Security is not just a feature.
It's a mindset.
I’m Victor Nthuli, a Security Operations Engineer specialized in securing cloud infrastructures, implementing SIEM solutions, and hardening enterprise systems against evolving threats.
Core Expertise
Specialized in securing modern infrastructures and responding to emerging threats
Security Monitoring & Incident Response
Advanced proficiency in monitoring security alerts, analyzing complex incidents, and orchestrating timely responses across cloud and on-premises environments.
Identity & Access Management
Expert in implementing robust access controls, user provisioning, and rights deprovisioning, ensuring compliance with security policies and regulatory standards.
Vulnerability Assessment
Skilled in conducting detailed vulnerability assessments to identify and mitigate potential threats, enhancing organizational security posture.
Featured Projects
The latest from my security engineering portfolio
Integrating OWASP WSTG into Continuous and Final-Stage Security Testing for Startups
2025
This project focuses on implementing a robust security testing pipeline for startups by integrating the OWASP Web...
Network Device Monitoring with Grafana
2025
The Network Device Monitoring with Grafana project is a comprehensive, real-world implementation of a real-time...
Latest Security Insights
Thoughts and analyses on cybersecurity trends and best practices
Infect Me If You Can: Outsmarting Malware Sandbox Evasion
Modern malware plays hide-and-seek with security tools, behaving innocently in sandboxes but striking on real systems. This guide exposes their deception tactics—from delayed execution and environment checks to code injection and shape-shifting—and arms you with practical Linux defenses. Learn to monitor process behavior, detect suspicious memory patterns, and implement system hardening that doesn't sacrifice usability. With these techniques, your everyday Linux system becomes a fortress that catches even the stealthiest threats. Don't just hope for security—dare malware to try its worst, knowing you've stacked the deck in your favor.
NotPetya Ransomware Explained: The $10 Billion Nation-State Cyberattack Fueled by Leaked NSA Exploits
In 2017, the world was hit by NotPetya — a ransomware attack that wasn’t really about ransom. Fueled by leaked NSA cyberweapons like EternalBlue, and deployed through a supply chain compromise, it quickly escalated into a global cyberattack, causing more than $10 billion in damages. This article breaks down the full attack chain, from the Shadow Brokers leak to MBR destruction, and exposes the stark difference in capability between solo researchers and nation-state threat actors. Learn how NotPetya worked, why traditional defenses failed, and what defenders must do today to stop the next weaponized zero-day.
Ready to secure your digital assets?
Whether you need help with incident response, SIEM implementation, or security assessments, I’m here to help you protect what matters most.
Get in Touch