06/14/2025 updated


100 % available
Information System Auditor with IT Security and Data Analysis Expertise
Dodoma, Tanzania
Worldwide
Bachelor of Science (B.Sc.) in Computer ScienceInformation Security
Security Incident Response, Vulnerability Scanning and Penetration testing with professional certification as Certified Ethical Hacker (CEH)
IT Audit
Application Review/Audit and IT General Control Review with certification as Certified Information System Auditor (CISA)
Data Analysis
Data Analysis using Python, R and SQL with experience in data mining, modeling and extracting insights from large datasets
Database Management
Proficiency in relational databases including Oracle, SQL Server, MySQL, PostgreSQL, and MariaDB
ERD Creation
Proficiency in Entity-Relationship Diagram creation for database design and documentation
Risk Assessment
Strategic planning, risk management and assessment of business risks with evaluation of control effectiveness
Process Improvement
Continuous process improvement with attention to details and leadership skills
Security Incident Response, Vulnerability Scanning and Penetration testing with professional certification as Certified Ethical Hacker (CEH)
IT Audit
Application Review/Audit and IT General Control Review with certification as Certified Information System Auditor (CISA)
Data Analysis
Data Analysis using Python, R and SQL with experience in data mining, modeling and extracting insights from large datasets
Database Management
Proficiency in relational databases including Oracle, SQL Server, MySQL, PostgreSQL, and MariaDB
ERD Creation
Proficiency in Entity-Relationship Diagram creation for database design and documentation
Risk Assessment
Strategic planning, risk management and assessment of business risks with evaluation of control effectiveness
Process Improvement
Continuous process improvement with attention to details and leadership skills
Project history
Performed tests of IT processes and controls, conducted vulnerability assessments and penetration tests, assessed business risks, performed audits covering business and IT processes, and ensured compliance with IT security policies.
Conducted data mining and modeling, developed complex reports using SQL, analyzed inventory usage and transactions, processed data using Python, SQL, and Excel to build marketing models that improved ROI, and performed analysis on large datasets to extract insights on user behavior.