Skip to content
View Hugh-Kumbi's full-sized avatar

Block or report Hugh-Kumbi

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Hugh-Kumbi/README.md

Hi, I'm Hugh Chanetsa πŸ‘‹

πŸ“ Hiroshima, Japan | πŸ›‘οΈ Cybersecurity Professional | πŸ’» Software Engineer | πŸš€ Founder

Python Linux SQL PowerShell Windows Server Active Directory OpenVAS Nessus SIEM Wireshark Docker VMware

Building secure systems and defending against cyber threats. Passionate about proactive threat detection, secure application development, and protecting organizations from evolving security challenges.

About Me

I'm a multidisciplinary cybersecurity professional combining technical expertise with a unique educational background spanning computer science, business, and social sciences. Based in Japan, I'm actively seeking cybersecurity opportunities while building Mei Vault Systems - a security-focused startup project where I'm developing practical solutions and expanding my technical portfolio.

Education:

  • πŸŽ“ B.S. Computer Science (Software Engineering) - University of the People
  • πŸ“Š B.Com (Hons) Management Studies - University of Cape Town
  • 🌐 B.A. Social Sciences (IR, Economic History, Industrial Sociology) - University of Cape Town

Current Focus

  • πŸ” Application Development Security & Secure Coding Practices
  • 🌐 Network Security & System Administration
  • πŸ€– Python Automation for Security Operations
  • πŸ“Š Security Information & Event Management (SIEM)
  • 🎯 Risk Assessment & Mitigation Strategies

Certifications

Featured Projects

Professional end-to-end vulnerability assessment framework demonstrating enterprise security operations.

A comprehensive vulnerability management lifecycle project showcasing:

  • Multi-scanner vulnerability assessment (OpenVAS, Nessus Essentials Plus)
  • Risk-based prioritization using CVSS + business impact analysis
  • Compliance mapping across NIST 800-53, ISO 27001, CIS Controls, PCI-DSS, HIPAA
  • Python automation for scan orchestration and reporting
  • Flask-based real-time metrics dashboard
  • SIEM integration (Wazuh) with correlation rules
  • 175+ vulnerable services across isolated lab environment (Metasploitable2/3, DVWA, OWASP Juice Shop)
  • Professional executive and technical reporting

Tech: OpenVAS Nessus Python Flask Wazuh Docker VMware NIST ISO 27001 Jupyter

Key Achievement: Built enterprise-grade vulnerability management lab demonstrating 225+ CVE assessments with automated remediation workflows and multi-framework compliance validation.


πŸ›‘οΈ Cybersecurity Portfolio

Comprehensive portfolio demonstrating security frameworks, incident response, and hands-on tools:

  • NIST Cybersecurity Framework implementation
  • Security audits and risk assessments
  • Linux & SQL security operations
  • Threat detection with Wireshark, tcpdump, Suricata
  • SIEM implementations (Splunk, Chronicle)
  • Python security automation scripts

Tech: Python Linux SQL Wireshark Suricata Splunk NIST Framework


Real-world security automation demonstrating Python's power in cybersecurity operations:

  • Login process automation and analysis
  • Pattern detection using regex
  • Security log parsing and investigation
  • Automated threat detection workflows

Tech: Python Regex Security Automation Log Analysis


Enterprise-grade AD environment showcasing Windows Server administration and security:

  • Windows Server 2025 deployment and configuration
  • Active Directory Domain Services (AD DS) setup
  • Group Policy Objects (GPO) implementation
  • User management and security policy enforcement
  • PowerShell automation scripts

Tech: Windows Server 2025 Active Directory PowerShell Group Policy DNS DHCP


Portfolio hub featuring documentation, academic projects, and professional development work focusing on DevSecOps and secure coding practices.

Technical Skills

Vulnerability Management & Assessment

  • Vulnerability Scanning (OpenVAS, Nessus Essentials Plus, Nuclei)
  • Risk Assessment & Prioritization (CVSS, Business Impact Analysis)
  • Compliance Frameworks (NIST 800-53, ISO 27001, CIS Controls, PCI-DSS, HIPAA)
  • Patch Management & Remediation Validation
  • False Positive Analysis & Multi-Scanner Correlation

Security Operations

  • Threat Detection & Incident Response
  • Security Auditing & Compliance (NIST, ISO)
  • Intrusion Detection Systems (Suricata)
  • SIEM Tools (Splunk, Chronicle, Wazuh)
  • Network Traffic Analysis (Wireshark, tcpdump)

Development & Automation

  • Python (Security Automation, Scripting)
  • SQL (Database Security, Query Analysis)
  • PowerShell (System Administration)
  • Secure Software Development Lifecycle

Infrastructure & Networking

  • Windows Server Administration
  • Active Directory & Group Policy
  • Linux System Administration
  • Network Security & Monitoring
  • TCP/IP, DNS, DHCP
  • Virtualization (VMware Workstation)
  • Lab Environment Design & Isolation

Tools & Technologies

  • Wireshark, tcpdump, Nmap
  • Docker & Container Security
  • Jupyter Notebooks
  • Git & Version Control
  • Virtual Lab Environments
  • Flask Web Development

πŸ“Š Portfolio Impact

CVEs Assessed Compliance Frameworks Lab Environments Certifications

Security Tools Automation

Key Achievements:

  • 🎯 225+ CVEs assessed across OpenVAS & Nessus scanners
  • πŸ›‘οΈ 5 Compliance Frameworks mapped (NIST 800-53, ISO 27001, PCI-DSS, HIPAA, CIS Controls)
  • πŸ”§ 4 Enterprise Labs built (175+ vulnerable services, isolated environments)
  • πŸ“Š Python Automation - 20+ security scripts, Flask dashboard, SIEM integration
  • πŸ… Industry Certifications - Google Cybersecurity Pro, ISC2 CC, Security+ (in progress)

What Drives Me

I'm passionate about staying ahead of emerging cyber threats and helping organizations build resilient security postures. My unique combination of technical skills, business acumen, and understanding of organizational dynamics enables me to approach cybersecurity challenges from multiple angles.

Core Values:

  • βœ… Ethical security practices and responsible disclosure
  • 🎯 Proactive threat hunting over reactive responses
  • πŸ”„ Continuous learning in an evolving threat landscape
  • 🀝 Knowledge sharing and community contribution

Connect With Me

LinkedIn Twitter Instagram Email Website

πŸ“„ View My Resume


πŸ’‘ Open to collaboration on cybersecurity projects and security research initiatives

🌏 Currently based in Hiroshima, Japan (UTC +9)

Pinned Loading

  1. Vulnerability-Management-Portfolio Vulnerability-Management-Portfolio Public

    A full end-to-end vulnerability management workflow demonstrating scanning, analysis, prioritization, remediation, and validation using industry-standard tools and intentionally vulnerable systems.

    Python

  2. Cybersecurity-Portfolio Cybersecurity-Portfolio Public

    I built a rigorous cybersecurity project portfolio for simulated clients, covering NIST frameworks, audits, Linux, SQL, assets, threats, vulnerabilities, detection, incident response, escalation, W…

    Jupyter Notebook 4

  3. Hugh-Kumbi-Active-Directory-Lab Hugh-Kumbi-Active-Directory-Lab Public

    This repository contains detailed documentation of my Active Directory (AD) home lab setup. It covers the entire process, including installing Windows Server 2025, configuring AD, creating users, a…

    PowerShell 4

  4. Python-Driven-Cybersecurity-Case-Study Python-Driven-Cybersecurity-Case-Study Public

    In this case study, I utilized Python to streamline the login process, perform an in-depth analysis of login data, and identify patterns using regular expressions. The project highlights how Python…

    Jupyter Notebook 1