loader

Kenyata Gomo

CSR, Securing Technology

Available for consultancy

(1) Network Security

Configuring firewall & continuous monitoring of your network to identify and respond to any issues in real-time.

(2) Web Application Security

Scanning and managing web applications to ensure that only authorized users and devices can access your assets.

(3) Security Advisory

Help in developing and implementing robust security controls ensures systems safety.

Experience

TCM Security

Trainee 2022 — 2024

Pursuing on-going education & courses.

TCM Security

Trainee 2022 — 2024

Pursuing on-going education & courses.

TCM Security

Trainee 2022 — 2024

Pursuing on-going education & courses.

Technology Stack

Kali

Kali Linux 98%

A Debian-based Linux distribution designed for digital forensics and penetration testing, equipped with a wide range of tools for ethical hacking, vulnerability assessment, and security auditing.


burb

Burp Suite 78%

A comprehensive web application security testing tool used for identifying security vulnerabilities in web applications through manual and automated techniques, assisting in the protection of sensitive data and prevention of cyber attacks.


splunk

Splunk 69%

A powerful SIEM (Security Information and Event Management) platform that collects, indexes, and analyzes machine-generated data from various sources in real-time, enabling the detection and respond to security threats, investigate incidents, and ensure regulatory compliance.


Certs

INE Certified Cloud Associate (ICCA)

INE Security 2024

Cloud computing, management & security.

Full Stack Development

London App Brewery 2024

Web technologies, working with (HCJ) & Control Version.

Complete Linux Training

Udemy 2024

Configuring Linux servers, for multiple usage cases.

FAQ

In cybersecurity for various industries, including finance, healthcare, technology and education. These sectors are particularly vulnerable to cyber threats due to the sensitive information they handle and their critical operations.

By understanding the specific needs and challenges of the client. Then assess their current security posture, identify vulnerabilities, and develop a customized plan to enhance their defenses. While maintain clear communication, provide regular updates, and ensure that the solutions are both effective and sustainable.

I use various tools from SIEMs to VAPTs & what help protect against, detect, and respond to cyber threats effectively. Check Tech Stack Section.

LET'S WORK TOGETHER

Connect now
ID

Professional Services

Assisting your business to achieve its
objectives.

(1) Network Security
(2) Web Application Security
(3) Security Advisory
experience