I'm Gifty,
a Network Engineer
& a Cisco certified
SOC Analyst.

About
Gifty is a Network Engineer and CISCO Certified SOC Analyst specializing in IoT & Digital Transformation. She leverages her technical expertise and visionary approach to bridge the gap between academia and industry, driving impactful technological solutions.
As a member of the prestigious ProphetsOfAI network, which includes global AI luminaries such as David Hanson of Hanson Robotics and Abran Maldonado of OpenAI, she actively contributes to advancing ethical AI and emerging technologies through thought leadership and collaboration.
AI PortfolioProjects
Connectivity
Efficient device connectivity
Advanced configurations.
Utilized a wide range of commands to seamlessly connect end devices, ensuring reliable communication within complex network environments. Applied advanced configuration techniques to optimize device interactions, achieving efficiency.
Project LinkPDU Design
IoT Environment Management
device interaction & monitoring
Engineered and tested IoT environments, integrating sensors and actuators for seamless device interaction and monitoring of physical conditions.
Project Linkmore...
A Simple Home Network
Networking
sensors and actuators for automation
Designed and implemented a simple home network to establish seamless connectivity between multiple devices. Configured routers, switches, and wireless access points to ensure reliable internet access, optimized performance, and enhanced security.
Project LinkNetworking
IoT Integration
virtually tested, & activated IoT devices.
successfully connected end devices within an office network, ensuring seamless communication and data flow between systems.
Project LinkMore Projects Done:
-
Network Configurationconnecting end devices
-
Environment Configuration and TestingDesigned, tested, and optimized IoT devices.
-
Home AutomationSeamless, efficient, and responsive home automation.
-
NetworkZPF Configuration
-
NetworkRemote inspection of submarine cable deployment
-
Cyber-SecurityConfigured Access Control Lists (ACLs)

Network configuration
Designed and configured secure, scalable networks to optimize performance and reliability. Implemented robust solutions for network monitoring, troubleshooting, and improving infrastructure efficiency.
- IOT
- Network configuration

Environment Configuration and Testing
Developed, modified, and managed IoT environments by integrating sensors to monitor physical conditions and configuring actuators to respond dynamically. Tested and activated devices to ensure seamless functionality and accurate interaction with real-world conditions.
- Designed, tested, and optimized IoT devices

Home Automation
designed and built a simple, yet effective home automation network, integrating various IoT devices to enhance convenience and efficiency. The system enabled seamless control of lighting, security, and temperature, offering real-time monitoring and remote access.
- Home Automation

Home Automation
designed and built a simple, yet effective home automation network, integrating various IoT devices to enhance convenience and efficiency. The system enabled seamless control of lighting, security, and temperature, offering real-time monitoring and remote access.
- Home Automation

ZPF Configuration
I implemented a Zone-based Policy Firewall (ZPF) configuration on the edge router, strategically segmenting the network into security zones to enforce specific traffic policies. This configuration improved overall network security by applying tailored access control rules between trusted and untrusted areas, ensuring optimal protection against unauthorized access and potential security breaches.
- Network

Remote inspection of submarine cable deployment
I conducted a thorough virtual inspection of an underwater cable network deployment, utilizing advanced simulation tools and real-time monitoring technologies. This process involved analyzing the installation's structural integrity, ensuring optimal alignment, and verifying the operational readiness of the network.
- Network

Configured Access Control Lists (ACLs) for Enhanced Network Security
Implemented and configured Access Control Lists (ACLs) to enforce strict security policies and regulate network traffic, ensuring only authorized users and devices gained access to critical resources.
- Enhanced Network Security
- Cyber-Security