I do offer a wide range of services based on the customer needs and preference. Below are some of the services that I offer to my employer and any other potential clients:

Penetration Testing

Analyzing an organization or company network security, its systems and any other critical infrastructure related to the company to look out for any potential vulnerabilities that could be exploited by attackers.

Vulnerability Assessment

Similar to pen testing with an aim to scan systems for weaknesses using automated tools search for security holes attackers might exploit. The process identifies, prioritizes (ranks by severity), and reports these weaknesses, allowing organizations/companies to fix them before they become a problem.

Incident Response

Entails the action plan for a cyberattack. It focuses on quickly identifying the security breach, containing the damage, eliminating the threat, recovering affected systems, and learning from the incident to prevent future attacks.

Computer Networking

Involves the protection of computer networks as the backbone of the digital world. Like a secure city, networks use firewalls, segmentation, encryption, and monitoring to safeguard critical infrastructure. This layered approach helps keep data safe and minimizes damage from cyberattacks.

Policy Development

Development of policies with clear rules, less risks to businesses help to set expectations for employees and reduce legal risks for organizations. This empowers employees to make good decisions and promote a positive work environment. Regularly reviewed policies keep everyone on the same page.

Web Development

Building dynamic web apps faster with Django! I specialize in Django web development, leveraging Python's power and Django's features to create secure and scalable web applications. I can handle user logins, databases, and routing, freeing you to focus on unique functionalities. Let's discuss your project and see how Django can bring your vision to life.

Contact

Let's chat! Reach me out via my email or phone attached below. Also, don't forget to attach your message about the kind of services you need for faster response. Thank you.

Location:

Nairobi, Kenya

Loading
Your message has been sent. Thank you!