Security is not just a feature.
It's a mindset.

I’m Victor Nthuli, a Security Operations Engineer specialized in securing cloud infrastructures, implementing SIEM solutions, and hardening enterprise systems against evolving threats.

Core Expertise

Specialized in securing modern infrastructures and responding to emerging threats

Security Monitoring & Incident Response

Advanced proficiency in monitoring security alerts, analyzing complex incidents, and orchestrating timely responses across cloud and on-premises environments.

Identity & Access Management

Expert in implementing robust access controls, user provisioning, and rights deprovisioning, ensuring compliance with security policies and regulatory standards.

Vulnerability Assessment

Skilled in conducting detailed vulnerability assessments to identify and mitigate potential threats, enhancing organizational security posture.

Featured Projects

The latest from my security engineering portfolio

DevOps

Integrating OWASP WSTG into Continuous and Final-Stage Security Testing for Startups

2025

This project focuses on implementing a robust security testing pipeline for startups by integrating the OWASP Web...

wstg
Monitoring & Visualization

Network Device Monitoring with Grafana

2025

The Network Device Monitoring with Grafana project is a comprehensive, real-world implementation of a real-time...

Grafana Prometheus Nmap +5 more

Latest Security Insights

Thoughts and analyses on cybersecurity trends and best practices

Infect Me If You Can: Outsmarting Malware Sandbox Evasion

Modern malware plays hide-and-seek with security tools, behaving innocently in sandboxes but striking on real systems. This guide exposes their deception tactics—from delayed execution and environment checks to code injection and shape-shifting—and arms you with practical Linux defenses. Learn to monitor process behavior, detect suspicious memory patterns, and implement system hardening that doesn't sacrifice usability. With these techniques, your everyday Linux system becomes a fortress that catches even the stealthiest threats. Don't just hope for security—dare malware to try its worst, knowing you've stacked the deck in your favor.

NotPetya Ransomware Explained: The $10 Billion Nation-State Cyberattack Fueled by Leaked NSA Exploits

In 2017, the world was hit by NotPetya — a ransomware attack that wasn’t really about ransom. Fueled by leaked NSA cyberweapons like EternalBlue, and deployed through a supply chain compromise, it quickly escalated into a global cyberattack, causing more than $10 billion in damages. This article breaks down the full attack chain, from the Shadow Brokers leak to MBR destruction, and exposes the stark difference in capability between solo researchers and nation-state threat actors. Learn how NotPetya worked, why traditional defenses failed, and what defenders must do today to stop the next weaponized zero-day.

Ready to secure your digital assets?

Whether you need help with incident response, SIEM implementation, or security assessments, I’m here to help you protect what matters most.

Get in Touch