Skip to content
View rwotolara-innocent's full-sized avatar
🎯
Focusing
🎯
Focusing

Block or report rwotolara-innocent

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Rwotolara-Innocent/README.md

Rwotolara Innocent 👋

Cybersecurity Analyst | SOC Analyst | Data Specialist

I investigate threats, turn noisy logs into clear stories, and design practical defenses for real organisations in Africa and beyond.
My work sits at the intersection of cybersecurity, governance, and data analytics.


🧑‍💻 About Me

I’m a cybersecurity analyst and data specialist based in Uganda, focused on SOC operations, threat hunting, incident response, and security programme design. I enjoy working where security meets data: parsing noisy logs, detecting suspicious behaviour, and turning findings into clear reports that non‑technical leaders can act on.

My background also includes data science and machine learning, where I learned to clean messy datasets, build predictive models, and communicate insights clearly. That foundation now supports my work in security analytics and ISO 27001‑aligned documentation. For example, I’ve applied data‑science techniques like e‑commerce analytics, marketing‑campaign analysis, and student‑feedback sentiment analysis to real‑world datasets — and I’m now learning how to connect those experiences to security‑driven insights such as anomaly detection and fraud prevention.

I also completed a Data Science Internship at Future Interns, where I strengthened my practical skills in Python, data cleaning, analysis, and reporting — skills I now use to support my data‑driven security work.

I’m especially interested in building portfolio‑ready, real‑world security projects that reflect low‑resource African environments, not just lab theory.


🛡️ Cybersecurity & GRC

  • Cybersecurity Analyst with hands‑on experience in SOC‑style analysis and incident‑response thinking.
  • ISO 27001 thinker: designing ISMS documentation for small, real‑world organisations (no corporate templates).
  • Risk‑driven security: linking threats → risks → controls → reporting, not just running tools.
  • Communication focus: translating security and risk topics into plain language for non‑technical audiences.

📂 Completed Project

ISO 27001:2022–aligned Information Security Management System for a grassroots NGO in rural Northern Uganda

This project shows what I can do as a cybersecurity analyst and GRC‑focused practitioner:

  • Designing an Information Security Policy and BYOD Agreement for a WhatsApp‑first, BYOD‑heavy NGO.
  • Building a risk‑based security framework: risk assessment, risk register, Statement of Applicability, and Risk Treatment Plan aligned with ISO 27001:2022.[web:100][web:103]
  • Creating practical playbooks and staff training content that real people (not just IT teams) can follow.
  • Writing a CEO‑level security report that explains security posture and priorities in non‑technical language.

This repo is my main portfolio‑anchor project and the best proof that I can think like a security analyst, not just a student.


💻 Skills

Cybersecurity & SOC

  • SOC analysis
  • Threat hunting
  • Incident response
  • Linux log investigation
  • Risk assessment
  • ISO 27001 documentation

Data & Analytics

  • Python
  • Pandas
  • Jupyter Notebook
  • Data cleaning
  • Exploratory data analysis
  • Basic machine learning
  • Applying data‑science techniques to real‑world datasets (e‑commerce, marketing, education)

Tools

  • Git & GitHub
  • Linux
  • Bash
  • VS Code
  • Power BI

🚀 What I’m Focusing On

  • Strengthening my cybersecurity analyst and SOC–threat‑hunting skills.
  • Building more short, complete projects (SOC log analysis, detection rules, security‑analytics notebooks).
  • Expanding my data‑driven approach to security and incident investigation.
  • Sharing cybersecurity knowledge with African learners and communities.

📫 How to Reach Me

Open to: SOC Analyst, Cybersecurity Analyst, Junior Threat Hunter, and Security/Data Intern roles (Remote or Hybrid).

Pinned Loading

  1. PaMaa_ISO27001 PaMaa_ISO27001 Public

    ISO 27001 ISMS built for a grassroots NGO in Northern Uganda. Risk register, gap analysis, policies, incident response, and Python risk visualisation - scoped for a real low-resource BYOD environment.

    Python