33 candidates for "Ethical hacking / Penetration testing"
Information Security Officer with 4+ years of experience safeguarding critical infrastructure across research and enterprise environments. Currently leading cybersecurity operations at the Kenya Marine and…
API and application security
Auditing and policy development
Cloud security (AWS, Azure, GCP)
Compliance (ISO 27001, NIST, GDPR, PCI-DSS)
Cyber threat intelligence (CTI)
Digital forensics
Ethical hacking / Penetration testing
Governance, Risk, and Compliance (GRC)
Identity and Access Management (IAM)
Incident response & forensics
Network and infrastructure security
Risk management
Security Operations & Incident Response (Blue Team)
Threat detection & analysis (SIEM, EDR, XDR)
Web, mobile, and network testing
Zero Trust & Secure Architecture
Lauryn Wangui Gitahi is a cybersecurity professional with 4+ years of experience in information security, GRC, and risk management across banking and NGO sectors. Currently…
Auditing and policy development
Cloud security (AWS, Azure, GCP)
Cloud, Infrastructure & Application Security
Compliance (ISO 27001, NIST, GDPR, PCI-DSS)
Ethical hacking / Penetration testing
Governance, Risk, and Compliance (GRC)
Identity and Access Management (IAM)
Incident response & forensics
Risk management
Security Operations & Incident Response (Blue Team)
Third-party risk assessment
Threat detection & analysis (SIEM, EDR, XDR)
Web, mobile, and network testing
Zero Trust & Secure Architecture
I'm a Cyber Threat Intelligence Analyst with 2 years of experience across vulnerability assessment, threat detection and analysis, and attack surface risk management. Skilled at…
I’m an aspiring cybersecurity professional with hands-on experience in building labs, analyzing threats, and working with real-world security tools. I’m passionate about understanding how systems…
Cybersecurity engineer with hands-on experience in threat monitoring, incident detection, and security investigations across cloud and on-prem environments. Skilled in identifying and responding to threats…
API and application security
ATT&CK mapping and analysis
Cloud security (AWS, Azure, GCP)
Compliance (ISO 27001, NIST, GDPR, PCI-DSS)
Ethical hacking / Penetration testing
Identity and Access Management (IAM)
Incident response & forensics
Malware analysis
Network and infrastructure security
Offensive Security & Penetration Testing (Red Team)
Risk management
Security Operations & Incident Response (Blue Team)
SOC monitoring
Threat detection & analysis (SIEM, EDR, XDR)
Threat hunting
I break applications to understand how to secure them, and build security in before attackers get a chance. I focus on application security, with a…
API and application security
ATT&CK mapping and analysis
Cloud, Infrastructure & Application Security
Cyber threat intelligence (CTI)
Ethical hacking / Penetration testing
Exploit development
FrontEnd Developer
Incident response & forensics
Malware analysis
Offensive Security & Penetration Testing (Red Team)
Red teaming / Adversary emulation
Secure software development (SSDLC, DevSecOps)
Security Operations & Incident Response (Blue Team)
SOC monitoring
Threat detection & analysis (SIEM, EDR, XDR)
Threat hunting
Threat Intelligence & Research
Vulnerability research
Hi there! 👋 Over the years, I’ve combined my love for storytelling and technology to create YouTube and podcast content that simplifies complex technical ideas…
A versatile and results-driven IT and Cybersecurity professional with extensive experience in systems administration, network engineering and data center operations across the banking, insurance, and…
I began my tech journey pursuing CCNA certification in 2021 with a clear goal: build a career in networking. Life took me through several chapters;…
Results-driven cybersecurity professional with hands-on experience in penetration testing, mobile application security, and vulnerability assessment. Skilled in identifying and mitigating security risks using industry-standard tools.…
Ethical hacking / Penetration testing
Governance, Risk, and Compliance (GRC)
Malware analysis
Offensive Security & Penetration Testing (Red Team)
OSINT and dark web research
Red teaming / Adversary emulation
Social engineering & physical security assessments
Third-party risk assessment
Threat detection & analysis (SIEM, EDR, XDR)
Vulnerability research
Web, mobile, and network testing
A cybersecurity professional skilled in identifying, exploiting, and reporting security weaknesses across networks, systems, and applications. Uses industry-standard tools and methodologies to simulate real-world cyberattacks,…
I am a junior cybersecurity analyst holding a Bachelor of Science in Applied Computing (KCA University) and specialized training from AfricaHackon Academy. Skilled in penetration…