๐Ÿ‘‹ Hey, I'm Isla Sibanda

Cybersecurity Specialist & Technical Writer

I'm an ethical hacker and cybersecurity specialist based out of Pretoria. For over twelve years, I've worked as a cybersecurity analyst and penetration testing specialist for several reputable companies - including Standard Bank Group, CipherWave, and Axxess.

๐Ÿ“ง

12+
Years Experience
BSc
Computer Science
3
Major Companies

Why Should You Work With Me?

Most everyday people simply don't understand the intricacies behind compliance standards, cybersecurity documentation, user manuals, and so on simply because it's not their expertise.

But many of these people are in a position where they need to understand the key concepts behind these for purposes of or just for expanding their own knowledge.

That's where I come in. I pick up on the most important points and the supporting evidence to condense entire volumes of data into just a few paragraphs - and while at the same time ensuring that the resulting copy is not too generic so that it's useless.

If you're looking for an experienced technical writer who is skilled at processing complex data sets from technical documentation into comprehensible information that your readers can learn from, I'm your gal.

๐Ÿ“š

Familiar with Different Documentation Styles

I know full well how each piece of technical documentation is meant for a different audience and for a different purpose. In my career I've had the privilege of writing and presenting detailed reports.

๐Ÿ”

Synthesize Complex Subjects

I've learned how to formulate complex and highly technical concepts into easily digestible content. I'm fully aware that failing to properly communicate complex subjects not only creates confusion.

โšก

Productive and Efficient

Where other technical writers may labor over word choice, terminology, grammar, formatting, or following refined instructions, I embrace the challenge. I'm a believer in the concept of 'less is more.'

๐Ÿ’ก

Open Minded

It's very rare that a problem only has one solution, especially when it comes to cybersecurity. I'm receptive to new ideas as part of the problem solving process. I also pay close attention to detail.

My Experience

I obtained a Bachelor of Science in Computer Science from the University of Pretoria.

Cybersecurity Analyst

Cyber Security South Africa (CSSA) ยท Johannesburg

While employed as a cybersecurity analyst at Cyber Security South Africa (CSSA) in Johannesburg, I was responsible for performing cyber incident tests and analyzing high volumes of threat reports to determine the scope and urgency of cyber threats. This gave me experience and knowledge on how to identify and respond to major threat actors, especially those with regional and transregional focuses. I also analyzed major cyber engineering trends and provided detailed written reports to stakeholders.

Penetration Testing Specialist

CipherWave

I worked as a penetration testing specialist for CipherWave, where the bulk of my work focused on vulnerability scanning and remediation management. I ensured the company's vulnerability assessment policies and penetration testing standards were in alignment with CISO compliance requirements. I further honed my skills as a writer by writing and presenting detailed reports to senior leadership.

Network Security Specialist

Axxess

As a network security specialist at Axxess, I leveraged tools such as PowerShell and SCCM to perform hardware, software, and workstation configurations. I was the administrator for multi-site LAN/WAN network components. I also responded to emails and IT tickets on a daily basis to maintain high standards of customer service for the company.

Some of My Work

Published on Privacy Australia

How to Choose a Strong Password

Published on Impact Networking

Why Artificial Intelligence Is the Future of Cybersecurity

Published on The SSL Store

A Pentester's Guide to Strengthening Your Cloud Security Defenses

Published on Impact Networking

Attack Vector vs. Attack Surface: All You Need To Know

Published on The SSL Store

ICS Security in Healthcare: Why Software Vulnerabilities Pose a Threat to Patient Safety

Published on RSAConference

Synthetic Identity Fraud: What It Is and How to Recognize It

View More Articles

Looking forward to working with you!