As an enthusiastic Enterprise Security Consultant, my primary focus is developing and implementing Identity and Access Management (IAM) solutions that safeguard organisations from ever-evolving threats. What sets me apart is my unwavering commitment to continuous learning and staying ahead of the curve. I devote significant time and effort to keeping up with the latest developments, not only within Oracle's products but also in the wider industry. This passion for knowledge allows me to offer innovative and effective solutions to our customers and maintain a competitive edge.
Nairobi, Kenya
Nairobi, Kenya
Lagos, Nigeria
Nairobi, Kenya
Nairobi, Kenya
Nairobi, Kenya
Graduated with 3.5/4.0 grade point average.
Ministry of ICT and Innovation -- Kigali, Rwanda
In this post, we'll explore secure authentication and authorization for custom applications by configuring Federated SSOView more..
This tutorial incorporates the latest improvements to Postman and builds upon the fundamental principles detailed in the blog View more..
Here in this article, I’ll discuss some ideas and concepts of graph databases, what they are, What you should know in order to pick the correct data store.View more..
Welcome to the second part of my review of Steve McConnell’s influential text Code Complete (2nd Edition). If you haven’t already, please first read my Laying the Foundation Part 1 post. In this post, we will dig into the second part and continue View more..
Software Construction mainly includes; Requirements development, Planning, Software architecture/high-level design, Detailed design, Coding and debugging, Unit testing, Integration testing, System testing..View more..
The book Code Complete by Steve McConnell is acclaimed as one of the must-reads for all developers and is extremely well known. It is comparable to a practical handbook full of tips and learning examples..View more..