Rowland Otieno

Rowland Otieno

@rowland-otieno

Information Security Architect

KE
rowland.otieno@mail.com

Summary

Visionary Cloud Solutions Architect and Cloud Security Engineer with expertise in designing, deploying, and managing cloud solutions across AWS, GCP, and Azure, currently driving cloud-native adoption at Safaricom. Former Head of ICT Security Operations at a tier-one Kenyan bank, overseeing ISO 27001 and PCI DSS compliance, risk management, and the security of 8.8M account holders' data. Proven leader in cybersecurity, incident response, and system automation, with a passion for aligning technical solutions with strategic business goals.

Overview

Total Experience

15 y 8 m

Total Projects

Total Skills

5

Certifications

0

Education

Bachelor of Business Administration

Highest Degree Achieved

Stats

Total Jobs

8

Avg Job Duration

1y 11m

Skills

Cloud Security Architect

Level: Master

Risk Assessment and Mitigation
Threat Modeling
Security Policies and Standards
Defence in Depth
Zero Trust Architecture
Principle of Least Privilege
Data Confidentiality, Integrity and Availability
NIST Cybersecurity Framework
OWASP for application security
Security by Design
Privacy by Design
Multi-factor Authentication
Identity Federation and Single Sign-On (SSO)
OpenIdentity
EKS
Fargate
Docker
AWS Certified Cloud Practitioner

Amazon Web Services (AWS)

Level: Master

EC2
Auto Scaling
S3
Glacier
RDS
ElastiCache
VPC
Route 53
Elastic Load Balancing
Direct Connect
IAM
AWS WAF
Cost Explorer
CloudWatch
EKS
Fargate
Docker
AWS Certified Cloud Practitioner

Linux Administration

Level: Master

ext4
yum
apt
rpm
Bash Scripting
Shell Automation
Process Management
SSH configuration and hardening
SELinux
Encryption via GPG, LUKS and OpenSSL
Networking via ifconfig, ip and nmcli
Squid Proxy
Privoxy
TOR
DHCP and IP address management
Load Balancing via HAProxy
System logs via rsyslog
Virtualization via KVM and QEMU
Containerisation via Docker and Podman
Container Orchestration via Kubernetes

Python

Level: Master

Python2/3
Data structures using lists, dictionaries and tuples
Object-Oriented Programming
File handling
Python standard library
Python web development using Django and Flask
Web scraping using BeautifulSoup and Selenium
GUI automation using PyAutoGUI
Python virtual environments using venv and Conda
Python dependency management using pip
JSON, CSV and XML parsing

Malware Analysis

Level: Master

Static analysis using Binwalk and Strings
Dynamic analysis using Wireshark and RegShot
Reverse engineering
Sandboxing
Debugging using OllyDBG
Assembly language
Python for automation
PowerShell
Indicators of Compromise
Privilege Escalation
Threat feed and reporting using VirusTotal
Forensics using Autopsy, FTK, Internet Evidence Finder (now Magnet Axiom) and EnCase (now OpenText Forensic)

Career Progression

Cloud Solution Architect/Cloud Security Engineer

2 years 5 months

Head, ICT Security Operations

1 years 6 months

Applications and Infrastructure Security Officer

2 years 3 months

Computer Incident Response and Forensics Manager

1 years 5 months

Team Lead, Cyber Security and Cyber Forensics

0 years 2 months

Cyber Security and Cyber Forensics Analyst

3 years 10 months

Full Stack Software Developer and Trainer

4 years 0 months