PETER MUIGAI

PETER MUIGAI

Computer Scientist,system and user support

Followers of PETER MUIGAI113 followers
location of PETER MUIGAIKenya

Connect with PETER MUIGAI to Send Message

Connect

Connect with PETER MUIGAI to Send Message

Connect
  • Timeline

  • About me

    Information System Security Engineer at CLIFF SOLUTIONS

  • Education

    • Karatina university

      -
      BSc computer science
  • Experience

    • Shneider electric

      Jun 2017 - now
      Computer Scientist,system and user support

      -Management of a Microsoft Active Directory-Installation, Configuration one image into the users machine -General user support(solving issues of outlook, Microsoft nav, setting up meeting projectors )-Enforcement of endpoint ,network and content security through McAfee enterprise system and Mail Defense email safety system-Supporting mission critical line of business application like ERP(Microsoft Dynamics Nav),email system and servers. -Critical servers Backups-Updating of Database information concerning users machine and their status.-liaison and negotiation with outsourced IT service providers, vendors and contractors-Support of the PABX-based telephone system-Inventory management-Asset tagging and record keeping.-Active Directory user account creation and email configurations-conducting trainings to SEK employees on some software applications such as business skype ,collaborative tool like yammer,teams and planner ,Ping identity tool, including other SE applications. Show less

    • CLIFF SOLUTIONS

      Jan 2018 - now
      Information System Security Engineer

      • 24/7 SOC Monitoring of security alerts: Using SIEM, FIM, Antivirus and threat hunting solutions like ATA and ATP to monitor user activity on systems on a real time basis, so as to detect and eliminate attacks and user behavior that exposes the organization to risk.• Incident management and response (Co-owned with the forensics team): Detect, perform first level analysis and escalate suspicious events in the shortest time possible.• File Integrity Monitoring:- Using Tripwire File Integrity monitor to detect changes taking place in systems and work with change management team to ensure proper process is followed when carrying out changes.- Using FIM to detect systems whose configurations are noncompliant to industry security standards.• Encryption of Sensitive Files and Folders: Encrypting files on file servers and PCs which contain sensitive and confidential data such as credit/ debit card numbers. Only those allowed to view the data will access the files.• Communication & User Awareness campaigns: Carrying out staff user awareness activities in order to increase vigilance among staff.• Process reviews & User reviews: Actively engaging in process reviews in order to discover and apply controls on any vulnerable systems and processes. Quarterly user reviews to ensure clean-up of dormant and ex-employee accounts from bank systems which may be used to perform breaches.• Reporting:- Quarterly executive reports on the information security posture of the bank with metrics assigned to show improvement or decline in specific areas e.g. Unauthorized changes detected over time.- Reporting on all attacks detected as well as actions taken and resolution status of each event.• Brand monitoring: Detecting site cloning and brand infringement to any of the organization’s online assets so as to take them down immediately. Show less

  • Licenses & Certifications