A South Sudanese dynamic cybersecurity professional with a strong foundation in software engineering and hands-on experience in network security, web application security, mobile and Digital Forensics. Aiming to leverage academic expertise and practical training to contribute to innovative cybersecurity solutions and strengthen organizational defenses. Posses a proven ability to adapt quickly to new challenges and environments, underscored by commitment to continuous learning and professional growth.
As a Master’s graduate in Cybersecurity from National Forensic Sciences University, Gujarat, India, I combine advanced technical skills with a forward-thinking approach to tackle evolving security threats. I am dedicated to strengthening digital ecosystems through strategic and robust security solutions...
National Forensic Sciences University, Gujarat, India
Delhi Technological University, New Delhi, India
Delhi Technological University, New Delhi, India
Bor College High School, Bor, South Sudan
Langbaar Mixed Primary School, Bor, South Sudan
Developed a predictive model to estimate vehicle prices based on various features such as brand, model, year, mileage, fuel type, transmission and engine capacity. The objective was to build a reliable predictive system that assists buyers and sellers in determining fair market values.
Tools/Tech: Python, Flask, NumPy, Pandas
Worked on a project which focuses on examining malicious software behavior in a controlled and isolated environment to understand its runtime activities, attack vectors and system impact. The objective was to analyze how malware interacts with operating systems, networks, and processes to identify Indicators of Compromise (IOCs) and improve incident response strategies.
Tools/Tech: VMware, Windows & Linux Virtual Machines, Wireshark, Procmon & Process Explorer, TCPView, Regshot, VirusTotal.
Developed an intelligent, IoT-based solution designed to optimize parking space management and reduce traffic congestion in urban areas. The system leverages embedded systems, sensors and real-time data processing to monitor parking slot availability and provide instant updates to users.
Tools/Tech:Microcontroller (ESP8266), Ultrasonic / IR Sensors, Wi-Fi Communication, Web Application, Firebase Database.
Worked on a project which focuses on the systematic identification, collection, preservation, and analysis of digital evidence stored in cloud environments. This focussed on a structured forensic approach for acquiring volatile and non-volatile artefacts from cloud service providers while maintaining data integrity and legal admissibility.
Tools/Tech: AWS, Autopsy, FTK, Volatility, Hashing Algorithms (SHA-256 / MD5)
Worked on a project which focuses on investigating, analyzing, and securing Voice over IP (VoIP) communications by identifying malicious activities, vulnerabilities, and attack patterns within VoIP infrastructures. The project emphasizes digital forensic methodologies to detect fraud, eavesdropping, SIP-based attacks, and call manipulation in real-world VoIP environments.
Tools/Tech: Asterisk, FreePBX (VoIP server), Wireshark & tcpdump, Zoiper, Debian.
Developed a system that automates the aggregation and risk evaluation of security vulnerabilities from multiple sources, including Jira, OWASP Dependency Track, Burp Suite, CodeQL, and GitHub Dependabot. It provides a visual "traffic light" status (GREEN, ORANGE, RED) to indicate the safety of a software release based on predefined risk criteria
Tools/Tech: Streamlit, pandas, requests, matplotlib, xmltodict, jira, sarif_om, reportlab
Worked on a project involves the development of a secure client-server application using the OpenSSL library to establish encrypted communication channels. The server securely transmits real-time system information (current day and time) to connected clients over an SSL/TLS encrypted connection.
Tools/Tech: OpenSSL, Bash, Linux
Developed a comprehensive application to efficiently store, manage and secure student information. The system enables authorized users to perform operations such as adding, updating, retrieving, and deleting student records while ensuring data integrity and confidentiality through built-in security mechanisms.
Tools/Tech: C++, MySQL
Created a machine learning–based system to identify and classify malicious URLs used in phishing attacks. The goal was to enhance cybersecurity defenses by automatically detecting fraudulent websites before users interact with them.
Tools/Tech: Python, Scikit-learn