Felix C. Uduma

Technical Threat Investigator | Threat Intelligence Engineering | Cybersecurity
London, GB.

About

Highly analytical Cybersecurity Analyst and Threat Intelligence professional with an MSc in Cybersecurity, specializing in end-to-end investigations of sophisticated threat actors, model misuse, and platform abuse. Expertly leverages internal telemetry, OSINT, and AI-assisted workflows to drive proactive threat detection, disruption, and safety improvements. Proven ability to translate complex technical findings into actionable intelligence and scalable solutions for diverse stakeholders, aligning with OpenAI's mission to secure AI for humanity.

Work

RelyOnHousekeeping Ltd
|

IT Governance & Security Compliance Analyst

United Kingdom of Great Britain and Northern Ireland

Summary

Led IT governance and security compliance initiatives, assessing controls and managing risk across SaaS platforms to ensure adherence to ISO 27001 and GDPR requirements.

Highlights

Conducted comprehensive security control assessments and cyber risk reviews across SaaS platforms and internal systems, identifying exploitable gaps and mapping findings to ISO 27001 and GDPR requirements.

Investigated identity access anomalies and third-party integration risks, compiling structured reports with clear remediation priorities for leadership and engineering teams.

Maintained and updated the risk register, tracking remediation progress and feeding results into governance reporting to provide senior stakeholders with a clear, real-time view of organizational risk posture.

Developed and implemented security metrics and dashboard reporting to enable leadership to monitor risk trends over time, enhancing proactive decision-making.

Managed audit readiness efforts, documenting control evidence and coordinating remediation tracking through ServiceNow-aligned ticketing workflows to streamline compliance processes.

Quorum Cyber
|

SOC Analyst

United Kingdom of Great Britain and Northern Ireland

Summary

Investigated security alerts and conducted threat hunting operations across multiple enterprise client environments, leveraging SIEM tooling and MITRE ATT&CK framework.

Highlights

Investigated security alerts across multiple enterprise client environments, addressing phishing campaigns, BEC incidents, malware activity, and suspicious user behavior from initial triage to documented findings and recommended actions.

Executed proactive threat hunting operations using MITRE ATT&CK to model adversary behavior, identifying threats that bypassed automated detection and enhancing overall security posture.

Analyzed network traffic, endpoint telemetry, and log data to identify indicators of compromise, misconfigurations, and attack paths across both cloud-hosted and on-premise infrastructure.

Authored structured incident reports and threat analysis summaries, providing clear, actionable findings and next steps directly usable by client security teams and senior stakeholders.

Collaborated with security engineers and client contacts to walk through findings, agree on remediation priorities, and track resolution using Jira and ServiceNow ticketing workflows, improving incident lifecycle management.

RomiaPay / Romia Energy Ltd
|

Cybersecurity & Compliance Consultant

United Kingdom of Great Britain and Northern Ireland

Summary

Conducted comprehensive security risk assessments and developed compliance strategies for a payment ecosystem, focusing on vendor security and platform vulnerabilities.

Highlights

Conducted third-party and vendor security risk assessments across a payment ecosystem, evaluating supplier security posture, API integration risks, and potential attacker access paths within the platform.

Reviewed payment platform architecture, cloud infrastructure, and API configurations to identify exploitable weaknesses, producing technical findings documents with practical mitigation recommendations.

Utilized OSINT and vendor intelligence to build a clearer picture of the external threat surface, informing targeted remediation priorities beyond generic compliance checklists.

Contributed to the design of threat detection controls and integrated investigative findings into governance frameworks, ensuring that assessment learnings actively improved platform security.

Produced compliance reports and technical briefings aligned to ISO 27001, PCI DSS, and GDPR, providing internal teams and leadership with essential detail for oversight and audit purposes.

Luchen Homes Ltd
|

IT Manager / Security Lead

Nigeria, Nigeria

Summary

Managed IT governance and comprehensive security operations, covering risk assessments, threat analysis, and vulnerability management across diverse infrastructure.

Highlights

Orchestrated IT governance and day-to-day security operations across cloud infrastructure, web-facing platforms, and internal systems, encompassing risk assessments, threat analysis, and vulnerability management.

Established and implemented security monitoring and incident response procedures from scratch, providing the organization with its first structured capability for detecting and responding to security events.

Designed and executed threat simulation exercises to stress-test controls and identify gaps in access control, data handling, and business continuity scenarios before potential attacker exploitation.

Developed and rolled out comprehensive security policies covering access, data protection, and continuity; delivered targeted security awareness sessions to enhance staff's ability to recognize and report real attacker tactics.

Generated executive-level security reporting and risk documentation, providing leadership with a grounded view of the organization's exposure and the strategic initiatives addressing it.

Education

Edinburgh Napier University
United Kingdom of Great Britain and Northern Ireland

MSc.

Cybersecurity

Michael Okpara University
Nigeria, Nigeria

B.Eng

Computer Engineering

Certificates

Cyber Threat Intelligence Analyst

Issued By

arcX

ISC2 CC - Certified in Cybersecurity

Issued By

ISC2

ISO 27001 Lead Auditor (ISMS)

Issued By

ISO

ISO 27001 Lead Implementer (ISMS)

Issued By

ISO

Business Management (Short Course)

Issued By

Heriot-Watt University, UK

Skills

Threat Intelligence & Investigations

Threat Intelligence, Threat Investigation, Incident Response, Forensics, Threat Hunting, Adversary Behavior, Attack Techniques, Indicators of Compromise (IOCs), OSINT, Telemetry Analysis, Security Risks, Sophisticated Threats, Model Misuse, Platform Abuse, Cyber Operations.

Security Operations & Detection

SOC Operations, Threat Detection, SIEM Monitoring & Log Analysis, Alert Triage, Malware Investigation, BEC Investigation, Phishing Campaigns, Suspicious User Behaviour, Network Traffic Analysis, Endpoint Telemetry, Threat Simulation, Red Team TTPs, Automated Detection.

Cybersecurity Governance & Compliance

Cyber Risk Assessment, Security Compliance, ISO 27001, GDPR, PCI DSS, NIST Cybersecurity Framework, Risk Registers, Governance Reporting, Audit Readiness, Security Control Assessments, Third-Party Security Risk, Vendor Security Posture.

Security Architecture & Systems

Security Architecture Review, Cloud Infrastructure, SaaS Platforms, API Configurations, Internal Systems, Access Control, Data Handling, Business Continuity, In-house Safety Systems.

AI-Assisted Workflows & Tooling

AI-Assisted Investigative Workflows, Scripting, Investigative Tooling, Automation, Agentic Workflows, Machine Learning Integration, Prototype Solutions.

Documentation & Reporting

Technical Documentation, Investigative Summaries, High-Signal Reporting, Compliance Reports, Security Metrics, Dashboard Reporting, Executive-Level Reporting, Written Communication.

Project Management & Collaboration

ServiceNow, Jira, Remote Support & Ticketing, Cross-functional Partnerships, Stakeholder Management.