Cybersecurity

Cybersecurity — Felix Fomengia

Cybersecurity Practice

Cybersecurity
Professional

Protecting organisations through strategic security frameworks, threat intelligence, and resilient infrastructure — built on deep expertise across enterprise and government environments.

50+
Security Cases Resolved
98%
Threat Detection
0
Breaches Post-Deploy

Security Services

01

Threat Intelligence

Proactive identification and analysis of emerging cyber threats before they reach your systems. Continuous monitoring, adversary profiling, and early-warning systems.

Proactive
02

Penetration Testing

Authorised simulated attacks on your infrastructure to expose vulnerabilities. Network, web app, social engineering, and red team operations.

Offensive
03

Security Architecture

Design of robust security frameworks — zero-trust models, network segmentation, identity management, and cloud security posture management.

Strategic
04

Compliance & GRC

Navigate complex regulatory landscapes — ISO 27001, GDPR, NIST, SOC 2. Risk assessment, gap analysis, and remediation roadmaps.

Governance
05

Incident Response

Rapid containment, investigation, and recovery when breaches occur. 24/7 response, forensic analysis, evidence preservation, and post-incident hardening.

Reactive
06

Security Training

Human firewall development — board-level cyber risk workshops, phishing simulation, OSINT awareness, and developer secure coding programmes.

Education
07

Email & Phishing Security

End-to-end email security hardening — SPF, DKIM, DMARC configuration, anti-phishing controls, business email compromise prevention, and staff simulation campaigns.

Preventive
08

Vulnerability Management

Continuous scanning and prioritisation of vulnerabilities across your infrastructure. Automated detection, CVSS scoring, patch tracking, and recurring remediation cycles.

Continuous
09

Data Protection & Encryption

Strategy and implementation of data classification, encryption at rest and in transit, key management, DLP policies, and regulatory-aligned data governance frameworks.

Proactive
10

Cyber Defense & Countermeasures

Active defence strategies including deception technologies, honeypots, threat hunting, and adversarial countermeasures to detect and neutralise attacks in real time.

Active Defense
11

Strategic Security Insight

Executive-level cybersecurity advisory — translating complex threat landscapes into business risk, security roadmaps, board reporting, and long-term resilience planning.

Advisory

Top Attack
Vectors 2024

  • Phishing & Social Eng.
    91%
  • Ransomware
    78%
  • Supply Chain Attacks
    65%
  • Zero-Day Exploits
    54%
  • Credential Stuffing
    47%
  • Insider Threats
    33%

Security
Posture Check

felix@cyberops:~
run security-audit --target client.org
// Initialising scan modules...
✓ Network topology mapped [247 nodes]
✓ SSL/TLS certificates validated
⚠ Outdated firmware detected [3 devices]
✓ Firewall rules audited [142 rules]
✗ CVE-2024-3094 — patch required
✓ IAM policies reviewed
⚠ MFA not enforced [12 accounts]
✓ Encryption at-rest verified
 
generate-report --format pdf
✓ Report generated: audit_2024_Q4.pdf

How I Work

01

Discover

Asset inventory, attack surface mapping, stakeholder interviews

02

Assess

Risk scoring, vulnerability analysis, threat modelling

03

Remediate

Prioritised patching, architecture improvements, controls

04

Harden

Zero-trust implementation, policy enforcement, hardening

05

Monitor

SIEM tuning, continuous monitoring, quarterly reviews

MSc Cybersecurity & Forensics — University of Westminster, London
UK National Cyber Security Centre Certified

Ready to Fortify
Your Defences?

Whether you need a rapid assessment, ongoing advisory, or incident response — let's talk about securing what matters most to your organisation.