70 candidates
Information Security Officer with 4+ years of experience safeguarding critical infrastructure across research and enterprise environments. Currently leading cybersecurity operations at the Kenya Marine and…
I am a legal practitioner with a focus on dispute resolution, regulatory advisory, and the growing intersection between law and technology. My work involves supporting…
Technical Security Professional with a specialized focus on Blue Team Operations and Incident Response, developed through an intensive 6-month AfricaHackon residency. Expert at transforming raw…
API and application security
Auditing and policy development
Cloud security (AWS, Azure, GCP)
Compliance (ISO 27001, NIST, GDPR, PCI-DSS)
Cyber threat intelligence (CTI)
Digital forensics
Ethical hacking / Penetration testing
Governance, Risk, and Compliance (GRC)
Identity and Access Management (IAM)
Incident response & forensics
Network and infrastructure security
Risk management
Security Operations & Incident Response (Blue Team)
Threat detection & analysis (SIEM, EDR, XDR)
Web, mobile, and network testing
Zero Trust & Secure Architecture
A cyber security expert with over 10 years experience in various domains including but not limited to GRC, Network security, Cloud security, strong understanding in…
API and application security
Cloud security (AWS, Azure, GCP)
Compliance (ISO 27001, NIST, GDPR, PCI-DSS)
Cyber threat intelligence (CTI)
Governance, Risk, and Compliance (GRC)
Network and infrastructure security
Risk management
Third-party risk assessment
Threat detection & analysis (SIEM, EDR, XDR)
Threat hunting
Threat Intelligence & Research
Zero Trust & Secure Architecture
Lauryn Wangui Gitahi is a cybersecurity professional with 4+ years of experience in information security, GRC, and risk management across banking and NGO sectors. Currently…
Auditing and policy development
Cloud security (AWS, Azure, GCP)
Cloud, Infrastructure & Application Security
Compliance (ISO 27001, NIST, GDPR, PCI-DSS)
Ethical hacking / Penetration testing
Governance, Risk, and Compliance (GRC)
Identity and Access Management (IAM)
Incident response & forensics
Risk management
Security Operations & Incident Response (Blue Team)
Third-party risk assessment
Threat detection & analysis (SIEM, EDR, XDR)
Web, mobile, and network testing
Zero Trust & Secure Architecture
I'm a Cyber Threat Intelligence Analyst with 2 years of experience across vulnerability assessment, threat detection and analysis, and attack surface risk management. Skilled at…