Lyn Nansikombi
Details
Skills
Identity & Access Management (IAM)
Multi-Factor Authentication (MFA) Implementation
Credential Governance & Access Control
Vulnerability Assessment & Security Testing
Security Misconfiguration Identification
Secure Configuration & System Hardening
Cybersecurity Incident Detection & Escalation
Security Policy Compliance & Monitoring
Information Security Risk Assessment
Audit Documentation & Evidence Collection
Data Integrity, Confidentiality & Privacy Principles
Security Control Implementation (ISO 27001)
About
I'm a cybersecurity professional specializing in enterprise security operations, cloud infrastructure security, identity and access management, and IT systems administration. Brings hands-on technical training in cybersecurity, cloud systems, and network infrastructure, supported by industry-recognized certifications and practical project deployments across enterprise environments.
Formally trained in Infrastructure, Cloud Computing, and Cybersecurity, with applied experience implementing and securing Windows Server environments, Active Directory domain services, hybrid cloud infrastructure, Microsoft Exchange systems, and SQL Server baselines. Technical capabilities include multi-factor authentication (MFA) implementation, DNS consolidation, system hardening, vulnerability assessment, and security documentation aligned with modern information security frameworks.
Holds CompTIA Security+ (SY0-701) and ISO/IEC 27001 Foundation certifications, demonstrating strong knowledge of information security governance, risk management, incident response, access control, and enterprise cybersecurity best practices. Experienced in supporting secure cloud environments, identity security controls, and foundational security operations within hybrid IT ecosystems.
Recognized for a structured, analytical approach to security problem solving, technical documentation, and operational integrity. Known for communicating complex technical concepts clearly to both technical and non-technical stakeholders while maintaining strong attention to compliance, risk mitigation, and system resilience.
Brings a disciplined approach to cybersecurity operations with supporting expertise in cloud infrastructure, identity and access management, and enterprise system administration, enabling organizations to strengthen their security posture, operational stability, and risk management frameworks.