Cybersecurity, Business, and Data Analyst Professional with a passion for ethical hacking, penetration testing, and vulnerability analysis, complemented by expertise in business and data analysis. Skilled in network security, threat mitigation, and risk assessment, with a strong foundation in data-driven decision-making, process optimization, and business intelligence. A highly analytical and technically adept individual with a proactive approach to securing digital assets, fortifying enterprise security systems, and leveraging data analytics to drive strategic business insights and efficiency.
Download ResumeHi there! I’m a tech enthusiast and curious problem-solver with over 4 years of experience in the Financial Sector (Commercial Bank of Zimbabwe & BancABC) as a Technology Services Analyst, Cybersecurity Analyst, Data Analyst, and Senior Systems Analyst. Throughout my career, I’ve had the privilege of using technology to help businesses grow, work smarter, and innovate faster. I thrive on diving into data, uncovering insights, and solving challenges that make a real impact. What gets me excited? Turning complex problems into meaningful solutions, whether it’s building predictive models, streamlining business processes, or securing systems against cyber threats. I love using data to tell stories, guide decisions, and ultimately drive success. Need a quick laugh? Why did the data scientist quit his job? Because he didn’t get arrays! And what did the ethical hacker say when they found a cross-site scripting (XSS) bug? "Time to inject some humor… and a patch!" 😆
Read MoreSimulating real-world cyber threats by mimicking APTs and bypassing enterprise security defenses.
Read MoreIdentifying and exploiting internet-facing assets through OSINT and vulnerability scanning.
Read MoreSimulating insider threats, lateral movement, and privilege escalation to uncover security gaps.
Read MoreAssessing web applications and APIs for security flaws using OWASP Top 10 methodologies.
Read MoreTesting Wi-Fi security through encryption cracking, rogue AP attacks, and MITM exploitation.
Read MoreConducting phishing, vishing, and social engineering attacks to evaluate human security awareness.
Read MoreTesting cloud configurations, IAM roles, and misconfigurations to prevent privilege escalation.
Read MoreCollaborating with Blue Teams to enhance detection, response, and security resilience.
Read MoreInvestigating security breaches, malware analysis, and forensic assessments for rapid remediation.
Read More