6 candidates for "Zero Trust & Secure Architecture"
API and application security
Auditing and policy development
Cloud security (AWS, Azure, GCP)
Compliance (ISO 27001, NIST, GDPR, PCI-DSS)
Cyber threat intelligence (CTI)
Digital forensics
Ethical hacking / Penetration testing
Governance, Risk, and Compliance (GRC)
Identity and Access Management (IAM)
Incident response & forensics
Network and infrastructure security
Risk management
Security Operations & Incident Response (Blue Team)
Threat detection & analysis (SIEM, EDR, XDR)
Web, mobile, and network testing
Zero Trust & Secure Architecture
A cyber security expert with over 10 years experience in various domains including but not limited to GRC, Network security, Cloud security, strong understanding in…
API and application security
Cloud security (AWS, Azure, GCP)
Compliance (ISO 27001, NIST, GDPR, PCI-DSS)
Cyber threat intelligence (CTI)
Governance, Risk, and Compliance (GRC)
Network and infrastructure security
Risk management
Third-party risk assessment
Threat detection & analysis (SIEM, EDR, XDR)
Threat hunting
Threat Intelligence & Research
Zero Trust & Secure Architecture
Lauryn Wangui Gitahi is a cybersecurity professional with 4+ years of experience in information security, GRC, and risk management across banking and NGO sectors. Currently…
Auditing and policy development
Cloud security (AWS, Azure, GCP)
Cloud, Infrastructure & Application Security
Compliance (ISO 27001, NIST, GDPR, PCI-DSS)
Ethical hacking / Penetration testing
Governance, Risk, and Compliance (GRC)
Identity and Access Management (IAM)
Incident response & forensics
Risk management
Security Operations & Incident Response (Blue Team)
Third-party risk assessment
Threat detection & analysis (SIEM, EDR, XDR)
Web, mobile, and network testing
Zero Trust & Secure Architecture
Am a female Ugandan by names of Oliver Mirembe ,strong on hands on experience ,intelligent,a good team worker player with hands on training from Africahackon…
I’m a highly committed Cybersecurity Implementation Specialist-the person who designs and builds the walls that keep sensitive data safe. I genuinely enjoy getting hands-on with…
Governance, Risk, and Compliance (GRC)
Identity and Access Management (IAM)
Network and infrastructure security
Security Operations & Incident Response (Blue Team)
SOC monitoring
Threat detection & analysis (SIEM, EDR, XDR)
Vulnerability research
Web, mobile, and network testing
Zero Trust & Secure Architecture
Ksh300,000/month