Felix C. Uduma
Technical Threat Investigator | Threat Intelligence Engineering | Cybersecurity
London, GB.About
Highly analytical Cybersecurity Analyst and Threat Intelligence professional with an MSc in Cybersecurity, specializing in end-to-end investigations of sophisticated threat actors, model misuse, and platform abuse. Expertly leverages internal telemetry, OSINT, and AI-assisted workflows to drive proactive threat detection, disruption, and safety improvements. Proven ability to translate complex technical findings into actionable intelligence and scalable solutions for diverse stakeholders, aligning with OpenAI's mission to secure AI for humanity.
Work
RelyOnHousekeeping Ltd
|IT Governance & Security Compliance Analyst
United Kingdom of Great Britain and Northern Ireland
→
Summary
Led IT governance and security compliance initiatives, assessing controls and managing risk across SaaS platforms to ensure adherence to ISO 27001 and GDPR requirements.
Highlights
Conducted comprehensive security control assessments and cyber risk reviews across SaaS platforms and internal systems, identifying exploitable gaps and mapping findings to ISO 27001 and GDPR requirements.
Investigated identity access anomalies and third-party integration risks, compiling structured reports with clear remediation priorities for leadership and engineering teams.
Maintained and updated the risk register, tracking remediation progress and feeding results into governance reporting to provide senior stakeholders with a clear, real-time view of organizational risk posture.
Developed and implemented security metrics and dashboard reporting to enable leadership to monitor risk trends over time, enhancing proactive decision-making.
Managed audit readiness efforts, documenting control evidence and coordinating remediation tracking through ServiceNow-aligned ticketing workflows to streamline compliance processes.
Quorum Cyber
|SOC Analyst
United Kingdom of Great Britain and Northern Ireland
→
Summary
Investigated security alerts and conducted threat hunting operations across multiple enterprise client environments, leveraging SIEM tooling and MITRE ATT&CK framework.
Highlights
Investigated security alerts across multiple enterprise client environments, addressing phishing campaigns, BEC incidents, malware activity, and suspicious user behavior from initial triage to documented findings and recommended actions.
Executed proactive threat hunting operations using MITRE ATT&CK to model adversary behavior, identifying threats that bypassed automated detection and enhancing overall security posture.
Analyzed network traffic, endpoint telemetry, and log data to identify indicators of compromise, misconfigurations, and attack paths across both cloud-hosted and on-premise infrastructure.
Authored structured incident reports and threat analysis summaries, providing clear, actionable findings and next steps directly usable by client security teams and senior stakeholders.
Collaborated with security engineers and client contacts to walk through findings, agree on remediation priorities, and track resolution using Jira and ServiceNow ticketing workflows, improving incident lifecycle management.
RomiaPay / Romia Energy Ltd
|Cybersecurity & Compliance Consultant
United Kingdom of Great Britain and Northern Ireland
→
Summary
Conducted comprehensive security risk assessments and developed compliance strategies for a payment ecosystem, focusing on vendor security and platform vulnerabilities.
Highlights
Conducted third-party and vendor security risk assessments across a payment ecosystem, evaluating supplier security posture, API integration risks, and potential attacker access paths within the platform.
Reviewed payment platform architecture, cloud infrastructure, and API configurations to identify exploitable weaknesses, producing technical findings documents with practical mitigation recommendations.
Utilized OSINT and vendor intelligence to build a clearer picture of the external threat surface, informing targeted remediation priorities beyond generic compliance checklists.
Contributed to the design of threat detection controls and integrated investigative findings into governance frameworks, ensuring that assessment learnings actively improved platform security.
Produced compliance reports and technical briefings aligned to ISO 27001, PCI DSS, and GDPR, providing internal teams and leadership with essential detail for oversight and audit purposes.
Luchen Homes Ltd
|IT Manager / Security Lead
Nigeria, Nigeria
→
Summary
Managed IT governance and comprehensive security operations, covering risk assessments, threat analysis, and vulnerability management across diverse infrastructure.
Highlights
Orchestrated IT governance and day-to-day security operations across cloud infrastructure, web-facing platforms, and internal systems, encompassing risk assessments, threat analysis, and vulnerability management.
Established and implemented security monitoring and incident response procedures from scratch, providing the organization with its first structured capability for detecting and responding to security events.
Designed and executed threat simulation exercises to stress-test controls and identify gaps in access control, data handling, and business continuity scenarios before potential attacker exploitation.
Developed and rolled out comprehensive security policies covering access, data protection, and continuity; delivered targeted security awareness sessions to enhance staff's ability to recognize and report real attacker tactics.
Generated executive-level security reporting and risk documentation, providing leadership with a grounded view of the organization's exposure and the strategic initiatives addressing it.
Education
Edinburgh Napier University
→
MSc.
Cybersecurity
Michael Okpara University
→
B.Eng
Computer Engineering
Certificates
Cyber Threat Intelligence Analyst
Issued By
arcX
ISC2 CC - Certified in Cybersecurity
Issued By
ISC2
ISO 27001 Lead Auditor (ISMS)
Issued By
ISO
ISO 27001 Lead Implementer (ISMS)
Issued By
ISO
Business Management (Short Course)
Issued By
Heriot-Watt University, UK
Skills
Threat Intelligence & Investigations
Threat Intelligence, Threat Investigation, Incident Response, Forensics, Threat Hunting, Adversary Behavior, Attack Techniques, Indicators of Compromise (IOCs), OSINT, Telemetry Analysis, Security Risks, Sophisticated Threats, Model Misuse, Platform Abuse, Cyber Operations.
Security Operations & Detection
SOC Operations, Threat Detection, SIEM Monitoring & Log Analysis, Alert Triage, Malware Investigation, BEC Investigation, Phishing Campaigns, Suspicious User Behaviour, Network Traffic Analysis, Endpoint Telemetry, Threat Simulation, Red Team TTPs, Automated Detection.
Cybersecurity Governance & Compliance
Cyber Risk Assessment, Security Compliance, ISO 27001, GDPR, PCI DSS, NIST Cybersecurity Framework, Risk Registers, Governance Reporting, Audit Readiness, Security Control Assessments, Third-Party Security Risk, Vendor Security Posture.
Security Architecture & Systems
Security Architecture Review, Cloud Infrastructure, SaaS Platforms, API Configurations, Internal Systems, Access Control, Data Handling, Business Continuity, In-house Safety Systems.
AI-Assisted Workflows & Tooling
AI-Assisted Investigative Workflows, Scripting, Investigative Tooling, Automation, Agentic Workflows, Machine Learning Integration, Prototype Solutions.
Documentation & Reporting
Technical Documentation, Investigative Summaries, High-Signal Reporting, Compliance Reports, Security Metrics, Dashboard Reporting, Executive-Level Reporting, Written Communication.
Project Management & Collaboration
ServiceNow, Jira, Remote Support & Ticketing, Cross-functional Partnerships, Stakeholder Management.