Security is not just a feature.
It's a mindset.

I’m Victor Nthuli, a Security Operations Engineer specialized in securing cloud infrastructures, implementing SIEM solutions, and hardening enterprise systems against evolving threats.

Core Expertise

Specialized in securing modern infrastructures and responding to emerging threats

Security Monitoring & Incident Response

Advanced proficiency in monitoring security alerts, analyzing complex incidents, and orchestrating timely responses across cloud and on-premises environments.

Identity & Access Management

Expert in implementing robust access controls, user provisioning, and rights deprovisioning, ensuring compliance with security policies and regulatory standards.

Vulnerability Assessment

Skilled in conducting detailed vulnerability assessments to identify and mitigate potential threats, enhancing organizational security posture.

Featured Projects

The latest from my security engineering portfolio

DevOps

Integrating OWASP WSTG into Continuous and Final-Stage Security Testing for Startups

2025

This project focuses on implementing a robust security testing pipeline for startups by integrating the OWASP Web...

wstg
Monitoring & Visualization

Network Device Monitoring with Grafana

2025

The Network Device Monitoring with Grafana project is a comprehensive, real-world implementation of a real-time...

Grafana Prometheus Nmap +5 more

Latest Security Insights

Thoughts and analyses on cybersecurity trends and best practices

infoanalyzer: A Comprehensive Web Reconnaissance Toolkit

The infoanalyzer project is a comprehensive open-source web reconnaissance toolkit designed for security professionals, penetration testers, and system administrators. The current release includes two powerful, complementary tools:

Infect Me If You Can: Outsmarting Malware Sandbox Evasion

Modern malware plays hide-and-seek with security tools, behaving innocently in sandboxes but striking on real systems. This guide exposes their deception tactics—from delayed execution and environment checks to code injection and shape-shifting—and arms you with practical Linux defenses. Learn to monitor process behavior, detect suspicious memory patterns, and implement system hardening that doesn't sacrifice usability. With these techniques, your everyday Linux system becomes a fortress that catches even the stealthiest threats. Don't just hope for security—dare malware to try its worst, knowing you've stacked the deck in your favor.

Ready to secure your digital assets?

Whether you need help with incident response, SIEM implementation, or security assessments, I’m here to help you protect what matters most.

Get in Touch