Anthony K. - Cyber Security Analyst

Anthony K.

Cyber Security Analyst

Kenya | Africa/Nairobi (USD)

$17/hr
Less than 10 hrs/week
0, Followers

ABOUT ME

July 2019 to Date: Joined MCS Holding as Pre Sales Cyber-Security Engineer, which is a value added distributor in MEA,

• Main task: Offering Cyber-Security Presales Expertise by providing Technical support, training program, full demonstration and running Proof of Concepts, solutions involved in were; fireeye (Advanced Persistent Threat
mitigation solution), Next Generation Firewalls (PaloAlto Networks, and Juniper), Vulnerability management
Solution (Tenable Nessus), Network Access Control Solution (Pulse Secure), Deception Solution (Attivo
Networks), Web Application Firewalls (JWAS), part of red team offering VAPT Services,
Feb 2015 to 2019: Joined EliteVAD as Pre Sales IT-Security Engineer, which is a EMEA regional Value Added IT-Security solution distributor covering technology areas for every part of business IT infrastructure including; Data Networking, IT-security, Virtualization and Data center Infrastructure and telecommunication, at EliteVAD was tasked to execute the latest outstanding innovations necessary to select leading edge strategic vendors and technologies that can provide our partners / customers to differentiate in such todays crowded
 market. 
• Main task: Offering IT-security Presales Expertise by providing Technical support, training program, full
demonstration and running Proof of Concepts solutions involved in were; fireeye (Advanced Persistent Threat
mitigation solution), Algosec (Network security Policy management solution),Expertteam (Use of Real Time Packet Reconstruction Technology to perform IP interception(lawful Interception)),I-Boss (an Advanced Persistent Threat Solution, Web Security and Mobile Defence Management solution),IP-Guard (a Data Loss
Prevention (DLP)Solution), Content Watch (For Internet Content and Application monitoring), Ka spersky Fraud Prevention (an Antifraud Solution from advanced frauds), Procera (Solution to empower networks with Intelligence and gain insights on how network is being used), Gigamon (provides intelligence visibility fabric architecture for enterprise,datacenters and service providers across the globe), VSS-Monitoring (Leader in Network packet brokers allowing you to use optimal use of your NOC and SOC tools), Xangati (Provides intelligence performance of workloads on Virtual Infrastructure,Guidance Software (That includes 
Cybersecurity, Analytics,Investigator and forensics),Nuix for Investigations and forensics,OverOTT Social Media Monitoring, DarkOwl(Darknet Indexing and crawling) and Virtual Desktop Infrastructure Environments). Arbors DDOS solution, Kaspersky DDOS solution.
 • Services was involved in: 
Security Architecture, Integration and Design, Compromise Assessment, Lawful Interception, Digital &
Networking Forensics, Risk and Vulnerability Assessment, Malware Investigation and Malware Analysis,
Incident Response, Data Preservation and retention, Large Scale Telco Infrastructure and Computer networking Network Penetration Test & Assessment Services, Next Generation Managed Security Services (SOC),Technology/Security Training, Awareness Educational Security Services, Security Policies, Strategy,
consultancy and Audit framework,ISO 2700x, PCI DSS, HIPAA, and GLBA Compliance Services, Customer
Experience and Compliance Management, Connected Identity and Cloud Services and IS/IT Risk Governance 
Nov 2012 to Feb 2015: Telekom Kenya Limited
As part of my job I was attached in the department in Information Technology Networks & Security in which I
acquired the following skills in network security.
- ITN Security Intranet: Developed a website that disseminated information about security alerts,
security policy, standards and procedures, also updated the web page with content site was based on joomla, xml languages and flash animations.
- ITN Inventory Management: managed all ITN information assets obtain an asset management solution
(open source).
- Classify assets according to criticality, confidentiality (helped create procedure for maintaining and entering new assets).
- Patch management (Publish the procedure and solution to system administrators, collected all assets and enter in the system).
- Watch Service: Security/vulnerability alerts (Share the email with vendors, contractors and system administrators).
- Security Policy, procedure and standards: Ensured that the company adhered to the security policy
(Updated, created policy standards and procedures)
- Ensured implementation and correctness of procedures (Periodically liaised with Group Information Security
Centre about policy requirements)
- Determined the compliancy level of the company (Customize and validate group information security policy according to TKL's requirements, obtained group security procedures for TKL customization and validation, launched periodic scans on systems using Tenable, Build Security Dashboard e.g. Scans launched, Alerts communicated, Patch management)

-Vulnerability Assessment: To determine the security level of the company (Automatic scans using CORALYS (ever y two (2) months) Manual Scan (every one (1) month) used tools such as Nmap, Putty, and Nessus.
- Did some ethical hacking using backtrack (Linux based), and Kali Linux did some penetration testing on Telekom Kenya’s websites to try and identify vulnerabilities such as cross site script (XSS), log injection, Remote file inclusion, Local file Inclusion and robot.txt.
-Also did sql injection using Perl script, SQLmap and Havij software on the Telekom Kenya’s websites.
-Did penetration tests (ethical hacking) on the Telekom Kenya’s wireless Access Points to check on the level of vulnerability and gave them advice on the best way to secure their Wireless Access points, I also developed a wireless Intrusion detection system Linux based.
-Did ethical network hacking on Telekom Kenya network to check if it is secure using Linux based tools. - Password Policy Implementation: Ensured that the company's password comply with the policy requirements (Submitted password policy to the system administrators, choose a small scope a n d check p o l i c y implementation, conducted audit on the systems to ensure compliance, Updated the password policy with the administrator).

- Single Sign On (SSO): assisted in the development of single sing on which provide a simple access to multiple systems and provides proper management of user accounts.

- Log Management: Ensured logs are collected, stored and analyzed correctly whereby i assisted in the configuration of an open source system that is the alien vault SYS LOG NG.

- Spam follow up: Ensured IPs are not blacklisted (Properly managed the abuse account used the whois.com, UCEprotect to check on blacklisted Ip’s), ensured that we were not attacked by malware, worms (example is Conficker worm that I used Nmap commands to identify the computers infected which included their NetBIOS name, MAC address and the domain names.)

-Fraud Watch and prevention: main task was:
Protection – Whereby we employ a suite of fraud prevention tools to minimize the chance of fraud occurrin g on Telekom’s Voucher system, identity theft mitigation.

Monitor - We watch over Voucher system 24 hours a day, 7 days a week.

Resolve – In case fraud happens we had to work hard to help make it right, example of scenarios was when we had customers being victims of fraud whereby they could be lured into depositing their orange money to other accounts; we also ensured that Orange shops are not victims of fraudsters.

- Simple Object Access Protocol : was involved in the development of a soap system that mainly is used to exchanging structured information in the implementation of Web Services in computer networks, it mainly uses xml and protocols such as Http and simple mail transfer protocol for message negotiation and transmission.
-Data Recovery: mainly recovered data on Hard disk, Micro SD memories and flash disks. -Pass Word Recovery: Recovered windows passwords backtrack and Kali Linux.

SKILLS