hi, lydiah here.

Digital Development & Cybersecurity Specialist

I design secure, resilient, and inclusive digital infrastructure that enhances public service delivery and expands access to opportunities. Drawing on experience in e-governance, fintech, and agricultural digitalization, I integrate cybersecurity, policy insight, and human-centered design because digital transformation succeeds only when people trust it, can use it effectively, and truly benefit from it.

1247
Threats Blocked

experience

Cybersecurity Analyst Intern

A cyber defense organization offering resilience-focused security training for SOC and red-team environments.
Jul 2024 — Sep 2024
  • Developed an OWASP-aligned API security lab used to strengthen detection engineering and SOC response capabilities.
  • Automated vulnerability assessments and mapped results to MITRE ATT&CK® to support structured threat analysis and prioritization.
  • Contributed to incident investigations through network, log, and threat intelligence analysis, supporting containment and remediation efforts.

Product Lead

A technology company delivering ERP, MIS, and automation platforms for financial institutions, enterprises, and public-sector organizations.
Sep 2022 — Aug 2023
  • Led strategy, design, and delivery of digital platforms, ensuring alignment between technical teams, user needs, and organizational objectives.
  • Conducted product, market, and user research to inform roadmaps, improve accessibility, and drive evidence-based decision-making.
  • Established onboarding, documentation, and feedback systems to strengthen adoption, user experience, and long-term sustainability.
  • Collaborated with engineering teams to enhance usability, data security, and service reliability through iterative improvements.

Monitoring & Evaluation Officer

A government–IFAD initiative strengthening rural livelihoods through digital platforms, capacity building, and value-chain development.
Aug 2021 — Sep 2022
  • Coordinated testing, refinement, and rollout of a digital management system supporting public-sector service delivery.
  • Translated field, performance, and stakeholder insights into product improvements that enhanced usability and operational efficiency.
  • Worked with software teams to diagnose and resolve data, workflow, and adoption challenges, improving system reliability and user trust.
  • Developed digital literacy and cybersecurity awareness resources to support responsible platform use and data protection practices.

internships

IT Support Intern

Kenya’s national electricity utility managing nationwide digital, operational, and billing infrastructure.
Jan 2019 — Mar 2019
  • Provided technical and cybersecurity support across enterprise systems to strengthen operational resilience and continuity.
  • Assisted in deploying, configuring, and securing digital tools in alignment with internal governance requirements.
  • Collaborated across teams to troubleshoot infrastructure challenges and improve service delivery efficiency.

IT Support Intern

A devolved government institution supporting ICT infrastructure, digital services, and public administration.
Jan 2017 — Apr 2017
  • Supported rollout, training, and onboarding for digital tools used across county operations and service delivery.
  • Facilitated cybersecurity and responsible technology awareness to strengthen safe system use among staff.
  • Delivered technical troubleshooting and system support to ensure reliable public-sector digital services.

featured projects

../ other security & infrastructure projects

Cybersecurity Detection & Response

SOC-style investigations, phishing response playbooks, and post-incident reporting, using MITRE ATT&CK and NIST to structure detection logic, evidence collection, and lessons learned for security operations.

MITRE ATT&CK SIEM Incident Response Threat Hunting

Vulnerability Management with Nessus

A vulnerability management workflow using Nessus to scan, prioritize, and track remediation, illustrating how risk-based security can support governance and operational decision-making in enterprise environments.

Nessus Vulnerability Assessment Risk Management Enterprise Security

Internal Security Audit: Botium Toys

A security audit case study applying NIST CSF, PCI DSS, and GDPR principles to assess controls, identify gaps, and propose improvements—demonstrating alignment between technical security measures and regulatory/compliance expectations.

NIST CSF PCI DSS GDPR Compliance

PDF Malware Analysis Lab

A hands-on digital forensics lab for analyzing malicious PDF documents, combining static and dynamic techniques to understand payload behavior and improve threat detection practices.

Digital Forensics Malware Analysis Static Analysis Threat Detection

Secure HTTP Server

A hardened Node.js server demonstrating secure-by-design principles: validated inputs, HTTPS configuration, and safer file handling to reduce common web application risks.

Node.js HTTPS Input Validation Secure Development

JWT Authentication System

A secure authentication module using JSON Web Tokens, with attention to session handling, access control, and common implementation pitfalls—illustrating foundational identity and access management concepts.

JWT Authentication Session Management Access Control

education

MSc Applied Cybersecurity

Erasmus+ CyberMACS Joint Program
Kadir Has University (Istanbul) & Ss. Cyril and Methodius University (Skopje)
2023 - 2025

Erasmus Mundus Joint Master's Degree (EMJMD) programme in Applied Cybersecurity offered by a consortium of three highly ranked universities in Turkey, Germany, and North Macedonia.

  • Specialized in Data Protection and Privacy, Web Security, and Network Security
  • Cyber Threat Intelligence (CTI), Penetration Testing, Web Application Security
  • Security Information and Event Management (SIEM), ISO 27001
  • Identity Federation, Identity and Access Management (IAM), Data Privacy

Summer School: Open-Source Resilient Hardware & IoT Security

ORSHIN Summer School, Crete, Greece
Sep 2025

Summer school on open-source resilient hardware and software for IoT, covering secure lifecycle management, hardware security, and privacy-preserving cryptographic protocols.

Spring School: Digital Security and Privacy

University of South Brittany, France
Apr 2025

Intensive program focusing on advanced digital security and privacy technologies.

BSc Applied Computer Science

Chuka University, Kenya
2013 - 2017

Foundation in software development, operating systems, and cryptography. Strong technical background in computer science fundamentals.

../ honors & awards

Erasmus Mundus Scholar

European Union
2023 - 2025

Awarded for academic excellence and dedication to advancing cybersecurity knowledge. Prestigious EU scholarship for outstanding international students.

licenses & certifications

skills

Data Privacy & Governance

  • Privacy by Design
  • GDPR & Global Data Regulations
  • ISO 27001 Compliance
  • NIST Cybersecurity Framework
  • Identity & Access Management
  • Responsible Data Handling

Security Operations

  • SIEM (Splunk)
  • Threat Hunting & Analysis
  • Incident Response
  • MITRE ATT&CK Mapping
  • SOC Processes & Reporting
  • Endpoint Detection & Response (EDR)

Vulnerability & Risk Management

  • OWASP Top 10
  • API & Web Security Testing
  • Vulnerability Scanning (Nessus)
  • Risk Assessment & Prioritization
  • Security Audits & Reporting
  • Secure SDLC Practices

Digital Transformation

  • Digital Public Infrastructure (DPI)
  • E-Governance & Public Service Delivery
  • Digital Transformation Strategy
  • User-Centered & Inclusive Design
  • Cross-Sector Collaboration (Gov, NGOs, Private)
  • Monitoring, Evaluation & Learning (MEL)

content insights

Making cybersecurity accessible • Privacy research • Threat awareness

Article

A Digital Privacy Refresher

We've all heard the same privacy advice over and over again. But how much of it is still relevant in 2024? This article re-evaluates common privacy tips and offers updated, practical advice.

5 min read • Privacy
Article

AI, Your Digital Footprint: How to Use LLMs Safely in 2025

Large Language Models (LLMs) are everywhere, and they're reshaping our digital lives. Discover the hidden risks of using AI and learn how to protect your digital footprint when interacting with these powerful tools.

8 min read • Privacy & AI
Article

Long-Term Consequences of Digital Privacy Erosion

Digital privacy is often seen as a minor inconvenience, but the long-term consequences of its erosion can be profound. This article explores the societal and personal impacts of a world with less privacy.

6 min read • Privacy Research
Read all articles on Medium

Deep-dive articles • Quick cybersecurity insights • Privacy research

contact

I’m open to collaborations and conversations at the intersection of digital development, cybersecurity, and privacy. Whether you’re exploring secure digital public services, responsible use of AI, or simply want to exchange ideas, I’d be happy to connect.

Location

Skopje, North Macedonia
Open to relocation