Cyber Security Specialist

10 years of experience designing, implementing, and troubleshooting several Network and Security infrastructures. Collaborated with 100+ IT infrastructures and App development team to identify, prioritize and manage the remediation of vulnerabilities, also protecting organizations data, systems, and networks from cyberattacks. Dedicated to continuous learning, quick to adapt and eager to contribute the acquired skills, knowledge, and experience.

A computer screen displays a portion of source code written in a programming language. The code includes comments and conditional statements, with particular emphasis on credential management.
A computer screen displays a portion of source code written in a programming language. The code includes comments and conditional statements, with particular emphasis on credential management.
A dimly lit desk setup featuring a computer monitor displaying a document titled 'General Hardening Guideline'. The desk has a mechanical keyboard with blue and red keys, a lamp providing light on the right side, and various small items including notes pinned to the wall, a notebook, and a cup. There is a mesh office chair in front of the desk.
A dimly lit desk setup featuring a computer monitor displaying a document titled 'General Hardening Guideline'. The desk has a mechanical keyboard with blue and red keys, a lamp providing light on the right side, and various small items including notes pinned to the wall, a notebook, and a cup. There is a mesh office chair in front of the desk.
A person wearing a Guy Fawkes mask is positioned near a server rack filled with blue and green cables and illuminated lights. The individual is dressed in a dark-colored suit and is close to the camera.
A person wearing a Guy Fawkes mask is positioned near a server rack filled with blue and green cables and illuminated lights. The individual is dressed in a dark-colored suit and is close to the camera.

My Objective

I aspire to make a meaningful impact in promoting cybersecurity awareness, resilience and preparedness across individuals, businesses and communities.

Projects

Showcasing my expertise in cybersecurity and network protection.

A person is concentrated on working with cables connected to a server rack in a dimly lit environment. The focus is on their hands and the server equipment, suggesting a technical task.
A person is concentrated on working with cables connected to a server rack in a dimly lit environment. The focus is on their hands and the server equipment, suggesting a technical task.
Vulnerability Assessment

Identified and prioritized security vulnerabilities in systems.

A person wearing a white mask is interacting with a network server, handling blue cables. The setup is illuminated with blue lights, suggesting a technological environment.
A person wearing a white mask is interacting with a network server, handling blue cables. The setup is illuminated with blue lights, suggesting a technological environment.
Network Security

Designed robust security infrastructures for various organizations.

A presentation takes place in a modern conference room with a group of professionals seated, and two presenters standing near a projected screen. The screen displays a web page with the McAfee Security Scan Plus showing. The atmosphere is formal and focused, as attendees appear to be discussing or reviewing the content.
A presentation takes place in a modern conference room with a group of professionals seated, and two presenters standing near a projected screen. The screen displays a web page with the McAfee Security Scan Plus showing. The atmosphere is formal and focused, as attendees appear to be discussing or reviewing the content.
A hand holding a thermal scanner is pointed towards a rack of computer servers. The servers are illuminated with blue LED lights, giving a technological and futuristic feel.
A hand holding a thermal scanner is pointed towards a rack of computer servers. The servers are illuminated with blue LED lights, giving a technological and futuristic feel.
Incident Response

Managed and mitigated cyber threats effectively and efficiently.

Collaboration

Worked with IT teams to enhance security measures.

Cyber Security Services

Expert solutions for securing the networks, systems, and data against cyber threats.

Vulnerability Assessment

Identify and prioritize vulnerabilities in the infrastructure to enhance security measures effectively.

A modern desk setup featuring a camera lens, a tablet displaying an interface with app icons, a pair of earbuds in an open charging case, and a book titled 'Wireless and Mobile Device Security' on a shelf below.
A modern desk setup featuring a camera lens, a tablet displaying an interface with app icons, a pair of earbuds in an open charging case, and a book titled 'Wireless and Mobile Device Security' on a shelf below.
Network Security

Design and implement robust network security infrastructures to protect against potential cyberattacks.

Continuous Learning

Stay updated with the latest security trends and technologies to safeguard your organization.
A padlock sits on a laptop keyboard with glowing red, green, and blue light trails swirling around, creating a sense of security and cyber awareness.
A padlock sits on a laptop keyboard with glowing red, green, and blue light trails swirling around, creating a sense of security and cyber awareness.
A security officer is walking down a modern, brightly lit hallway with shiny tiles and digital displays. The person is wearing a dark uniform with a reflective vest. The corridor seems to be part of a transportation hub or metro station with directional signs overhead.
A security officer is walking down a modern, brightly lit hallway with shiny tiles and digital displays. The person is wearing a dark uniform with a reflective vest. The corridor seems to be part of a transportation hub or metro station with directional signs overhead.
woman wearing yellow long-sleeved dress under white clouds and blue sky during daytime

Jackson Joy's expertise in cybersecurity transformed our network security and protected us from threats.

Tech Solutions

A server rack containing various network and power management devices. The devices feature buttons, switches, and digital displays, indicating active usage and monitoring capabilities. The rack has a black metal mesh design for ventilation.
A server rack containing various network and power management devices. The devices feature buttons, switches, and digital displays, indicating active usage and monitoring capabilities. The rack has a black metal mesh design for ventilation.

His dedication to continuous learning and adaptability made a significant impact on our security posture.

CyberSafe Inc.

A person is standing inside a technical room or server room, working with equipment mounted on a rack. They appear focused and are adjusting or observing the setup. The equipment includes cables and a camera on a tripod. The scene is viewed through a square window with bolts, suggesting a secure or restricted area.
A person is standing inside a technical room or server room, working with equipment mounted on a rack. They appear focused and are adjusting or observing the setup. The equipment includes cables and a camera on a tripod. The scene is viewed through a square window with bolts, suggesting a secure or restricted area.
★★★★★
★★★★★