Security is not just a feature.
It's a mindset.
I’m Victor Nthuli, a Security Operations Engineer specialized in securing cloud infrastructures, implementing SIEM solutions, and hardening enterprise systems against evolving threats.
Core Expertise
Specialized in securing modern infrastructures and responding to emerging threats
Security Monitoring & Incident Response
Advanced proficiency in monitoring security alerts, analyzing complex incidents, and orchestrating timely responses across cloud and on-premises environments.
Identity & Access Management
Expert in implementing robust access controls, user provisioning, and rights deprovisioning, ensuring compliance with security policies and regulatory standards.
Vulnerability Assessment
Skilled in conducting detailed vulnerability assessments to identify and mitigate potential threats, enhancing organizational security posture.
Featured Projects
The latest from my security engineering portfolio
Integrating OWASP WSTG into Continuous and Final-Stage Security Testing for Startups
2025
This project focuses on implementing a robust security testing pipeline for startups by integrating the OWASP Web...
Network Device Monitoring with Grafana
2025
The Network Device Monitoring with Grafana project is a comprehensive, real-world implementation of a real-time...
Latest Security Insights
Thoughts and analyses on cybersecurity trends and best practices
infoanalyzer: A Comprehensive Web Reconnaissance Toolkit
The infoanalyzer project is a comprehensive open-source web reconnaissance toolkit designed for security professionals, penetration testers, and system administrators. The current release includes two powerful, complementary tools:
Infect Me If You Can: Outsmarting Malware Sandbox Evasion
Modern malware plays hide-and-seek with security tools, behaving innocently in sandboxes but striking on real systems. This guide exposes their deception tactics—from delayed execution and environment checks to code injection and shape-shifting—and arms you with practical Linux defenses. Learn to monitor process behavior, detect suspicious memory patterns, and implement system hardening that doesn't sacrifice usability. With these techniques, your everyday Linux system becomes a fortress that catches even the stealthiest threats. Don't just hope for security—dare malware to try its worst, knowing you've stacked the deck in your favor.
Ready to secure your digital assets?
Whether you need help with incident response, SIEM implementation, or security assessments, I’m here to help you protect what matters most.
Get in Touch