Cybersecurity Analyst | SOC Analyst | Data Specialist
I investigate threats, turn noisy logs into clear stories, and design practical defenses for real organisations in Africa and beyond.
My work sits at the intersection of cybersecurity, governance, and data analytics.
I’m a cybersecurity analyst and data specialist based in Uganda, focused on SOC operations, threat hunting, incident response, and security programme design. I enjoy working where security meets data: parsing noisy logs, detecting suspicious behaviour, and turning findings into clear reports that non‑technical leaders can act on.
My background also includes data science and machine learning, where I learned to clean messy datasets, build predictive models, and communicate insights clearly. That foundation now supports my work in security analytics and ISO 27001‑aligned documentation. For example, I’ve applied data‑science techniques like e‑commerce analytics, marketing‑campaign analysis, and student‑feedback sentiment analysis to real‑world datasets — and I’m now learning how to connect those experiences to security‑driven insights such as anomaly detection and fraud prevention.
I also completed a Data Science Internship at Future Interns, where I strengthened my practical skills in Python, data cleaning, analysis, and reporting — skills I now use to support my data‑driven security work.
I’m especially interested in building portfolio‑ready, real‑world security projects that reflect low‑resource African environments, not just lab theory.
- Cybersecurity Analyst with hands‑on experience in SOC‑style analysis and incident‑response thinking.
- ISO 27001 thinker: designing ISMS documentation for small, real‑world organisations (no corporate templates).
- Risk‑driven security: linking threats → risks → controls → reporting, not just running tools.
- Communication focus: translating security and risk topics into plain language for non‑technical audiences.
ISO 27001:2022–aligned Information Security Management System for a grassroots NGO in rural Northern Uganda
This project shows what I can do as a cybersecurity analyst and GRC‑focused practitioner:
- Designing an Information Security Policy and BYOD Agreement for a WhatsApp‑first, BYOD‑heavy NGO.
- Building a risk‑based security framework: risk assessment, risk register, Statement of Applicability, and Risk Treatment Plan aligned with ISO 27001:2022.[web:100][web:103]
- Creating practical playbooks and staff training content that real people (not just IT teams) can follow.
- Writing a CEO‑level security report that explains security posture and priorities in non‑technical language.
This repo is my main portfolio‑anchor project and the best proof that I can think like a security analyst, not just a student.
- SOC analysis
- Threat hunting
- Incident response
- Linux log investigation
- Risk assessment
- ISO 27001 documentation
- Python
- Pandas
- Jupyter Notebook
- Data cleaning
- Exploratory data analysis
- Basic machine learning
- Applying data‑science techniques to real‑world datasets (e‑commerce, marketing, education)
- Git & GitHub
- Linux
- Bash
- VS Code
- Power BI
- Strengthening my cybersecurity analyst and SOC–threat‑hunting skills.
- Building more short, complete projects (SOC log analysis, detection rules, security‑analytics notebooks).
- Expanding my data‑driven approach to security and incident investigation.
- Sharing cybersecurity knowledge with African learners and communities.
- GitHub: github.com/rwotolara-innocent
- LinkedIn: linkedin.com/in/innocent-rwotolara
Open to: SOC Analyst, Cybersecurity Analyst, Junior Threat Hunter, and Security/Data Intern roles (Remote or Hybrid).

