Michael Ted Ndeda

Cybersecurity Portfolio

Michael Ted Ndeda

Cyber Security Analyst Threat Intelligence Ethical Hacker Network Security

BSc Information Security & Forensics

About Me

Cyber Security Analyst with hands-on experience supporting National Treasury security operations in Nairobi. I combine SOC, network security, and practical GRC exposure with Forage simulations from Datacom, Mastercard, and Deloitte.

I am hands-on with Wireshark, Nmap, Metasploit, Autopsy, SIEM workflows, and basic Python scripting, and I work with Azure fundamentals. I apply risk-based thinking informed by the Data Protection Act 2019 and Computer Misuse and Cybercrimes Act 2018 in project documentation and investigation reporting.

  • Network Security & Ethical Hacking
  • SIEM Tools & Security Operations
  • Firewall, VPN & Endpoint Security
  • Incident Triage & First-line Support
  • Digital Forensics (Autopsy)
  • Technical Documentation & Reporting

Practical Projects

Active

SOC Operations Lab

Hands-on SOC lab covering log analysis, alert investigation, and detection workflows using SIEM tooling and Wireshark packet captures.

  • SIEM
  • Wireshark
  • Linux
View on GitHub
Active

Network Security Engineering

Network security configurations and analysis — port scanning, traffic analysis, firewall rule walkthroughs, and VPN setup documentation.

  • Nmap
  • Wireshark
  • TCP/IP
  • Firewall
View on GitHub
Active

Ethical Hacking Lab

Offensive security practice covering vulnerability scanning, exploitation with Metasploit, and security assessment documentation in a controlled lab environment.

  • Metasploit
  • Nmap
  • Kali Linux
View on GitHub
Active

Digital Forensics Lab

Digital forensics investigations using Autopsy for disk and file analysis. Includes case writeups and evidence documentation following forensic investigation procedures.

  • Autopsy
  • Linux
  • Documentation
View on GitHub
Active

Risk & Access Control Lab

Labs covering access control models, privilege management, and risk assessment frameworks with hands-on documentation of security controls.

  • Access Control
  • Risk Management
  • Linux
View on GitHub

Technical Skills

Networking & Security

  • TCP/IP
  • DNS & DHCP
  • Firewall Configuration
  • VPN Setup
  • Cisco Umbrella
  • WHOIS Lookups
  • Domain Reconnaissance

Systems & Tools

  • SIEM Tools
  • Wireshark
  • Nmap
  • Metasploit
  • Autopsy
  • Java Whitelisting

Cloud & Scripting

  • Azure Fundamentals
  • Python (Basic)
  • Technical Documentation
  • Incident Reporting

GRC & Compliance

  • Risk Assessment
  • Security Awareness Training
  • Data Protection Act 2019
  • Computer Misuse Act 2018
  • ISO 27001 Awareness

Education & Professional Training

Education

  • KCA University
  • BSc Information Security and Forensics
  • Completed 2026 (Awaiting Graduation)

Professional Training

  • Ethical Hacking (Cisco) - Sep 2025
  • Virtual Assistant (ALU) - Oct 2024
  • Network Security (Cisco) - Nov 2023
  • CCNA: Introduction to Networks - Apr 2023
  • CCNA: SRWE - Sep 2022

Work Experience

Apr – Jun 2025 Internship

Cybersecurity Policy Implementation Support — National PFM Infrastructure

The National Treasury, Nairobi

  • Contributed to VPN configuration, firewall rule management, and endpoint hardening aligned with the PFM ICT Information Security Policy 2024
  • Supported compliance implementation activities tied to the Data Protection Act 2019 and the Computer Misuse and Cybercrimes Act 2018
  • Configured LAN connections for IFMIS users and resolved connectivity issues to maintain secure access to national financial systems
  • Participated in enterprise integration planning for Cisco Umbrella deployment and Java application whitelisting
  • Provided first-line user support and hardware/software maintenance while escalating complex incidents appropriately

Virtual Job Simulations

Completed

Datacom Cyber Security Operations

Conducted risk assessment, built a structured risk register, and presented prioritised controls for simulated executive stakeholders.

  • GRC
  • Risk Assessment
  • Reporting
Completed

Mastercard Cybersecurity

Analysed phishing threats and redesigned targeted security awareness recommendations for vulnerable business units.

  • Phishing Analysis
  • Awareness Training
  • Threat Response
Completed

Deloitte Australia Cyber

Worked through enterprise cyber scenarios across threat intelligence, IAM, and security architecture advisory workflows.

  • Threat Intel
  • IAM
  • Security Architecture

Certifications & Badges

  • CompTIA Security+ CompTIA
    In Progress
  • Datacom - Cyber Security Operations Job Simulation Forage · Issued Apr 2026 · Credential ID: PEZmK8et8BA5MNTvr
    Virtual Program
  • Mastercard - Cybersecurity Job Simulation Forage · Issued Mar 2026 · Credential ID: SdYdLZ7btggNLjPfE
    Virtual Program
  • Deloitte Australia - Cyber Job Simulation Forage · Issued Mar 2026 · Credential ID: 4Lbk7fTtwRZE7v8M8
    Virtual Program
  • Ethical Hacker Cisco NetAcad · Sep 2025
    Cisco Badge
  • Cybersecurity Essentials Cisco NetAcad · Sep 2023
    Cisco Badge
  • Introduction to Cybersecurity Cisco NetAcad · Apr 2023
    Cisco Badge
  • CCNA: Introduction to Networks Cisco NetAcad · Apr 2023
    Cisco Badge
  • Network Security Cisco NetAcad · Nov 2023
    Cisco Badge
  • Cisco Badge
  • SC-200: Microsoft Security Operations Analyst Microsoft
    Studying
  • ISO/IEC 27001 Information Security Management
    Studying

Portfolio Artifacts

Comprehensive documentation of investigations, risk assessments, detection engineering, and job simulation results. All materials stored in Google Drive with full credential trails.

🔍

SOC and Detection

SIEM detection rules, threat hunting queries, and log analysis documentation.

View Folder
🛡️

Governance and Risk

Risk assessments, security governance frameworks, and compliance documentation.

View Folder
📋

Work Simulations

Datacom, Deloitte, and Mastercard cybersecurity job simulation reports and deliverables.

View Folder
📚

Reflection and Methodology

Project reflections, security methodologies, and documented learning outcomes.

View Folder

Volunteer Experience

2024 - Present Volunteer

Director

Invictus Performance, Waiyaki Way, Nairobi

  • Managed administrative responsibilities including scheduling, meeting coordination, and incident reporting
  • Applied information security principles to maintain secure and organized operational environments

Contact

Open to junior cybersecurity roles, internship opportunities, and security collaborations. Based in Nairobi, Kenya. Let's connect.