Olunga Oranga - Cloud Security Architect

Olunga Brandon Oranga

Cloud Practitioner | Pentester

About Me

I’m also a

What I Do

  • Conduct penetration testing and vulnerability assessments using Kali Linux, Burp Suite, and Metasploit
  • Develop custom scripts in Python and Bash for automation and security tool enhancement
  • Build and manage hands-on labs using TryHackMe, Hack The Box, and Cisco Networking Academy
  • Analyze attacker behavior using MITRE ATT&CK tactics to strengthen defensive strategies
  • Study and implement foundational cloud security concepts in AWS and GCP environments
  • Apply ethical hacking methodologies (CEH) to identify, exploit, and patch security flaws

Technical Toolkit

Cloud Platforms

AWS (EC2, IAM, S3) Google Cloud (Foundations) Azure (Basics) Cloud Security Principles

Security & Compliance

MITRE ATT&CK CIS Benchmarks (Linux) Ethical Hacking (CEH) Basic SIEM Concepts

Programming

flutter Java Bash/Shell JavaScript (Basics) HTML/CSS

DevOps & Automation

Git & GitHub CI/CD (Foundations) Linux Automation Scripts Cloud CLI Tools

Security Tools

Wireshark Nmap Burp Suite Metasploit Hydra John the Ripper

Operating Systems

Kali Linux Ubuntu Server/Desktop Windows (Security Labs) macOS (Workstation)

Learning Platforms

TryHackMe Hack The Box Cisco Networking Academy TCM Security Academy

Latest Articles

Certifications

Cloud Security Lab

Interactive demonstrations of cloud security concepts and attack simulations

IAM Policy Simulator

Test cloud IAM policies against sample API actions to understand access control patterns and least privilege principles.

IAM Policy

Test Actions

Results

Real-time Attack Simulation

Simulate common cloud attack patterns and see how security controls can prevent them.

Zero Trust Architecture

Explore how Zero Trust principles apply to cloud environments with this interactive demo.

Core Principles

πŸ”
Verify Explicitly

Authenticate and authorize every request based on all available data points

πŸ“‰
Least Privilege

Grant just-in-time and just-enough-access with risk-based adaptive policies

πŸ”„
Assume Breach

Minimize blast radius and segment access to prevent lateral movement

πŸ”
Continuous Monitoring

Real-time analysis of all network traffic and access patterns

🧩
Microsegmentation

Divide networks into secure zones with individual access controls

πŸ€–
Automated Response

Implement AI-driven threat detection and automated remediation

πŸ“œ
Policy Enforcement

Consistent security policies across all environments and devices

πŸ”—
Encryption Everywhere

Data encryption in transit and at rest by default

Network Security

Visualize security groups and network ACLs in a cloud environment.

Featured Projects

AWS Security Architecture

AWS Zero Trust Architecture

Designed and implemented a Zero Trust security model for AWS environments using IAM, SCPs, and network segmentation.

AWS IAM Terraform Python
View Details
Threat Detection System

AI-Powered Threat Detection

Developed a machine learning model to detect anomalous behavior in cloud logs with 94% accuracy.

Python AWS Lambda TensorFlow
View Details
Compliance Automation

Compliance Automation Framework

Automated CIS benchmark compliance checks across AWS accounts, reducing audit time by 70%.

AWS Config Python Serverless
View Details

Professional Resume

Client Testimonials

"Brandon implemented a comprehensive security framework for our AWS infrastructure that helped us achieve SOC 2 compliance. His expertise in IAM and network security was invaluable."

Client

person1

Solutions Architect

"The threat detection system Olunga designed reduced our incident response time by 60%. His ability to explain complex security concepts to our team was exceptional."

Client

person2

Director of Security

Get In Touch

Contact Information

Have a project in mind or want to discuss cloud security? Reach out through the form or directly via email.

+254743702124
Nairobi, Kenya