We just raised a $30M Series A: Read our story

Badges

55 Points
3 Years

User Activity

Over 3 years ago
1. First is to check how the target systems are configured in terms of logs generated. i.e syslog may be disabled, apache conf etc 2. Types of logs collected 3. Log size 4. Storage and retention

About me

A well-rounded professional with over 10 years’ experience in Information Technology with a deep passion in Information Security. I am a quick thinker with the ability to adjust to varying circumstances and situations. I immerse into new things and constantly try to improve the environments in which I find myself in.

My experience spans across Telecommunications, Banking as well as SMEs. I have held both junior and senior management levels with a steady upward growth. I have led and conducted projects in several countries within Africa as well as working harmoniously in a multicultural environment.

Don't i just love social engineering! Out of office, i am die hard motorsport fan and adrenalin junkie having participated twice in a local rally in an enclosed circuit. Did not clinch the ultimate prize but yes, i managed a respectable position 4 out of 22 participants. Do you know i even made a leap of faith by bungee jumping 110 meters drop at the famous Victoria Falls and recently did a tandem skydive jump 12000feet!