Summary
Overview
Work History
Education
Skills
Certification
Languages
Certificationstatement
Personal Information
References
Profile - Attributes
Additional Information
Timeline
Generic

Liberatus Sylvester Kahere

Dar Es Salaam

Summary

Diligent Information Security Specialist having experience in Information security audit, network, web security and private corporate security systems with a deep interest in providing technology defense incident response. Ability to handle analysis and support in various technology areas. Competent in executing, drafting, and maintaining SOPs, along with incident reports.

Overview

8
8
years of professional experience
1
1
Certification

Work History

Information Security Auditor

National Audit Office of Tanzania
05.2020 - Current
  • Information Security Audits: Conduct regular audits to assess the effectiveness of information security controls, identify vulnerabilities, and evaluate the organization's compliance with internal policies and external regulations
  • Audit Planning and Execution: Develop an audit plan that outlines the scope, objectives, and methodologies for conducting audits
  • Coordinate with other departments and stakeholders to schedule and execute audit activities effectively
  • Risk Assessment: Perform risk assessments to identify and prioritize potential security risks, evaluate the impact of those risks, and recommend appropriate controls and mitigation strategies
  • Compliance Monitoring: Monitor and enforce compliance with information security policies, standards, and regulations
  • Keep abreast of changes in relevant laws and regulations to ensure ongoing compliance
  • Collaboration and Communication: Collaborate with other departments, such as IT, Legal, and Human Resources, to ensure alignment of security practices and procedures
  • Communicate audit findings, recommendations, and progress to senior management, stakeholders, and relevant teams
  • Continuous Improvement: Continuously assess and improve the information security audit processes, methodologies, and tools


Head of Cyber Defense Unit

Tanzania Ports Authority
07.2019 - 07.2020
  • Company Overview: https://ports.go.tz/index.php/en/
  • Conducting penetration tests and providing recommendations on security measures to be taken by the organisation
  • Encrypting all data at rest to prevent unauthorized access.
  • Monitoring organization’s networks for security breaches and investigate violations
  • Preparing reports which document security breaches and extent of damage caused by breaches
  • Analysis of security Logs generated from all devices on our network
  • Conducting penetration testing and locate vulnerabilities in systems before could be exploited
  • Providing training for TPA staffs on different causes for security attacks related to human factor
  • Providing support to IT Department on installation of information security systems like IDS and IDPS
  • Training software developers best practices for secure software development


Information Security Consultant

MAYOCOO
10.2016 - 07.2019
  • Working together with software developers to ensure secure software development
  • Considered client concerns to determine best method to defend their systems
  • Provided training, technical support and guidance to staff in matters relating to information security to different organization and private companies
  • Assessed security risks and reported them to the IT team for strategic patching

IT Support Specialist

TANESCO
07.2016 - 09.2016
  • Industrial Practical Training

Education

BSc. - Computer and information security

University of Dodoma
01.2017

Advanced Certificate of Secondary Education -

Nyegezi Seminary
01.2014

Certificate of Secondary Education -

Nyegezi Seminary
01.2011

Skills

  • Penetration Tests
  • Reverse engineering
  • Transactions Analysis
  • Logs Analysis
  • Malware Analysis
  • Data protection
  • Audit Processes
  • Intrusion Detection
  • Shell Scripting
  • Windows Administration
  • Unix/Linux Administration

Certification

  • Certified Information Systems Auditor - CISA
  • Certified Ethical Hacker Master - CEH Master
  • Certified Android Pen tester & Bug Hunter

Languages

Excellent written and spoken English/ Swahili

Certificationstatement

I Liberatus Sylvester Kahere, certify that to the best of my knowledge and belief, that these data correctly describe my qualification and my working and ability.

Personal Information

  • Date of Birth: 02/17/94
  • Nationality: Tanzanian
  • Marital Status: Single
  • Religion: Christian

References

  • Salome Makombe, ICT security and Compliance Officer, Tanzania Railway Corporation (TRC), +255683382382
  • Damac Mfoy, Software Developer, Tanzania Revenue Authority, +255655252336
  • Antony Emmanuel, Information System Auditor, National Audit Office of Tanzania, +255656749242

Profile - Attributes

  • Diligent Information Security Specialist
  • Experience in Information security audit, network, web security and private corporate security systems
  • Deep interest in providing technology defense incident response
  • Ability to handle analysis and support in various technology areas
  • Competent in executing, drafting, and maintaining SOPs, along with incident reports

Additional Information

Achievements

  • Being the second in the world in the CEH Practical exam

Reference: https://www.eccouncil.org/wp-content/uploads/2024/03/ethical-hacking-leaderboard-oct-2023.png


  • Provision of training on Cybersecurity Audits to the Lesotho Supreme Audit Institution.







Timeline

Information Security Auditor

National Audit Office of Tanzania
05.2020 - Current

Head of Cyber Defense Unit

Tanzania Ports Authority
07.2019 - 07.2020

Information Security Consultant

MAYOCOO
10.2016 - 07.2019

IT Support Specialist

TANESCO
07.2016 - 09.2016

Advanced Certificate of Secondary Education -

Nyegezi Seminary

Certificate of Secondary Education -

Nyegezi Seminary
  • Certified Information Systems Auditor - CISA
  • Certified Ethical Hacker Master - CEH Master
  • Certified Android Pen tester & Bug Hunter

BSc. - Computer and information security

University of Dodoma
Liberatus Sylvester Kahere