Open to opportunities

Securing cloud-native apps from code to production

I'm Edwin Muema — a Cloud Security Engineer with 6+ years across Offensive and Defensive security. I embed security into the SDLC so engineering teams ship secure code by default.

3,000+Attacks Blocked Weekly
99%Vuln Remediation
95%Faster Incident Response
$30KAnnual Savings
muema@cloud-sec:~
$ whoami
Cloud Security Engineer | AppSec Lead
$ cat skills.yml
Offensive: VAPT, Red Team, Social Engineering
Defensive: DFIR, WAF, SIEM, EDR/XDR, SOC Ops
DevSecOps: SAST, DAST, SCA, CI/CD Security
Cloud: AWS, GCP, Heroku, Terraform
$ cat mission.md
"Shrink the attack surface — systematically."
$_
About

The Security Engineer Who
Thinks Like a Threat Actor

My career started in the offensive trenches — Vulnerability Assessment and Penetration Testing, then transitioned to Digital Forensics and Incident Response. Everything I build on the defensive side is powered by the threat-actor mindset.

I currently lead Application Security at OysterHR for a Globally Distributed Engineering Team. I've implemented WAF protections blocking thousands of attacks weekly, driven vulnerability remediation to near-zero across the codebase, and built DevSecOps pipelines that make security invisible yet highly impactful to developers.

Before that, I secured banking infrastructure at SBM Bank, led incident response on multi-million dollar cases at PwC, and conducted penetration tests across Financial services, Telecoms, and Energy sectors.

I hold the Google Cloud Professional Security Engineer certification and am passionate about mentoring the next generation of security professionals through KamiLimu, where I've directed technical curricula for 34+ mentees.

Offensive Roots

VAPT, Red teaming, Social Engineering

Defensive Depth

Digital Forensics with EnCase, FTK, Cellebrite; SOC operations, SIEM engineering, Endpoint protection (1,500+ endpoints), Network security

DevSecOps Builder

SAST/DAST/SCA in CI/CD, Terraform infrastructure-as-code security, secrets management, shift-left in SDLC

Cloud Security

AWS, GCP, Harness — IAM, RBAC, WAF configuration

Impact

Security Measured in
Business Outcomes

I believe security work that can't be quantified can't be improved. Here's what the numbers say.

3,000+
Cyber attacks blocked weekly via CloudFlare WAF
Zero false-positive outages. Less than 10ms latency impact.
99%
Vulnerability remediation in 3 months
Eliminated all Critical, High, and Medium issues from the main app codebase.
95%
MTTR reduction for brute-force attacks
Saving ~$30K annually in engineering time and incident response costs.
0.45%
Cost-to-risk ratio on Bug Bounty program
Responsible disclosure program delivering exceptional ROI through early remediation.
32%
False positive reduction in SOC operations
Fine-tuned SIEM detection rules to improve analyst efficiency at SBM Bank.
$7M+
Total losses addressed in incident response
Led IR at PwC covering digital forensics, e-discovery, and attribution across Cloud, On-Prem, and Mobile.
Experience

Where I've
Made an Impact

Senior Security Engineer | AppSec Lead
Oyster HR
Jan 2025 – Present
CloudFlare WAFSnykAikidoAWSDRATATerraformHarness
  • Blocked 3,000+ attacks/week via CloudFlare WAF with zero false-positive outages and <10ms performance impact
  • Led vulnerability management achieving 99% remediation in 3 months — zero Critical/High/Medium issues remaining
  • Reduced brute-force MTTR by 95%, saving ~$30K annually
  • Spearheaded shift-left security across the SDLC with Product Development leadership
  • Orchestrated SAST/DAST/SCA integration into CI/CD pipelines via Snyk and Aikido
  • Architected secure RBAC enforcing least-privilege across AWS, Heroku, Harness, and GitHub
Senior Cyber Security Engineer
SBM Bank (State Bank of Mauritius)
Nov 2022 – Jan 2025
SOC OpsCheckpointF5 WAFPortnox NACTrend MicroAzureAWSGCP
  • Led SOC operations — reduced false positive rate by 32% through detection rule fine-tuning
  • Directed VAPT for internal and external assessments including statutory extended scope audits
  • Managed endpoint protection for 1,500 endpoints using Trend Micro, FireEye, and Symantec
  • Led Privileged Identity Management and MFA across on-prem and cloud (Azure, AWS, GCP)
  • Directed network security: NAC (Portnox), perimeter firewalls (Checkpoint), WAF (F5) aligned with ZTNA
  • Trained 500 staff on security awareness and 30 IT staff on secure coding and DevSecOps
Senior Cyber Security Consultant
PricewaterhouseCoopers (PwC)
Jul 2021 – Nov 2022
DFIREnCaseCellebriteISO 27001NIST CSFPCI-DSS
  • Led incident response addressing $7M+ in losses — digital forensics with EnCase, Intella, Cellebrite, FTK
  • Conducted VAPT for 10 organizations covering web, mobile, cloud, and on-prem networks
  • Co-developed DevSecOps strategies implementing CI/CD security automation for 3 clients
  • Performed security assessments against ISO 27001, NIST CSF, PCI-DSS, CIS Top 20, OWASP, MITRE ATT&CK
  • Led solution architecture reviews for security tooling to maximize ROI for 4 clients
Penetration Tester & SOC Analyst
Visibility Technology Services
Oct 2020 – Jun 2021
  • Conducted VAPT for 5 organizations — internal, external penetration tests, and social engineering
  • Served as 1 of 4 SOC analysts in the Security Incident Response Team on-call rotation
  • Analyzed logs using Splunk, ELK, and FortiSIEM within client SLAs
Cyber Security Researcher
Serianu Africa Cyber Immersion Center
Sep 2019 – Apr 2020
  • Researched data privacy in Ethiopia and Botswana — published in Serianu Africa 2020 Cybersecurity Report
  • Coordinated a team of 8 researchers covering data protection across 5 African countries
Mentorship

Building the Next Generation of
Security Professionals

Through KamiLimu, a multi-award winning structured mentorship program, I've contributed to upskilling the next generation of tech talent.

Director, ICT Tracks

Coordinated technical curricula covering Data Science, Cloud Engineering, Software Development, and Cybersecurity for 34 mentees over 8 months.

KamiLimu Fellow (Cohort 6.0)

Mentored 5 cybersecurity students. Their project — Sentinel Master (Managed WAF for Financial Institutions on AWS) — won First Place in the Innovation Competition.

Mentee (Cohort 5.0)

One of 36 selected from a 20% acceptance rate. Won the Global EC Council Cyber Mega Challenge ($6,000 scholarship), plus public speaking and cybersecurity track competitions.

Recognition
Global Winner — EC Council Cyber Mega Challenge
KamiLimu Fellow — Cohort 6.0
Winner — Public Speaking Competition
Winner — Cybersecurity Track Mock Job Competition
Blog

Field Notes on
Cloud Security

Tutorials, case studies, opinions, and technical deep-dives on Offensive and Defensive security.

Signal

SOC2 Compliance Doesn't Mean You're Secure

The gap between checkbox compliance and actual security resilience — and what CISOs should prioritize beyond the audit.

4 min read · Apr 2026Read →
Labs

Practical Windows Forensics

A practitioner's guide to DFIR — evidence extraction with KAPE, registry analysis with RegRipper, MFT timelines, and execution artifacts.

Deep Dive · HackMDRead →
Labs

Malware Analysis Fundamentals

Breaking down the anatomy of malware — concealers, replicators, and bombs — with a methodology for static and dynamic analysis.

Deep Dive · HackMDRead →
Labs

Web Application Security 101

Walking a web app from recon to exploitation — content discovery, IDOR, SSRF, XSS, command injection, and authentication bypasses.

Deep Dive · HackMDRead →
Labs

Network Security 101

Passive and active reconnaissance — DNS enumeration, Nmap scanning, ARP discovery, and the tools behind network-level assessments.

Deep Dive · HackMDRead →
Labs

Nmap 101

Port scanning fundamentals — why proper enumeration is the backbone of effective exploitation, with practical scan types and techniques.

Deep Dive · HackMDRead →
Field Notes

Red Team Training: Kenobi

Walkthrough of the Kenobi CTF — enumerating Samba shares, exploiting ProFTPD, and leveraging SUID binaries for privilege escalation.

Walkthrough · HackMDRead →
Labs

Windows Privilege Escalation

Techniques and references for escalating privileges on Windows systems — from service misconfigurations to token impersonation.

Reference · HackMDRead →
Field Notes

How We Eliminated 99% of Vulnerabilities in 90 Days

The playbook for driving a production codebase from hundreds of known vulnerabilities to zero Critical/High/Medium issues.

8 min read · Coming SoonRead →
Signal

Your Shift-Left Security Strategy Is Probably Failing

Most teams are shifting the wrong things left. Here's what real shift-left security looks like.

4 min read · Coming SoonRead →
Labs

AWS IAM Least-Privilege: A Practical Walkthrough

How to audit, tighten, and automate IAM policies without breaking production.

10 min read · Coming SoonRead →
Field Notes

The $30K Brute-Force Problem We Solved in a Weekend

How quantifying security costs in dollars unlocked engineering buy-in and a 95% MTTR reduction.

5 min read · Coming SoonRead →
Certifications

Validated
Expertise

Professional Cloud Security Engineer

Google Cloud · Sep 2023

LogRhythm Platform Administrator (LRPA)

LogRhythm (Exabeam) · Aug 2024

Security, Compliance & Identity Fundamentals

Microsoft · Apr 2022

HCIA Routing & Switching

Huawei · Apr 2020

Education

BSc Electrical & Telecommunications Engineering · Multimedia University of Kenya · 2015 – 2020

Testimonials

What People Say About
Working With Me

"What stands out most is Edwin's communication and leadership style — clear, firm, and assertive, while consistently respectful and collaborative. He has rapidly established a modern security foundation at Oyster, leading the rollout and tuning of our WAF to protect our platform without downtime."

Engineering Leadership · Oyster HR

"Edwin drove DRATA compliance and played a key role in our successful SOC 2 audit. He significantly strengthened our cloud and infrastructure security by reshaping our AWS organization and IAM guardrails, and enforcing stronger access controls across the board."

Engineering Leadership · Oyster HR

"He helped operate a high-leverage responsible disclosure and bug bounty program that surfaces real risks early, quantifies avoided risk versus cost, and pushes us toward more systematic fixes for recurring issues."

Engineering Leadership · Oyster HR

"Edwin had an exemplary year and has performed at a level that would be expected of someone more senior and experienced. I therefore recommend him for the highest Impact Tier attainable."

Director · PwC

"Edwin was very instrumental during engagement delivery and applied his experience in Vulnerability Management to identify system fraud risks. He demonstrated very good leadership and contributed during client meetings."

Senior Manager · PwC

"Working with Edwin is a joy because of his work ethic in driving value realization for clients. He has continuously demonstrated integrity in his communication — an essential quality for a cybersecurity consultant."

Associate · PwC
Contact

Let's
Connect

Open to cloud security roles, AppSec leadership positions, and security consulting engagements.