Summary
Overview
Work History
Education
Skills
Citizen
Summaryofskills
Personal Information
Languages
Timeline
Generic

Lukhanyo Zimba

Cyber Security
Pretoria

Summary

Lukhanyo is a highly motivated Cyber Security enthusiast with a bachelor’s degree in information management and over 6 years of progressive experience in Web Application security testing, API security testing, DevSecOps and Threat Modelling. Proven ability to assess security vulnerabilities, recommend solutions, and create detailed reports. Skilled in analyzing system architecture, identifying hidden flaws, and developing effective remediation plans. Outstanding communication, problem solving, and project management skills. Expert in using security automated and manual penetration testing tools, such as AppScan/Fortify, Burp Suite, Kubernetes, and Kali Linux to identify and evaluate application vulnerabilities. Experienced in exploit techniques, such as SQL Injection, Cross-site Scripting, and Malware Analysis coupled with comprehensive reports. Inclusive understanding of the OWASP Top 10 2019 & 2021 and other Web Application Security Framework such as SANS Top 25, Microsoft SDL, NIST Cybersecurity Framework and ISO/IEC 27001. Demonstrated success in collaborating with cross-functional teams to evaluate the security posture of applications and systems. Implemented proactive measures to detect, triage, and respond to security incidents. Thorough knowledge of the NIST Cybersecurity Framework and current industry security best practices. Ability to facilitate security awareness trainings and provide guidance to customers.

Overview

1
1
year of professional experience

Work History

Architecture: Cyber Security Architect

A1L Digital
  • Manage technical requirements that service domains in security: Develop and maintain security architecture documentation for all domains, including DevSecOps, Application Security and API Security, Secure SDLC and Secure coding practices, Data Security, and Endpoint Security
  • Work with Technical and Business Stakeholders to gather requirements and ensure that security is incorporated into all systems and processes
  • Review and approve security designs and implementations
  • Drive Secure SDLC and Secure coding: Develop and implement security policies and procedures for the software development lifecycle (SDLC)
  • Work with developers to ensure that security is built into enterprise applications as per secure by design principles
  • Conduct security code reviews and penetration testing
  • Data Protection: Develop and implement data protection policies and procedures
  • Protect sensitive data from unauthorized access, disclosure, modification, or destruction
  • Implement encryption and other security controls to protect data
  • Endpoint Security & IAM: Implement security controls, such as Identity Protection, PAM, ITDR and modifying the JML process
  • Provide feedback and improve steerco security initiatives: Provide feedback on security initiatives to the steering committee (steerco)
  • Identify and recommend improvements to security policies and procedures.
  • Identify and communicate business processes and the required security requirement as per SABSA framework
  • Contribute to the cyber security strategy, architecture review board, and technical review board: Participate in the architecture review board and technical review board to ensure that security is considered in all projects
  • Contribute to the Zero Trust Network Access (ZTNA) and Secure Access Service Edge (SASE) Enterprise Architectural implementation strategy.
  • Led the development and implementation of a comprehensive cybersecurity strategy that was adopted by other Operational Countries.
  • Manage a team of 14 security professionals inclusive of graduates, specialist and Architects providing mentorship and guidance.
  • Oversaw the implementation of a zero-trust architecture, a data loss prevention program, and a continuous monitoring framework.
  • Developed SOPs for 3 security domains that reduced security incidents by 30%.
  • Ensure compliance with POPIA, PCI DSS, NIST, ISO 27001 and CIS.

FINTECH: Lead Information Security Officer

MTN
  • Develop and implement the fintech's information security strategy and program
  • Conduct risk assessments and identify and mitigate security risks
  • Implement and manage security controls, such as firewalls, intrusion detection systems, and data encryption
  • Drive GRC in the process of monitoring and analyses of security logs and events to detect and respond to incidents
  • Train and educate employees on security best practices
  • Advise the business on security matters and ensure compliance with applicable regulations
  • Translate security technical objectives and achievements to various levels of business stakeholders through conducting monthly Fintech Security Governance forums
  • Monitor and audit the fintech's security posture to ensure compliance with regulations
  • Investigate and respond to security incidents.

Senior Specialist: Product Application Security and Testing

MTN
  • Ensure that application security is an embedded and critical part of the software delivery lifecycle (including during the early stages of projects) regardless of delivery methodology and tool sets used (i.e., DAST, SAST and SCA)
  • Train and educate developers and teams in secure coding techniques including use of supporting toolsets and enable them to self-service
  • Securing CI/CD pipelines and enforcing secure coding best practices and contributing to the secure software development lifecycle
  • Web Application Firewalls (WAF) implementation and monitoring
  • Secure public facing and internal business applications, through the guidelines of the NIST framework
  • Build and review technical security standards for the following domains: Application Security, Data protection and Endpoint security
  • Driving application and product security awareness for the following domains: Application Security, Data protection and Endpoint security
  • Ensure that all FinTech assets are secured and reporting correctly into group or agreed security tools (health checks Log tickets with 3rd party suppliers), following up and updating clients appropriately
  • Manage, oversee, or have direct involvement in FinTech activities (preparation, meetings, evidence gathering, etc.) for external audit, internal audit and IS assessments for FinTech platforms Adhere to quality assurance standards with regards to communications with customers
  • Management SoD functions definitions including transactions codes and underlying authorization
  • Ensure adequate CAPEX\OPEX budget, resource and management focus is on cyber security risks.

Information Security Engineer

MTN
  • Safeguard information system assets through identification of new and emerging threats within the environment
  • Protect systems by defining access privileges, control structures and resources, while recognizing problems through identification of abnormalities and policy violations
  • Resolve Bug bounty incidents on APIs, Applications and Mobile applications
  • Conduct automated and manual application security testing
  • Implementing security improvements through assessing business as usual activities, evaluating trends, and anticipating requirements
  • Ensuring that endpoints in the environment adhere to a patch cycle and are maintaining security controls
  • Performing assessments of infrastructure security, network security, web-based applications architecture and security, network protocols and removal of weak ciphers
  • Consult on cyber security strategies and cyber security landscape
  • Develop, implement, maintain, and oversee enforcement of policies, procedures and associated plans for the organization system security and user system access
  • Conduct research on emerging products, services, protocols, and standards in support of security enhancement and development efforts
  • Select and acquire security solutions or enhancements to existing security solutions to improve overall enterprise security
  • Oversee the deployment, integration and initial configuration of all new security solutions and any enhancements to existing security solutions
  • Implementing DLP (Cloud/Endpoint/Email), Intune (MDM and MAM), conducting Database Activity Monitoring (DAM), and developing policies and procedures to support the capabilities.

Cyber Security Engineer

CSIR: Defence, Peace, Safety and Security
  • Provide input into implementation and documentation processes and procedures needed to support the security standards
  • Investigate typical threat actor profiles, the typical indicators associated with those profiles, and be able to synthesize the two to develop innovative techniques to detect threat actor activity
  • Analyze available data sources, security tools, and threat trends; leading security monitoring and analysis techniques to identify attacks against the enterprise
  • Analyses logs, normalize and perform automated log correlations utilizing big data analysis or hunt tools to identify anomalous and potentially malicious behavior
  • Working with information security tools such as an enterprise SIEM solution, IDS/IPS, endpoint security, and security monitoring solutions
  • Conduct Research and maintain development policies to ensure security policies are up to date and cater for new technologies, including testing internal and external software development and procurement practices adhere to security protocols
  • Monitors the successful completion of all change requests, including change planning, building, testing, and implementation to ensure that these processes follow the change schedule.

System Administrator

CSIR: Defence, Peace, Safety and Security
  • Install new / rebuild existing servers and configure hardware, peripherals, services, settings, directories, storage, etc
  • In accordance with industry standards and project / operational requirements
  • Install and configure desktop systems and applications
  • Develop and maintain installation and configuration procedures
  • Perform daily system monitoring, verifying the integrity and availability of all hardware, server resources, systems and key processes, reviewing system and application logs, and verifying completion of scheduled jobs such as backups
  • Perform regular security monitoring to identify any possible intrusions
  • Apply OS patches and upgrades on a regular basis and upgrade administrative tools and utilities
  • Configure / add new services when necessary
  • Conceptualization and implementation of network/telecommunications technology demonstrator
  • Setup, implement and maintain firewalls such as FORTIGATE and CISCO ASA
  • Research and recommend innovative, and where possible, automated approaches for system administration tasks
  • Identify approaches that leverage our resources and provide economies of scale.

Intern: Software Development

CSIR: Defence, Peace, Safety and Security
06.2014 - 07.2015
  • Designing, Installation, Testing and Maintenance of Software Systems
  • Analyze requirements, perform a system impact study (network and support systems), consider role players in end-to-end process (fulfillment, assurance, and billing), liaise with all relevant role players involved, log development requirements, test developed functionality and to document everything accordingly
  • Provide day-to-day support and maintenance of business systems to ensure business continuity
  • Implementation process must be planned and rolled out according to schedule, in-service testing to be conducted together with the monitoring of the functionality and process
  • End objective is the sign-off of the product/system development
  • Producing detailed specifications and writing the program codes
  • Testing software to ensure the code is correct, fixing ('debugging') errors where they occur, and rerunning and rechecking the program until it produces the correct results
  • Evaluate and test new products or system as well as technologies by means of compiling the necessary test case documentation, testing against the defined test cases, documenting results, and making the necessary recommendations.

Education

National Diploma in Computer Systems Engineering -

TSHWANE UNIVERSITY OF TECHNOLOGY

BTECH: Information Management - undefined

TSHWANE UNIVERSITY OF TECHNOLOGY

ITILv3 Foundation - undefined

Torque IT

SOFTWARE DEFINED NETWORKS - undefined

Open Networking Foundation

CISCO CCNA R&S - undefined

Enterprises University of Pretoria

COMPTIA SECURITY - undefined

Bytes Technologies

ISO 27001 - undefined

Providence Software Solutions

AZ-900 Azure Cloud Security Fundamentals - undefined

Microsoft Learn

Skills

    Security Architecture

    Secure By Design Principles

    Risk Management

    Vulnerability Assessment

    Identity & Access Management

    Cybersecurity Strategy

    Leadership

    Data & Endpoint Security

    Application Security and Secure SDLC

Citizen

South African

Summaryofskills

SIEM/Threat Hunting/UEBA, Solid understanding of OSI model., Identity & Access Management: CyberArk/Beyond Trust/Silver fort, Linux/Unix/Windows, Endpoint Detection and Response: SentinelOne/CrowdStrike/Macafee, Docker/Kubernetes, AZURE, ArticWolf/Sentinel One/ Augmentt/Purview, Security Center (Nessus), Fortify/Burp Suite/AppScan/VeraCode/Sysdig/Snyk/CI_CD, Python/JS/Golang/C++/C#/Java, Django/Ruby on Rails/SpringBoot, Data Security/HSM/Cryptography/WAF, Threat Modelling Tool: Microsoft TMT & OWASP Threat Dragon, Certificate Lifecycle Management: AppViewX, JIRA/Confluence/Octane/GIT/Connectwise, GitHub/Gitlab/Jenkins/Azure pipeline, Monitor alerts/events from various security tools (EPP/EDR, UEBA, SIEM & DAM)., Triage Incidents., Bug Bounty: WebApp, API’s and Mobile, Planning, coordinate, and document incident process., Provide Incident Response (IR) support when analysis confirms actionable incident., Provide threat and vulnerability analysis as well as security advisory services inclusive of implementing TSS., Analyze and participate in crisis and contingency operations., Conduct Threat Modelling and Management of Secret, Secure By Design implementation, Security understanding on the usage of HTTP protocols (GET, POST, PUT, DELETE, PATCH and TRACE)., Understanding of security standards such as OWASP, NIST, CIS, PCI DSS, POPIA, SABSA, TOGAF and ISO 27001/2, Understanding of the web application architecture and common web vulnerabilities such as SQL Injection, Cross-Site Scripting, Cross-Site Request Forgery and other OWASP Top 10 vulnerabilities., Ability to design, implement, and enforce security policies and procedures., Ability to conduct vulnerability assessments and provide comprehensive reports., Knowledgeable on compliance frameworks and the ability to map security measures., Ability to perform both manual and automated web application penetration testing using tools such as Burp Suite, Fortify, SonarQube, Veracode, Snyk, Sysdig, AppViewX and AppScan., Understanding of different types of authentication and authorization mechanisms such as JWT, HMAC, OAuth and API keys, Ability to read and understand server-side code (such as PHP, Ruby, Python and C#) and client-side code (such as JavaScript)., Understanding of web application frameworks such as Angular, React, Rails, Django, and Spring., Understanding of the API architecture and common API vulnerabilities such as injection attacks, broken authentication, and authorization., Understanding of container security best practices, Testing using tools such as Postman, SoapUI and Swagger., Ability to think and act quickly in response to security threats., Attention to detail and strong analytical skills., Good communication, collaborative and interpersonal skills., Ability to prioritize tasks and manage multiple projects simultaneously., Security first and Shift left paradigm shift., Commitment to customer service and user experience., Evangelist of continuous learning and staying current.

Personal Information

  • Date of Birth: 06/22/90
  • Gender: Male

Languages

English

Timeline

Intern: Software Development

CSIR: Defence, Peace, Safety and Security
06.2014 - 07.2015

Architecture: Cyber Security Architect

A1L Digital

FINTECH: Lead Information Security Officer

MTN

Senior Specialist: Product Application Security and Testing

MTN

Information Security Engineer

MTN

Cyber Security Engineer

CSIR: Defence, Peace, Safety and Security

System Administrator

CSIR: Defence, Peace, Safety and Security

National Diploma in Computer Systems Engineering -

TSHWANE UNIVERSITY OF TECHNOLOGY

BTECH: Information Management - undefined

TSHWANE UNIVERSITY OF TECHNOLOGY

ITILv3 Foundation - undefined

Torque IT

SOFTWARE DEFINED NETWORKS - undefined

Open Networking Foundation

CISCO CCNA R&S - undefined

Enterprises University of Pretoria

COMPTIA SECURITY - undefined

Bytes Technologies

ISO 27001 - undefined

Providence Software Solutions

AZ-900 Azure Cloud Security Fundamentals - undefined

Microsoft Learn
Lukhanyo ZimbaCyber Security