Passionate about securing digital assets and building robust security infrastructures. With hands-on experience in security monitoring, threat detection, and incident response, I transform vulnerabilities into fortified defenses.
Cybersecurity professional with hands-on experience in security monitoring, vulnerability assessment, incident response, and IT system protection. Skilled in analyzing logs, detecting threats, and strengthening network security through both real-world IT roles and a dedicated home lab SOC environment.
CompTIA Security+ certified, with strong analytical skills and a proactive approach to identifying vulnerabilities and improving security posture. My experience spans from managing broadcast IT systems to implementing security frameworks and conducting comprehensive risk assessments.
Knutsford University College, Accra (2019–2023)
FGPA: 3.54
Relevant coursework: Computer Crime, Forensics & Auditing, Network Security, Database Management, IT Project Management
Issued 2025
Security operations & monitoring, Incident response & digital forensics, Network defense & access control, Risk management & security architecture
Forage • Issued November 2025
Credential ID: gBghHDuWusGA9lh8
Skills: Risk Management
Forage • Issued November 2025
Credential ID: SYtrgwrcmT6Lwz4To
Skills: Data Privacy, PII Protection, AI Ethics
Forage • Issued November 2025
Credential ID: EZMoNtPE89X8Jb8XG
Skills: Identity and Access Management (IAM), Security Best Practices
Forage • Issued November 2025
Credential ID: PPk7ehqDB9PeETE29
Skills: Phishing Detection, Security Awareness Training
Organizations I've contributed to in the past
Cybersecurity work I'm proud of
Deployed a virtual network using VirtualBox with Windows, Linux, and Kali nodes. Configured a mini SOC environment using Splunk and ELK to simulate SIEM monitoring, log analysis, and alert triage.
Served as an analyst on Mastercard's Security Awareness Team. Identified and reported security threats such as phishing. Analyzed business areas needing robust security training and implemented training procedures.
Investigated a cyberattack and produced a comprehensive report documenting findings. Outlined key recommendations to improve client's cybersecurity posture and conducted comprehensive risk assessment.
Collaborated with Cybersecurity Consulting team on identity and access management (IAM). Acquired expertise in IAM principles, cybersecurity best practices, and strategic alignment with business objectives.
Worked as Data Labeling Analyst reviewing customer support messages. Classified messages for Intent, Sentiment, and PII using consistent labeling schema. Evaluated edge cases and maintained data consistency.
Feel free to reach out for opportunities or collaborations