Summary
Overview
Work History
Education
Skills
Self taught Ethical Hacker.
Timeline
Generic
John Msigwa

John Msigwa

System Analyst
Toronto,ON

Summary

Ambitious self-starter with more than 2 years of experience as an Information Security. Utilizes proven methodologies and tools, effective processes, and controls to guard against poor-quality data and security threats. Works exceptionally well individually or collaboratively with a first-class approach toward risk management. College graduate with a Degree in Computer Science specializing in Cyber Security.

I also posses strong computer programming skills that may be of great benefit to any organization.

Overview

2
2
years of professional experience
4
4
years of post-secondary education

Work History

IT Technician

JN CONVENTION CENTRE
Dar Es Salaam
02.2018 - 11.2019
  • Responded to support requests from end-users and patiently walked individuals through basic troubleshooting tasks.
  • Explained technical information in clear terms to non-technical individuals to promote better understanding.
  • Maintained office PCs, networks and mobile devices.
  • Tested and installed motherboards, processors, and graphics cards on desktops and laptops for corporate staff.
  • Assessed system hardware and software and suggested modifications to reduce lag time and improve overall speed.
  • Linked computers to network and peripheral equipment.
  • Used diagnostic tools to identify hardware failures and replace non-functional components.
  • Monitored server room, wireless network and other server infrastructure, keeping systems running smoothly.

Education

Associate of Science - Information Technology - Cybersecurity

Trebas Institute
Toronto, ON
10.2022 - 10.2023

Associate of Science - Computer Information Technology

UNIVERSITY OF DAR ES SALAAM
TANZANIA
01.2015 - 03.2017

Associate of Science - INFORMATION TECHNOLOGY

UNIVERSITY OF DAR ES SALAAM
2014.09 - 2015.09

Skills

Desktop Technical Support

undefined

Self taught Ethical Hacker.

Since i graduated with a diploma in information technology. I dove straight into ethical hacking.

Finding web application vulnerabilities and disclosing them so as to protect the integrity and confidential information of an organization.

Since ethical hacking  is a time consuming process, I have kept a log of all the research i have done on different types of computer systems and web applications.


I am currently enrolled at Trebas Institute pursuing a Diploma in Cyber Security Analyst to gain hands on more experience and knowledge on cyber security

At an  organization level i have prove to perform the following tasks successfully

  • Using port scanning tools like Nmap or Nessus to scan an organization’s systems and find open ports. The vulnerabilities with each of these ports can be studied and remedial measures can be taken.
  • Examining security patch installations and making sure that they can’t be exploited.
  • Engaging in social engineering concepts such as dumpster diving—literally rummaging through trash cans for passwords, charts, sticky notes, or anything with crucial information that can be used to generate an attack.
  • Employing other social engineering techniques like shoulder surfing to gain access to crucial information or playing the kindness card to trick employees to part with their passwords.
  • Making attempts to evade IDS (Intrusion Detection systems), IPS (Intrusion Prevention systems), honeypots, and firewalls.
  • Sniffing networks, bypassing and cracking wireless encryption, and hijacking web servers and web applications.

Timeline

Associate of Science - Information Technology - Cybersecurity

Trebas Institute
10.2022 - 10.2023

IT Technician

JN CONVENTION CENTRE
02.2018 - 11.2019

Associate of Science - Computer Information Technology

UNIVERSITY OF DAR ES SALAAM
01.2015 - 03.2017

Associate of Science - INFORMATION TECHNOLOGY

UNIVERSITY OF DAR ES SALAAM
2014.09 - 2015.09
John MsigwaSystem Analyst