Cybersecurity Enthusiast & Ethical Hacker

Hi, I'm Devox Otieno
A Digital Security Engineer,and
a Researcher

About Me

I am a motivated cybersecurity enthusiast with hands-on experience in penetration testing, ethical hacking, and cloud security. Proficient in network security, vulnerability assessment, and secure system architecture, I am eager to apply my technical expertise and problem-solving skills in a dynamic cybersecurity environment.

Currently pursuing a Diploma in Computer Science and Mathematics at Zetech University, I am actively engaged in CTF challenges, security research, and cybersecurity awareness programs.

  • Penetration Testing & Vulnerability Assessment
      Web Security
      Exploitation Techniques
      Ethical Hacking
  • Networking & Security
      TCP/IP, DNS
      Firewalls, IDS/IPS, SIEM
      Packet Analysis
  • Operating Systems
      Linux (Kali, Ubuntu)
      Windows
  • Programming & Scripting
      Python, Bash, SQL
      Web Scripting
  • Security Tools & Frameworks
      Nmap, Wireshark, Burp Suite
      OWASP ZAP, Metasploit
  • Containerization & Cloud Computing
      Docker, Kubernetes
      AWS, Microsoft Azure
  • Version Control & Collaboration
      Git, GitHub
  • JAN 2024 - AUG 2024
    Kosamtech Organization

      Help Desk Technician → Cybersecurity Researcher

        Provided first-level technical support and troubleshooting for software and network issues.
        Ensured timely resolution of user issues while maintaining high customer service standards.
        Transitioned into a cybersecurity role by leveraging hands-on problem-solving and technical expertise.
        Conducted vulnerability assessments and penetration tests to identify and remediate security flaws.
        Implemented secure coding practices and collaborated with software engineering teams.
  • 2023 - Current
    Bug Bounty Programs (HackerOne, Bugcrowd, Intigriti)

      Independent Bug Bounty Hunter

        Participated in various bug bounty programs to identify and report security vulnerabilities in web applications and systems.
        Discovered and responsibly disclosed vulnerabilities such as XSS, SQL Injection, and CSRF.
        Collaborated with development teams to provide remediation guidance and ensure timely fixes.
        Ranked in the top 10% of contributors on HackerOne for consistent high-quality submissions.
        Earned recognition and rewards for identifying critical vulnerabilities in high-profile programs.
  • 2022 till current
    Hacker101 CTF Challenges & Bug Bounty programs

      Participated in Capture The Flag (CTF) competitions

        Regularly participated in CTF challenges to sharpen skills in various aspects of cybersecurity.
        Focused on web security challenges, cryptography, reverse engineering, and exploitation techniques.
        Developed practical skills in identifying and exploiting vulnerabilities in controlled environments.
  • 2024 - Present
    Diploma in Computer Science and Mathematics at Zetech University
  • 2023 - 2024
    Cisco Network Academy
  • 2022 - 2023
    Huawei ICT Academy
  • Hack The Box Academy
      Bug Bounty Hunter
      Certified Penetration Tester
      SOC Analyst
  • TryHackMe
      Red Teamer
      Incident Response
      Reverse Engineering
  • Cisco Networking Academy
      Networking Basics
      CCNA
      Cybersecurity
  • Huawei ICT Academy
      Networking Certification
  • Udemy
      Programming Certification

Technical Projects

Home Office Network Setup

Configured and secured a home office network, gaining hands-on networking experience.

Implemented firewalls, VLANs, and security policies for secure data transmission.

Applied best practices for network segmentation and access control to enhance security posture.

View Project Details

Web Security Testing Lab

Developed a local penetration testing environment using Docker containers.

Deployed OWASP Juice Shop & DVWA for web security testing and ethical hacking practice.

Created a controlled environment to safely practice exploitation techniques and vulnerability assessment.

View Project Details

SIEM Implementation

Implemented and monitored Splunk & Suricata for real-time intrusion detection.

Analyzed network traffic & security logs to detect potential threats.

Configured alerts and dashboards to provide comprehensive visibility into security events.

View Project Details

Containerization & Cloud Security

Built secure, containerized environments using Docker & Kubernetes.

Deployed test applications on AWS & Microsoft Azure, gaining experience in cloud security best practices.

Implemented security controls and monitoring for cloud-based infrastructure.

View Project Details

Soft Skills

Critical Thinking & Problem Solving

Analytical approach to identifying and resolving complex security challenges.

Ability to think creatively when standard solutions don't apply.

Experience troubleshooting complex technical issues in high-pressure environments.

Effective Communication

Skilled at translating technical concepts into understandable terms for non-technical stakeholders.

Experience documenting security findings and recommendations in clear, actionable reports.

Ability to communicate effectively across different organizational levels.

Teamwork & Collaboration

Experience working with cross-functional teams to implement security solutions.

Ability to share knowledge and contribute to team objectives.

Collaborative approach to problem-solving and project implementation.

Adaptability & Continuous Learning

Commitment to staying current with evolving cybersecurity threats and technologies.

Ability to quickly learn and apply new tools and techniques.

Adaptable to changing priorities and requirements in dynamic environments.

My Achievements

Ethical Hacking Certificate

Ethical Hacking

This certificate validates my knowledge and understanding as an Ethical Hacker.
"I uncover vulnerabilities to strengthen defenses."
"Finding flaws to fortify security."
"Safeguarding systems through ethical probing."

Networking Certificate

Networking

This certificate validates my knowledge of network devices and infrastructure.
"I architect networks for seamless connectivity."
"Building bridges for digital connections."
"Optimizing networks for peak performance."

Cybersecurity Certificate

Cybersecurity

This certificate validates my knowledge of cybersecurity principles and practices.
"I defend against digital threats."
"Protecting data with vigilant oversight."
"Securing systems with strategic defenses."

See more

Contact Me