Hood S. Mukiibi bio photo

Hood S. Mukiibi

Security Engineer

Email Twitter LinkedIn Github

I am a security engineer turned data analyst with a passion for leveraging exploratory and explanatory data analysis to help organizations swiftly detect threats and anomalies within their infrastructure. Currently, I am part of a team developing a smart, automated intrusion detection system that utilizes big data and machine learning concepts to enhance threat detection capabilities. Additionally, I collaborate with a team of security engineers to deliver complex security services, including threat hunting, log monitoring, vulnerability assessments, penetration testing, compliance, operational risk assessments, and managing stakeholder relationships.

One of my key strengths is my ability to effectively communicate with both technical and non-technical personnel, simplifying complex concepts for broader understanding. I excel at identifying and addressing communication gaps, enhancing overall information flow. My diverse experience spans various organizational settings, from large corporations to startup environments, across both private and public sectors. I am loyal, trustworthy, and excel in crisis situations. I am currently open to new opportunities in data science and cybersecurity.

I work at the Upanzi Network Lab, part of Carnegie Mellon University’s Cyber Security Lab (CyLab), focusing on fostering a secure and resilient digital transformation across various sectors. My role involves exploring and implementing secure use cases and deployment strategies for digital public infrastructure and digital public goods, particularly in areas such as health, digital identity, digital and mobile payments, data governance, privacy, and cybersecurity. Additionally, I engage in efforts to influence policy development to enhance cybersecurity measures and data protection protocols. We are located in the beautiful city of a thousand hills, Kigali, Rwanda.

Current Interests and Projects:

  • Usable security
  • Privacy, Law and how this influences policy
  • Data Analytics
  • Machine Learning in Security
  • Social Computing
  • Human Factors in Security
  • Information Assurance and Forensics
  • Threat Hunting and Threat Intelligence
  • Digital Public Infrastructure