Linux Administrator • Cybersecurity Enthusiast • DevOps Engineer
Building resilient systems, hardening networks, and crafting pipelines — with a golden eye for detail.
I am an IT professional specializing in Linux administration, Cyber Security, and DevOps engineering. Experienced in managing and securing Linux servers, performing vulnerability assessments, and implementing system hardening aligned with ISO 27001 and CIS Top 20 Controls. Skilled in penetration testing with tools such as Nmap, Burp Suite, OWASP ZAP, and Metasploit. I also have hands-on expertise in cloud infrastructure (AWS), automation (Docker, Terraform), and CI/CD pipelines (Jenkins, GitHub Actions), with practical experience in monitoring solutions like Grafana, Prometheus, ELK, and Zabbix. Passionate about delivering secure, scalable, and reliable IT solutions, I focus on bridging development, security, and operations to drive innovation and resilience.
Focus on cybersecurity, web development and systems programming. Coursework includes algorithms, networks and security fundamentals.
Science stream with Computer Science electives. Participated in coding contests and tech clubs.
I have hands-on expertise in cloud infrastructure (AWS), automation with Docker and Terraform, and building CI/CD pipelines using Jenkins and GitHub Actions. I also have practical experience in monitoring solutions such as Grafana, Prometheus, ELK, and Zabbix. Passionate about delivering secure, scalable, and reliable IT solutions, I focus on bridging development, security, and operations to drive innovation and resilience.
I am an IT professional with expertise in Linux administration and Cybersecurity, experienced in managing and securing Linux servers, performing vulnerability assessments, and applying system hardening aligned with ISO 27001 and CIS Top 20 Controls. Skilled in penetration testing using tools such as Nmap, Burp Suite, OWASP ZAP, and Metasploit, I focus on strengthening security posture and ensuring compliance with best practices.
Docker containerization with expertise in building, deploying, and managing scalable applications.
Mastered ethical hacking methodologies, tools and techniques to identify vulnerabilities and secure systems.
Interested in collaborating or have a question? Reach out — I respond to thoughtful messages.