Boikokobetso Makhetloane

Boikokobetso Makhetloane

Brand Ambassador

Followers of Boikokobetso Makhetloane4000 followers
location of Boikokobetso MakhetloaneCity of Johannesburg, Gauteng, South Africa

Connect with Boikokobetso Makhetloane to Send Message

Connect

Connect with Boikokobetso Makhetloane to Send Message

Connect
  • Timeline

  • About me

    🎓Content Creator- I Make Cybersecurity Fun & Cool | 🚀Security Engineer | 🎓Threat & Security Intel | Your Fav Cyber Hero 🦸🏾‍♂️| 🚀SOC Analyst | 🎤Keynote Speaker |🎖️Multi-Award-Winning Children's Author

  • Education

    • Nigel High School

      2006 - 2012
      Matric
    • AAA School of Advertising

      2018 -
      Master of Business Administration - MBA Marketing
  • Experience

    • The Worx

      Feb 2013 - Aug 2013
      Brand Ambassador
    • EKFM

      Oct 2014 - Mar 2015
      I.T Technician

      •Maintaining and troubleshooting the computer systems used in the radio station, including software and hardware. •Installing and maintaining the radio station's networking equipment, such as routers and switches. •Configuring and maintaining the radio station's servers, including email servers, file servers, and web servers.•Monitoring the radio station's digital and analog audio transmission equipment, such as satellite receivers and transmitters. •Keeping track of the radio station's licenses, permits, and certifications related to IT and broadcast equipment.•Providing technical support to radio station staff, including training on new software and equipment. •Collaborating with other IT technicians and broadcast engineers to ensure that the radio station's IT systems and broadcast equipment are integrated and functioning properly. Maintaining the radio station's website, social media accounts, and online streaming services. Show less

    • VOICE OF WITS

      Jul 2015 - Nov 2016
      I.T Tech Support | Technical Producer

      •Install, configure, and maintain computer hardware and software systems used in radio broadcasting, such as audio editing software, music scheduling systems, and automation software.•Troubleshoot technical issues with hardware and software systems used in radio broadcasting, such as audio consoles, mixing boards, and transmitters.•Manage and maintain the station's website and online presence, including streaming audio and podcasting platforms.•Work with engineering and programming staff to ensure that on-air content and programming are delivered smoothly and reliably.•Set up and maintain computer networks and servers used in radio broadcasting, including local area networks and internet connectivity.•Develop and maintain disaster recovery and business continuity plans for the station's IT systems and infrastructure.•Ensure that the station's IT systems and infrastructure are in compliance with relevant regulations, such as those related to broadcasting and data privacy.•Develop and implement security protocols and procedures to protect the station's IT systems and data from unauthorized access or breaches.•Train and support station staff in the use of IT systems and software used in radio broadcasting. Show less

    • Massiv Metro

      Mar 2017 - Jan 2022

      *Design, implement, and maintain security infrastructure, including firewalls, intrusion detection systems, VPNs, and encryption protocols.*Conduct regular risk assessments to identify vulnerabilities and threats, and develop strategies to mitigate risks.*Lead incident response efforts, including analysis of attack vectors, forensic analysis, and remediation.*Monitor security systems and networks for suspicious activity, analyze security logs and alerts, and respond to security threats in real-time.*Develop and deliver security awareness training programs for employees and provide guidance on security best practices.*Develop, review, and update security policies, standards, and procedures to ensure compliance with regulatory requirements.*Work closely with IT teams to integrate security measures into technology architecture and infrastructure.*Conduct internal and external security audits, collaborate with auditors, and address findings to ensure compliance.*Stay current with security threats, trends, and technologies through ongoing research and evaluation of new security products.*Document security incidents, prepare reports on security metrics, incidents, and trends, and present findings to management and stakeholders. Show less •Documented help desk tickets/resolutions and assisted in daily administrations•Maintaining inventory of desktop equipment and ensuring their security•Conducting regular system and software updates to ensure optimal performance and security•Ensured security and performance, as well as troubleshooting issues.•Investigated network issues which led to the solution of long term network•Providing training and support to end-users on desktop software and hardware use and best practices.•Developing and implementing desktop support procedures and guidelines•Providing technical support and assistance to end-users in person, via phone or email•Managing desktop software licenses and ensuring compliance with software license agreements•Managing and monitoring computer systems and networks to ensure smooth operation•Providing technical support and assistance to end-users Show less •Maintain, troubleshoot, and operate radio production equipment including soundboards, microphones, recording devices, editing software, and other technical gear to ensure smooth production processes.•Set up and configure audio equipment and recording studios for live broadcasts, interviews, pre-recorded segments, and other productions. Ensure proper placement of microphones, adjustment of sound levels, and coordination of audio inputs and outputs.•Provide technical support to on-air talent, producers, and other staff during live broadcasts and recording sessions. Troubleshoot equipment issues, resolve technical problems, and ensure uninterrupted operation of audio equipment.•Mix and edit audio recordings to enhance sound quality, eliminate background noise, adjust volume levels, and create polished final products. Use editing software and sound processing tools to manipulate audio elements as needed.•Ensure the quality and integrity of audio content by monitoring sound levels, checking for distortion or other audio artifacts, and making adjustments as necessary to maintain optimal audio fidelity.•Collaborate with producers, directors, and other team members to plan and coordinate production schedules, including recording sessions, live broadcasts, and post-production activities. Ensure timely delivery of audio content according to production deadlines.•Perform routine maintenance tasks, equipment calibration, and repairs to ensure the reliability and functionality of radio production equipment.• Training and Documentation: Provide training and guidance to staff members on the proper use of audio equipment, recording techniques, and production workflows. Create documentation and user manuals for equipment operation and maintenance procedures.•Respond promptly to technical emergencies, such as equipment failures or power outages, to minimize disruptions to broadcast operations. Show less

      • Information Security Engineer

        Aug 2019 - Jan 2022
      • IT Specialist

        Mar 2017 - Jul 2019
      • Technical Producer Dj Sbu Breakfast Show

        Mar 2017 - Jul 2019
    • Catalisto

      Feb 2022 - Nov 2022
      Cyber Security Analyst

      •Monitoring security logs and alerts for suspicious activity.•Investigating security incidents and recommending mitigation strategies.•Configuring, deploying, and managing firewall devices to enforce security policies and control the flow of traffic between networks.•Regularly reviewing and updating firewall rulesets to ensure they align with the organization's security requirements and compliance standards.•Conducting proactive threat hunting exercises to identify hidden threats and potential security risks within the network.•Monitoring firewall logs for signs of suspicious activity, policy violations, and unauthorized access attempts, and taking appropriate action to address identified issues.•Analyzing security data and developing reports.•Conducting security research and staying up-to-date on the latest threats and vulnerabilities.•Assisting with the development and implementation of security policies and procedures.•Providing security awareness training to employees.•Working in the SOC team to gain knowledge and understanding of cybersecurity tools, technologies, and best practices.•Reviewing and analyzing security incidents and reporting on findings and recommendations for improvements.•Assisting the SOC team in incident response activities, including analysis, containment, and remediation of security incidents.•Collaborating with the SOC team to improve security monitoring and detection capabilities by identifying areas for improvement and implementing new tools and technologies.•Participating in regular security training and awareness programs to stay up-to-date on the latest threats and trends.•Developing and maintaining documentation on cybersecurity policies, procedures, and standards.•Working with teams from different countries to develop and implement cybersecurity strategies and programs. Show less

    • Nclose

      Jul 2023 - Dec 2023
      Cyber Security Analyst

      •Monitored network traffic and system logs to detect and respond to security threats and incidents.•Developed and implemented incident response plans, effectively containing and mitigating security breaches.•Analyzed emerging threats, vulnerabilities, and attack techniques to proactively enhance security measures.•Analyzed logs and event data to detect abnormal activities, investigated incidents, and ensured appropriate responses.•Investigate security alerts to determine if they are false positives or require further investigation.•Investigate security incidents to determine the root cause.•Escalate or liaise with team members to assist in determining the outcome of security incidents, as needed.•Communicate with clients to ensure that security incidents are resolved successfully.•Review, document, and refine response procedures for alerts to ensure that they are as effective as possible.•Develop, analyze, and report on alerts and their effectiveness.•Work with detection teams to fine-tune detectors to make them less likely to create false positives.•Work with detection teams to fine-tune detectors to make them less likely to create false positives.•Work with detection and infrastructure teams to optimize response workflow through automation, orchestration, or other innovative methods.•Monitor alert queues and respond to security alerts and incidents.•Manage cybersecurity incidents through to resolution.•Help drive forward good security practices for the business to deliver the best outcomes for customers/stakeholders.•Identify weaknesses in clients' defenses while investigating incidents to help drive continuous improvement. Show less

    • PathCare

      Jan 2024 - now
      Information Security Engineer

      •Design, implement, and manage security infrastructure, including firewalls, intrusion detection/prevention systems, VPNs, and other security devices.•Conduct regular security assessments and audits of the IT infrastructure to identify vulnerabilities and recommend solutions.•Utilize XDR platforms to monitor the organization's IT environment for suspicious activities, threats, and security incidents•Develop and maintain incident response plan to effectively and promptly address security incidents.•Conduct proactive threat hunting exercises to identify hidden threats and potential security risks within the network.•Investigate security incidents, analyse root causes, and implement corrective actions.•Implement and manage identity and access management solutions to ensure appropriate access controls.•Conduct regular reviews of user access permissions and make adjustments as necessary.•Develop and enforce security policies, standards, and guidelines to ensure compliance with industry regulations and best practices.•Stay abreast of changes in security regulations and ensure the organization's compliance.•Develop and deliver security awareness training programs to educate employees on security best practices.•Conduct regular phishing simulations to test and improve employee awareness.•Implement and manage security information and event management (SIEM) systems to monitor for and respond to security incidents.•Review security logs and reports on a regular basis.•Conduct regular penetration testing to identify and remediate vulnerabilities.•Collaborate with system administrators and developers to address identified vulnerabilities.•Staying informed about the latest security threats, vulnerabilities, and technologies.•Evaluate emerging security solutions and make recommendations for their implementation. Show less

  • Licenses & Certifications

    • ATT&CK for Security Operations Center (SOC) Assessments

      Cybrary
      Jul 2023
    • MITRE ATT&ACK Defender (MAD) ATT&CK Fundamentals Badge Training

      Cybrary
      Jul 2023
    • Cyber Threat Management

      Cisco Networking Academy
      Oct 2023
    • Governance, Risk, and Compliance (GRC)

      Udemy
      Jan 2023
    • Endpoint Security

      Cisco Networking Academy
      Oct 2023
    • Identitying Web Attacks Through Logs

      Cybrary
      Jul 2023
    • Certified Information Systems Security Professional (CISSP)

      Udemy
      Jan 2023
    • Cybersecurity

      Udemy
      Nov 2022
    • MITRE ATT&CK Defender SOC Assessment Training

      Cybrary
      Jul 2023
    • Cisco Network Defense

      Cisco Networking Academy
      Oct 2023
  • Honors & Awards

    • Awarded to Boikokobetso Makhetloane
      Digital Communication and Media Udemy Alumi Mar 2021