
Hud Daannaa
Systems/ Network Security Technician

Connect with Hud Daannaa to Send Message
Connect
Connect with Hud Daannaa to Send Message
ConnectTimeline
About me
Manager - Sr Security Architect (R&D) - Lead (Big Data & SOC Specialist) - Lecturer - MSc| CEH| AWS-SAA| AZ-500| GCHQ| EC-Council-CS-Career-Mentor | AI TopVoice
Education

Shiv-India Institute of Management & Technology (SIIMT)
2015 - 2016Certificate Trained Penetration TesterSCOPE:[ + ] [Experience with reconnaissance and vulnerability assessment tools (scanners).[ + ] Hands on experience with kali Linux and tools like Metasploit, SE Toolkit, Aircrack-ng, Burp suite, Nikto etc.[ + ] Ability to design and develop custom penetration tools, testing scripts and procedures with Python.[ + ] Examples are available on: https://github.com/huddryl/Penetration-testing-Attack-scripts[ + ] Exploit writing with python. Example modules/ Libraries are… Show more SCOPE:[ + ] [Experience with reconnaissance and vulnerability assessment tools (scanners).[ + ] Hands on experience with kali Linux and tools like Metasploit, SE Toolkit, Aircrack-ng, Burp suite, Nikto etc.[ + ] Ability to design and develop custom penetration tools, testing scripts and procedures with Python.[ + ] Examples are available on: https://github.com/huddryl/Penetration-testing-Attack-scripts[ + ] Exploit writing with python. Example modules/ Libraries are Scapy, Sockets, Sys, OS, Regular Expressions etc. Show less

IPMC Ghana
2008 - 2008Certificate Computer hardware and networkingCOMPUTER TECHNICIAN:[ + ] Setting up new computer systems and perform routine maintenance[ + ] Ensuring that Internet security software is updated and running properly[ + ] Maintaining computer equipment and software to ensure secure and efficient operations[ + ] Repairing computer hardware and servers as required[ + ] Testing and implementing new software programs for the companyNETWORK TECHNICIAN:[ + ] Managing and troubleshooting a basic network… Show more COMPUTER TECHNICIAN:[ + ] Setting up new computer systems and perform routine maintenance[ + ] Ensuring that Internet security software is updated and running properly[ + ] Maintaining computer equipment and software to ensure secure and efficient operations[ + ] Repairing computer hardware and servers as required[ + ] Testing and implementing new software programs for the companyNETWORK TECHNICIAN:[ + ] Managing and troubleshooting a basic network infrastructure.[ + ] Installing, operating and configuring wired and wireless networks.[ + ] Identify and explain common networking protocols and ports.[ + ] Identifying and troubleshooting performance and connectivity issues.[ + ] Installing, configuring and differentiating between common network devices.[ + ] Describing networking technologies and basic network design principles.[ + ] Adhere to wiring standards and using latest network testing tools Show less

ST Thomas Aquinas Senior High School (Ghana)
2005 - 2008WASSCE General ScienceSUBJECTS:[ + ] Elective Mathematics[ + ] Chemistry[ + ] Physics[ + ] Geography[ + ] Core Mathematics[ + ] Integrated Science[ + ] Computer Science[ + ] English Language[ + ] Physical Education

Omari Computer School
2005 - 2006Diploma Microsoft office applications diplomaSCOPE:[+] Microsoft Office Applications ( Databases with MS Access, Data analytics with MS Excel, Word processing with MS Word etc.)[+] Windows Operating Systems (95, 98, 2000, XP)[+] CMD (Batch Scripting)[+] Corel Draw[+] Microsoft Photo Draw

University of Surrey
2016 - 2017Master of Science (MSc) Information security (GCHQ)DISSERTATION: [ + ] Comparative analysis of Natural laws (Benford’s and Zipf’s laws) on network traffic (malicious e.g. DDOS and non-malicious traffic) detection. The project involved the application of statistical techniques using Python on Network traffic (Time series data) and similarity metrics to distinguish normal traffic from anomalies. CLOUD COMPUTING[ +] Designed a scalable multi-cloud application leveraging Big data [SEE PROJECTS… Show more DISSERTATION: [ + ] Comparative analysis of Natural laws (Benford’s and Zipf’s laws) on network traffic (malicious e.g. DDOS and non-malicious traffic) detection. The project involved the application of statistical techniques using Python on Network traffic (Time series data) and similarity metrics to distinguish normal traffic from anomalies. CLOUD COMPUTING[ +] Designed a scalable multi-cloud application leveraging Big data [SEE PROJECTS SECTION]MODULES:[+] Cryptography (Symmetric & Asymmetric)[+] Network Security (Snort IDS, Wireshark, Scapy etc.)[+] Information Security Management (ISO 27001, ISO 27002, NIST SP 800-61, NIST800-60 )[+] Secure systems (Managing vulnerabilities)[+] Multimedia and digital forensics[+] Databases (SQL ).PROGRAMMING LANGUAGES:[+] Python, MATLAB, Bash, power-shell/batch, C, C++, Ruby etc Show less
.webp)
Ghana Communication Technology University (GCTU)
2010 - 2014Bachelor of Science (BSc) Computer/ Telecommunications EngineeringActivities and Societies: National Society of Black Engineers (NSBE) [ + ] For an engineered based program my first to third years where engineering principles (subjects) a regular engineer would be familiarized with, e.i. Circuit theory, field theory, signals and systems, engineering mathematics, electronics, control theory etc. [+] The fourth-year came in two phases, my project work and the elective subjects of telecommunications, this brought me to the end of my degree, the subjects included mobile and satellite communications, communication networks,… Show more [ + ] For an engineered based program my first to third years where engineering principles (subjects) a regular engineer would be familiarized with, e.i. Circuit theory, field theory, signals and systems, engineering mathematics, electronics, control theory etc. [+] The fourth-year came in two phases, my project work and the elective subjects of telecommunications, this brought me to the end of my degree, the subjects included mobile and satellite communications, communication networks, digital signal processing, data communications etc. [+] Dissertation: Designed a voice activated wireless home system in a Three (3) man team. This project activates or deactivates basic home appliances with voice commands, one can think of it as a replacement for an on/off switch. This was aimed at making life more convenient for some physically challenged in the society, example the blind and the crippled. Show less
Experience

First October Network Academy (Ghana)
Jan 2012 - Mar 2014Systems/ Network Security Technician[+] Setting up and Configuring Microsoft Windows 2003/2008 servers, maintaining, patching, updating, and troubleshooting of operational systems. [+] Strong knowledge of the ICT infrastructure (operating systems, Networks, hardware, databases, etc.) used within own organization. Implementation and management of DHCP, DNS, Active Directory and Group Policies. [+] Working within a team to maintaining and administer perimeter security systems such as firewalls and intrusion detection systems.[+] Revision of the internal network protection, conduct device audit log review and perform network vulnerability scans. Show less

ADMINTELECOM ACADEMY
Jun 2014 - Nov 2014Fiber Optic and Transmission Technician (Networking)[+] Excellent understanding of the Fibre Optics Technology and also attained hands-on training on Fibre Optics Splicing and Testing using OTDR and Fusion Splicer equipment.[+] Monitoring of construction activities, fiber splicing, and termination; Assembly of, installs, and /or tests transmission equipment channel banks, channel service units (CSU), digital service units (DSU), modems, routers, etc.[+] Fibre Optical transmission theory and basic concepts of light and light transmission through the optical fiber. System attenuation Microbending, temperature & alignment, Fresnel reflection, numerical aperture.[+] Fibre Optic Cable types & specification. And also fibre cables for specific applications, cable construction, OM1, OM2, OM3, OS1, specification & management.[+] Tooling & fiber preparation, Hand tools, microscopes, polishing tools, stripping & cleaningFibre connectors & termination.[+] ST, SC & S.F.F connectors, epoxy, pre-filled & anerobictermination, common usage, termination procedures. Show less

Ministry of Communications and Digitalisation
Sept 2014 - Sept 2015Systems Support Engineer[+] Setting up operating systems, applications and ensuring that all jobs are properly scheduled on daily basis.[+] Installations, configurations and troubleshooting of computers, Cisco switches & routers, access points and bridges. [+] Providing both 1st and 2nd line IT technical support queries and maintaining a high degree of customer service.[+] Identifying and resolving IPS and IDS issues; ability to monitor and analyze Network Packets and Security Event Logs.[+] Strong knowledge of IT strategy development and effective IT operational delivery.[+] Able to work freely and provide own motivation, communicating skills and build a solid and effective senior staff relationship. Also brings the superiors up to speed on the information security threat landscape.[+] Participating in a multifunctional team by rendering technical Solutions that delivering operational functions on a broader scale. [+] Implementing a clear outline for identifying and communicating security incidents the takes place within the organization. Show less

First October Network Academy (Ghana)
Sept 2015 - Aug 2016Systems/ Network Security Engineer/ Penetration Tester[+] Theoretical and practical knowledge of Well-known networking protocols (services), attacks, exploits and vulnerabilities.[+] Strong networking experience with switches, routers, protocols, services and network programming.[+] Experience in Unix/ Linux server administration (Fedora and Debian), package management, configurations, and maintenance of services such as SSH, SAMBA, IPTables, system logging, Access control lists etc. Also, familiar with a broad range of open-source software.[+] Experience in working with coding languages (scripting knowledge) and the ability to automate processes/ tasks (e.g. Python). Sound knowledge in encryption and Authentication technologies.Selection and implementation of security tools, policies, and procedures in combination with the security team.[+] Experience with Packet analysis and security tools like Nmap, Wireshark etc. to monitor for emerging threat patterns and vulnerabilities.[+] Establishing communication, presentations and the ability to build relationships with internal/external clients. By managing and handling customer and client situations, requests and questions over phone, e-mail in a timely and detail-oriented manner to resolve information security related situations. Show less

Independent Consultant/Professional
Nov 2016 - nowCyber Security Researcher | Tool Developer & Penetration TesterSCOPE: Security Framework design| ASM (Vuln management & Pen-Testing) | SIEM | EDR (Threat hunting & detection) | CTI (Threat Intelligence Engineering & Analysis) [+] Projects sources: (A contributor to cyber security opensource & Capture the flag (CTF) committees)---[+] Sample projects available on: http://www.daannaa.space/porter.htm[+] Security projects available on GitHub: https://github.com/huddaannaa[+] CTF's Pen-Test walk-throughs at Vulnhub.com available on: www.huddaannaa.blogspot.com---NOTE: REVIEW LINKEDIN PROJECTS SECTION---Other services include:1. Researching, designing and the development of cyber security tools 2. Creating course content on the respective fields of expertise and training--- Show less

Business.daannaa.space
Nov 2017 - Nov 2018Cyber Security Consultant / Penetration Tester[+] Free-lance/Contractor[+] Teaming up with developers as a security consultant to implement application security with respect to the OWASP and other security-related issues in the SDLC of given projects.[+] Carrying out penetration tests, drafting detailed reports and performing information security gap analysis, risk assessment reports on security weaknesses, outlining possible business risks, and drafting recommendations/ controls.[+] Working closely with course teams to deliver guest lectures in cybersecurity to support learning, teaching, and assessment of professionals and undergraduate level students. Show less

Maguire LLC
Nov 2018 - nowSCOPE: ASM (Vuln mangmnt & Pen-Testng) | SIEM (Security data-lake design & develpmnt) | EDR/XDR (Threat hunting & Detection) | CTI (Threat Intelligence Engineering & Analysis) | SOAR (Playbook design & development) etc.RaptorX - EDR|XDR|SIEM - Lead engineer for design, Implementation, development, operation & training Managing a team of resident engineers to deliver, highest security cleared projects for entities like:> Top Investment Firms(UAE)> National Cloud Providers(UAE)> Multiple (National) Data centers(UAE)> Government sectors (Ministries-UAE) Key responsibilities (Lead SOC Architect/Engineer - R&D):[+] Designing and implementing security architectures and strategies for the SOC. Leveraging areas that highlights strong understanding of security operations, CTI,SOAR,SIEM etc. to help meet an organization's needs.[+] Providing guidance and mentoring on day to day working activities. Preparing training modules and delivering knowledge transfer sessions for clients and team members[+] Development and the implementation of security policies and procedures to ensure that the SOC operates effectively and efficiently, and that all security incidents are handled appropriately.[+] Selecting and implementing security technologies and tools for the SOC or having to design, develop and build these tools from the ground up[+] Training and mentoring SOC staff, analysts, engineers, and administrators, to ensure that they have the necessary skills to operate the SOC effectively.[+] Managing SOC operations, by overseeing security events, analyzing security data, and responding to security incidents.[+] The Ability to stay up-to-date with the latest security trends and technologies to ensure that the SOC is using the most effective security tools and strategies.[+] Conduct thorough testing and validation of SIEM solutions, continuously improving their performance and effectiveness.VISIT PROJECTS FOR DETAILS Show less SIEM (Security data-lake design & development) | EDR/XDR (Threat hunting & detection) | CTI (Threat Intelligence Engineering & Analysis) | SOAR (Playbook design & development) etc.[+] Developed custom penetration testing tools and wrote custom Metasploit modules. resource scripts and auxiliaries. Also performed network and application testing with solutions like, Burp, App Spider, Metasploit pro, Tenable SC/IO, OWASP ZAP. etc.[+] Monitoring information security alerts though the use of a SIEM to triage, mitigate, and escalate issues as needed while capturing essential details and artifacts. Ability to utilize sensor data and correlated logs containing IDS/IPS, AV, Windows events, proxy, and similar data to establish context and to rule-out false positives.[+] Gathering and analyzing open-source intelligence (OSINT), deeply understanding threat actors, their tactics, and operations, to produce and refine intelligence reports, overseeing vendor relationships, and monitoring global threat initiatives.[+] Staying updated on advanced threats, actively seeking out potential risks, and ensuring proactive responses within the organization. [+] Collaborating to boost team intelligence efforts, recommending innovative solutions, and testing new security technologies.[+] Lead security projects as needed while maintaining and improving set incident management standards and documentation[+] Develop incident response playbooks and investigate and identify, authenticated violations from a data-lake or some given SIEM solution. Utilization of security tools, such as a SIEM, AV, scanners, proxies, WAF (policies rules, process and workflow), IDS or forensics tools.FIND BELOW AN ATTACHED LINK TO A SAMPLE TOOL DESINGED, DEVELOPED & IMPLEMENTED: Show less ASM (Vuln management & Pen-Testing) Responsibilities:[+] Conducting regular vulnerability assessments on systems, software, and networks.Identify, categorize, and prioritize vulnerabilities in our digital assets. Collaborate with IT teams to ensure timely patching and mitigation.[+] Planning and executing penetration tests on applications, networks, and systems.Emulate cyber-attack scenarios to identify potential weaknesses before malicious actors do. Document findings and provide actionable recommendations for mitigation.[+] Continuously monitor and map the organization's digital attack surface. Identify and mitigate risks stemming from exposed digital assets.Collaborate with development and IT teams to reduce unnecessary exposure.[+] Producing clear and concise reports on vulnerabilities, pen-testing outcomes, and attack surface assessments. Present findings to both technical and non-technical stakeholders, advocating for necessary changes.[+] Guide and mentor junior team members in best practices and methodologies. Stay updated with the latest cybersecurity trends, tools, and best practices, and impart knowledge to the team.Stakeholder Collaboration:[+] Collaborate with different departments to integrate security measures into all aspects of the business.Engage with external vendors and partners to ensure third-party solutions adhere to the organization's security standards. Show less
Manager - Cyber Security Architect | (SOC-BIGDATA) Specialist
Nov 2020 - nowSnr.CybersecurityEng. | Lead (Sec. DataLake & Tool Integrator | Threat Detectn.&Intel Specialist)
Nov 2019 - Nov 2020Lead Cybersecurity Eng. (Vuln. Analysis & Pen Testing- ASM [Attack Surface Management])
Nov 2018 - Nov 2019

Middlesex University Dubai
Sept 2023 - nowLecturerFaculty Of Computer Engineering and Informatics - Cyber Security[+] Digital forensics |DFIR (Digital incident scene investigation)[+] Computer security & Ethical hacking
Licenses & Certifications
- View certificate

Building RAG Apps Using MongoDB
MongoDBMay 2025 - View certificate

EC-Council Cybersecurity Career Mentor
EC-CouncilJan 2023 
Certified Information Security Expect (CISE)
Innobuzz Knowledge Solutions Private LimitedJan 2015- View certificate

CompTIA Subject Matter Expert
CompTIAMay 2025 - View certificate

Certified Ethical Hacker (CEH)
EC-CouncilJan 2017 
Chunking Data for RAG Applications
MongoDBMay 2025- View certificate

Introduction to Generative AI
Google - View certificate

Government Communications Headquarters (GCHQ) - UK
National Cyber Security CentreJan 2016 - View certificate

Microsoft Certified: Azure Security Engineer Associate
MicrosoftJan 2023 - View certificate
.webp)
Amazon Web Services Solutions Architect Associate
Amazon Web Services (AWS)Jan 2022
Honors & Awards
- Awarded to Hud DaannaaSubject Matter Expect (SME) CompTIA Haz 2025
- Awarded to Hud DaannaaEC Council Career Mentor EC Council Eki 2023 This badge signifies that the holder is a cybersecurity professional with an esteemed Certified Ethical Hacker certification. Candidates earning this badge may share their knowledge, expertise, and guidance to help shape the next generation of cybersecurity professionals.
- Awarded to Hud DaannaaBsc Telecommunications engineering GCTU
- Awarded to Hud DaannaaMSc information security University of Surrey
Volunteer Experience
Author
Issued by LinkedIn on Jan 2024
Associated with Hud DaannaaContributor
Issued by GitHub on Jan 2015
Associated with Hud DaannaaPython Developer
Issued by PyPI on Jan 2024
Associated with Hud DaannaaBlogger
Issued by Blogspot.com on Jan 2018
Associated with Hud DaannaaAI Security Researcher
Issued by Rabitanoor| Cyber Research Center ® on Jan 2024
Associated with Hud DaannaaMember
Issued by OWASP® Foundation on May 2025
Associated with Hud DaannaaAmbassador
Issued by Wazuh on Jan 2025
Associated with Hud Daannaa
Languages
- enEnglish
- gaGa
- daDagare (wala), ghanaian
Recommendations

Maria flor duarte
Assistant Vice President, Enterprise Integration at iCapital NetworkLisboa, Lisbon, Portugal
Avinash gunturu
Materials Engineer |Mechanical EngineerAndhra Pradesh, India
Anton hartle
Project Deliverer | Leader | Problem Solver | Motivator | StrategistCity of Cape Town, Western Cape, South Africa
Ammar fadhil
PMP , ITIL4Baghdad Governorate, Iraq
Margaret nyambura njuho
▶ Human Resource Manager at Afrisend Money Transfer Limited 📌 Strategic HR Business Partner. 💎 Emp...Nairobi County, Kenya
Alexandre péan
Wealth managerLondon, England, United Kingdom
Abdul hadi
Senior Manager Projects Zameen.com | Ex Earthlink Developments | Ex Telenor Group | Ex Bank Alfalah ...Pakistan
金珍
Display EngineerHefei, Anhui, China
Phili denning
Founder of Naked Larder and experienced Event ManagerLondon, England, United Kingdom
Arunkumar jayaprakash
Advanced Consultant at CapgeminiStadt Hamburg, Hamburg, Germany
Kaiyum khan
Proactive and Fast-Learning experienced seeking a Challenging Role in public health.IOM - UN Migration
Adrian mirea
Chef Projet Technical Knowledge TransferMioveni, Argeş, România
Lucia arias
Undergrad Student at CSU Dominguez Hills - B.S Health Science: Healthcare ManagementLynwood, California, United States
Ketelem mendes
Vendor Management and Bidding Analyst Pl - BASES Innovation Pesquisa de Mercado | Consumer Insight...Cotia, São Paulo, Brazil
Mari laqui
Marketing and Entrepreneur graduate from Columbia ChicagoGreater Chicago Area
Agnes nyambura
Senior Technical Architect at Salesforce, Industries CloudNetherlands
Sarah frederick
Collections Manager at The Museum of FlightSeattle, Washington, United States
Yichen luo
汽车行业观察者Pudong, Shanghai, China
Cynthia yuan 袁迪雅
Assistant Director (Trade & Investment) at Department of Climate Change, Energy, the Environment and...Melbourne, Victoria, Australia
Sarah p.
Senior Information Technology Project ManagerGreater Milwaukee
...