Thobani Njamela
Cyber Threat Hunter at NEC XON- Claim this Profile
Click to upgrade to our gold package
for the full feature experience.
Topline Score
Bio
Credentials
-
Foundations of Operationalizing MITRE ATT&CK
AttackIQSep, 2022- Nov, 2024 -
Open-Source Intelligence (OSINT) Fundamentals
TCM SecurityJul, 2022- Nov, 2024 -
Microsoft 365 Fundamentals
MicrosoftJun, 2021- Nov, 2024 -
Microsoft Azure Fundamentals
MicrosoftMay, 2021- Nov, 2024 -
Certified Associate in Python Programming
Python InstituteJul, 2019- Nov, 2024 -
Azure Administrator Associate
MicrosoftJun, 2021- Nov, 2024 -
Azure Security Engineer Associate
MicrosoftFeb, 2022- Nov, 2024 -
Information Protection Administrator Associate
MicrosoftFeb, 2022- Nov, 2024 -
Security Operations Analyst Associate
MicrosoftNov, 2021- Nov, 2024 -
Security Administrator Associate
MicrosoftOct, 2021- Nov, 2024 -
External Pentest Playbook
TCM Security
Experience
-
NEC XON
-
South Africa
-
IT Services and IT Consulting
-
200 - 300 Employee
-
Cyber Threat Hunter
-
Jul 2022 - Present
- Search for cyber threats and risks hiding inside the data before attacks occur- Organize and analyze the collected data to determine trends in the security environment of the organization- Make predictions for the future and eliminate the current vulnerabilities - Search for cyber threats and risks hiding inside the data before attacks occur- Organize and analyze the collected data to determine trends in the security environment of the organization- Make predictions for the future and eliminate the current vulnerabilities
-
-
-
Phakamo Tech
-
South Africa
-
Computer and Network Security
-
1 - 100 Employee
-
Cyber Security Analyst
-
Feb 2021 - Jul 2022
- Working with security Monitoring technologies such as SIEM, IPS/IDS, UEBA, DLP among others.- Monitor for attacks, intrusions and unusual, unauthorized or illegal activity test and evaluate security products- Investigate security alerts and provide incident response- Generate reports for both technical and non-technical staff and stakeholders - Working with security Monitoring technologies such as SIEM, IPS/IDS, UEBA, DLP among others.- Monitor for attacks, intrusions and unusual, unauthorized or illegal activity test and evaluate security products- Investigate security alerts and provide incident response- Generate reports for both technical and non-technical staff and stakeholders
-
-
Education
-
IIE Rosebank College
Diploma, IT in Network Management