Jimm Wayans

Information & Cyber Security Professional

Security Specialist is capable of recognizing attempted breach or the potential threat by closing off the security vulnerability.


- CEH | ASTQB | IBM Application Security Specialist -

 

About Mr. wayans

skills & capabilities

Dynamic Information Systems Security Professional with demonstrated expertise in all phases of Information, Applications and Network Security issues including security strategy, architecture, firewalls, and operational services. 


Diverse background consisting of positions encompassing the creation of innovative, technologically advanced security solutions for financial companies and private organizations, technical security advising, computer forensics, security trends, firewalls and compliance mandates. 

Excellent analytical skills, with the critical ability to identify security issues and quickly apply effective resolutions, as well as establish and implement backup and recovery plans, incident analysis and recovery.

KEY ACCOMPLISHMENTS

security technology

Created company wide proposal and integration for ensuring security structure throughout the network. Oversaw the maintenance of Enterprise servers including all security for all folders and files. Monitored various network based intrusion detection systems (IDS) including ICS and Endpoint Detection and Response (EDR) solutions.

network administration

Key architect for the design, implementation and maintenance of Active Directory structure. Implemented and maintained a new Active Directory structure and managed and maintained clustered Exchange servers. Installed and configured Vmware ESXI virtual machines for an in-house threat modelling lab environment.

Operational administration

Served as the technical writer for user documentation, network documentation, and server baselines. Researched, tested, and implemented secure intra office IM application, saving man hours and simplifying communications. Creation of project plans and scheduling for implementation of software on all servers.

training & development

Trained the IT department on the disaster recovery plans as they evolved and also trained the Help Desk to provide basic maintenance and upkeep for nightly backups. Responsibilities included training new technicians in migration of multiple company networks into one centralized network and basic networking monitoring and maintenance.

PROFESSIONAL EXPERIENCE 

540px
2018 to Present

Information Security Researcher | Synack Red Team, Hackerone & HackandProof

  • Mobile and Web applications security assessment and testing.
  • IoT devices security assessment and testing. Hosted Network security assessment and testing.
  • API security testing, design and implementation.
  • Host infrastructure security assessment and testing. 
540px
2019 to Present

Hadoop Developer & Data Analyst Consultant | Finsol Techonolgies

  • Big Data Ecosystem – Hadoop, MapReduce, HBase, Sqoop HDFS.
  • Worked on analyzing Hadoop Cluster and different big data analytic tools including Pig, Hive Scala etc.
  • Used SparkAPI over Hortonworks Hadoop YARN to perform analytics on data HIVE. Developed Spark code using scala and Spark-SQL/Streaming for faster testing and processing data.
  • Designed a data warehouse using Hive, created and managed HIVE Tables in Hadoop
2014 to 2016

System Security Analyst | SYSTECH LTD, KENYA

  • Penetration Testing & security review 
  • Planned and developed internal security plan and network security.
  • Security policies enforcement and ensuring compliance
  • Administer the operation security tools- UTMs, Firewall, IPS, Proxies, DMZ and AV.
  • Carry out new Systems/Applications/Infrastructure security architecture design.
  • Review security architecture designs and solutions and evaluate compliance to applicable security standards. 


2017 to 2018

System Security Engineer | CELLULANT KENYA 

  • Managed day to day system security operation of the company and its clients.
  • Implemented and supported all security contracts for financial institution clients
  • In charge of security in all the financial Mobile Applications Project.
  • In charge of internal and External Security of the company. 
  • In charge of API security and implementation.
2013 to 2014

Technical Consultant | SCI KENYA

  • IT Support
  • Installation of servers, network firewalls IDS and IPS
  • Administration of print server and keeping track of users print accounts 
  • Troubleshooting and maintenance of Copiers, scanners and Printers
  • Networking Solutions
  • User Training
2018 to present

Bug hunter & Security Researcher 

  • Both black box and white box security assessment of mobile applications.
  • Web application and API security
  • Responsible disclosure of vulnerabilities.
  • Host security assessment
  • Applications business logic security assessment and review
  • Application source code review and reverse engineering


technical EXPERIENCE 

First Atlantic Bank – Ghana

USSD, API, Mobile & Web Application Security Assessment

East Africa Bank – Djibouti

Security Assessment and Penetration Testing

Amana Bank – Tanzania

Security Assessment and Disaster Recovery

Central Bank of Uganda (BOU)

Penetration Testing and Security Assessment

Zigama CSS Bank - Rwanda 

Information and Cyber Security Training

Consolidated Bank - Kenya

Disaster Recovery Environment Setup

Myriad Group AG - Switzerland

Web Application and API Security Assessment 

KTDA - Kenya

Security Audit and Forensics

Telkom Limited -Kenya   

Mobile Application Security Assessment

Ellams LTD - Kenya

Internal Security Assessment and Penetration Testing 

First Community Bank (FCB) - Kenya

Oracle Audit Vault & Firewall setup 

Red Cross  -Kenya

Security Audit and Penetration Testing

Qwetu Living - Kenya

Web Application and API Security Assessment

Progressive Credit - Kenya

Mobile Applications Security Analysis 

Computer Society of Kenya (CSK)

Cyber security awareness training 

Zenka LTD - Kenya

Mobile Application Security Assessment

Get in touch

Having a job or you just wanna talk?

I'm available for contracts and consultation services relating to Cyber-security and IT in general.