hi, lydiah here.

SOC Analyst | Threat Hunter

I'm currently a full-time cybersecurity master's student through the Erasmus+ Program (CyberMACS). I'm interested in how we can make technology accessible and create a safer digital environment for everyone. To have secure systems in place, we must prioritize security from the ground up.

1,247
Threats Blocked

experience

Cybersecurity Analyst Intern

A cyber defense company delivering military-inspired training to build technical and mental resilience in SOC teams and red teams.
Jul 2024 - Sep 2024
  • Designed and deployed an OWASP Top 10 API vulnerability lab, enabling SOC teams to identify 10+ critical gaps in detection workflows during red team exercises.
  • Automated security scans using Python scripts, mapping 15+ vulnerabilities to MITRE ATT&CK tactics, streamlining threat prioritization for analysts.

Product Lead

A Kenyan tech firm offering custom ERP, MIS, and automation software for schools, banks, and enterprises.
Sep 2022 - Aug 2023
  • Drove the full product lifecycle across 3+ platforms, aligning engineering, design, and marketing teams to increase feature adoption by 20% and revenue by 15% within 6 months.
  • Conducted market research and competitive analysis, leading to 5+ high-impact features that improved market positioning and user growth by 25% YoY.
  • Led user onboarding and feedback loops, increasing engagement by 15% and improving customer retention by 10% through data-driven optimizations.

Monitoring & Evaluation Officer

A government and IFAD-backed initiative boosting aquaculture in 15 counties through training, ICT, and rural support.
Aug 2020 - Sep 2022
  • Led system testing and secure data migration for a national platform rollout, ensuring 100% adoption across 200+ users and reducing transition downtime by 35% through early usability feedback.
  • Analyzed user feedback and system performance, driving 15+ iterative improvements that boosted user satisfaction by 25%.
  • Collaborated with developers to remediate bugs, cutting average resolution time by 50% and enhancing platform reliability.

internships

Information Technology Support Officer

Kenya's national electricity utility, responsible for power distribution, billing systems, and digital infrastructure nationwide.
Jan 2019 - Dec 2019
  • Maintained and secured endpoint systems through patching and configuration, reducing system downtime by 30% and improving operational resilience over 6 months.
  • Assisted in deploying new IT systems with secure configurations, achieving 100% compliance with organizational policies and reducing setup errors by 40%.
  • Collaborated with cross-functional teams to optimize system performance and security, strengthening IT infrastructure reliability by 20% over one fiscal year.

Technical Support Specialist

A devolved public administration delivering services, ICT projects, and development programs across Nyeri County.
Jan 2018 - Nov 2018
  • Implemented user feedback mechanisms, driving a 15% increase in IT service satisfaction scores and streamlining 8+ recurring workflows.
  • Conducted training for 50+ users on applications and security best practices, reducing related support requests by 40% and improving adoption rates by 25%.
  • Assisted in deploying 15+ new systems and software, ensuring 100% compliance with IT security policies and reducing configuration errors by 35%.

featured projects

../ other projects

Cybersecurity Detection & Response

SOC-style incident investigations, phishing playbooks, and post-incident reporting using MITRE ATT&CK framework, NIST, and malware analysis workflows.

MITRE ATT&CKSIEMIncident ResponseThreat Hunting

Vulnerability Management with Nessus

Comprehensive vulnerability assessment framework with automated scanning, risk prioritization, and remediation tracking for enterprise environments.

NessusVulnerability AssessmentRisk ManagementEnterprise Security

Internal Security Audit: Botium Toys

Comprehensive security audit using NIST Cybersecurity Framework, PCI DSS, and GDPR compliance assessment for enterprise risk management.

NIST CSFPCI DSSGDPRCompliance

PDF Malware Analysis Lab

Digital forensics laboratory for analyzing malicious PDF documents, implementing static and dynamic analysis techniques for threat identification.

Digital ForensicsMalware AnalysisStatic AnalysisThreat Detection

Secure HTTP Server

Hardened Node.js server implementation with comprehensive input validation, HTTPS encryption, and secure file handling mechanisms.

Node.jsHTTPSInput ValidationSecure Development

JWT Authentication System

Secure authentication system implementing JSON Web Tokens with proper session management, user registration, and access control mechanisms.

JWTAuthenticationSession ManagementAccess Control

education

MSc Applied Cybersecurity

Erasmus+ CyberMACS Joint Program
Kadir Has University (Istanbul) & Ss. Cyril and Methodius University (Skopje)
2023 - 2025

Erasmus Mundus Joint Master's Degree (EMJMD) programme in Applied Cybersecurity offered by a consortium of three highly ranked universities in Turkey, Germany, and North Macedonia.

  • Specialized in Data Protection and Privacy, Web Security, and Network Security
  • Cyber Threat Intelligence (CTI), Penetration Testing, Web Application Security
  • Security Information and Event Management (SIEM), ISO 27001
  • Identity Federation, Identity and Access Management (IAM), Data Privacy

Spring School: Digital Security and Privacy

University of South Brittany, France
Apr 2025

Intensive program focusing on advanced digital security and privacy technologies.

BSc Applied Computer Science

Chuka University, Kenya
2013 - 2017

Foundation in software development, operating systems, and cryptography. Strong technical background in computer science fundamentals.

../ honors & awards

Erasmus Mundus Scholar

European Union
2023 - 2025

Awarded for academic excellence and dedication to advancing cybersecurity knowledge. Prestigious EU scholarship for outstanding international students.

licenses & certifications

skills

Security Operations

  • SIEM (Splunk)
  • Threat Hunting
  • Incident Response
  • MITRE ATT&CK Framework
  • SOC Operations
  • Endpoint Detection

Vulnerability Assessment

  • OWASP Top 10
  • Penetration Testing
  • Vulnerability Scanning
  • Risk Assessment
  • Security Auditing
  • Compliance Testing

Privacy & Compliance

  • GDPR Compliance
  • Data Protection
  • Privacy by Design
  • ISO 27001
  • NIST Framework
  • Risk Management

Development & Automation

  • Python (Security Automation)
  • PowerShell Scripting
  • Bash/Linux Administration
  • API Security Testing
  • CI/CD Security
  • Infrastructure as Code

Network Security

  • Network Monitoring
  • Wireshark Analysis
  • Firewall Management
  • IDS/IPS Configuration
  • Network Forensics
  • Traffic Analysis

content insights

Making cybersecurity accessible • Privacy research • Threat awareness

Article

A Digital Privacy Refresher

We've all heard the same privacy advice over and over again. But how much of it is still relevant in 2024? This article re-evaluates common privacy tips and offers updated, practical advice.

5 min read • Privacy
Article

AI, Your Digital Footprint: How to Use LLMs Safely in 2025

Large Language Models (LLMs) are everywhere, and they're reshaping our digital lives. Discover the hidden risks of using AI and learn how to protect your digital footprint when interacting with these powerful tools.

8 min read • Privacy & AI
Article

Long-Term Consequences of Digital Privacy Erosion

Digital privacy is often seen as a minor inconvenience, but the long-term consequences of its erosion can be profound. This article explores the societal and personal impacts of a world with less privacy.

6 min read • Privacy Research
Read all articles on Medium

Deep-dive articles • Quick cybersecurity insights • Privacy research

contact

I'm always interested in discussing cybersecurity, privacy engineering, and innovative security solutions. Whether you're looking to collaborate on a project or just want to chat about the latest in cybersecurity, I'd love to hear from you!

Location

Skopje, North Macedonia
Open to relocation