Thobani Njamela

Cyber Threat Hunter at NEC XON
  • Claim this Profile
Contact Information
us****@****om
(386) 825-5501
Location
Johannesburg Metropolitan Area

Topline Score

Topline score feature will be out soon.

Bio

Generated by
Topline AI

You need to have a working account to view this content.
You need to have a working account to view this content.

Credentials

  • Foundations of Operationalizing MITRE ATT&CK
    AttackIQ
    Sep, 2022
    - Nov, 2024
  • Open-Source Intelligence (OSINT) Fundamentals
    TCM Security
    Jul, 2022
    - Nov, 2024
  • Microsoft 365 Fundamentals
    Microsoft
    Jun, 2021
    - Nov, 2024
  • Microsoft Azure Fundamentals
    Microsoft
    May, 2021
    - Nov, 2024
  • Certified Associate in Python Programming
    Python Institute
    Jul, 2019
    - Nov, 2024
  • Azure Administrator Associate
    Microsoft
    Jun, 2021
    - Nov, 2024
  • Azure Security Engineer Associate
    Microsoft
    Feb, 2022
    - Nov, 2024
  • Information Protection Administrator Associate
    Microsoft
    Feb, 2022
    - Nov, 2024
  • Security Operations Analyst Associate
    Microsoft
    Nov, 2021
    - Nov, 2024
  • Security Administrator Associate
    Microsoft
    Oct, 2021
    - Nov, 2024
  • External Pentest Playbook
    TCM Security

Experience

    • South Africa
    • IT Services and IT Consulting
    • 200 - 300 Employee
    • Cyber Threat Hunter
      • Jul 2022 - Present

      - Search for cyber threats and risks hiding inside the data before attacks occur- Organize and analyze the collected data to determine trends in the security environment of the organization- Make predictions for the future and eliminate the current vulnerabilities - Search for cyber threats and risks hiding inside the data before attacks occur- Organize and analyze the collected data to determine trends in the security environment of the organization- Make predictions for the future and eliminate the current vulnerabilities

    • South Africa
    • Computer and Network Security
    • 1 - 100 Employee
    • Cyber Security Analyst
      • Feb 2021 - Jul 2022

      - Working with security Monitoring technologies such as SIEM, IPS/IDS, UEBA, DLP among others.- Monitor for attacks, intrusions and unusual, unauthorized or illegal activity test and evaluate security products- Investigate security alerts and provide incident response- Generate reports for both technical and non-technical staff and stakeholders - Working with security Monitoring technologies such as SIEM, IPS/IDS, UEBA, DLP among others.- Monitor for attacks, intrusions and unusual, unauthorized or illegal activity test and evaluate security products- Investigate security alerts and provide incident response- Generate reports for both technical and non-technical staff and stakeholders

Education

  • IIE Rosebank College
    Diploma, IT in Network Management
    2016 - 2019

Community

You need to have a working account to view this content. Click here to join now