Welcome to My Portfolio

I’m Bruno Bosire, a cybersecurity professional and software developer. This site showcases my work, projects, and thoughts on technology and security.


🚀 Professional Statement

I’m a data-driven tech enthusiast with a solid background in computer science and hands-on experience in data analytics, AI, and machine learning. I thrive on turning raw data into actionable insights, building predictive systems, and creating smart tools that solve real-world problems.

Skilled in Python, SQL, Power BI, and Tableau — I’ve led projects across industries like cybersecurity, IoT, and aviation, always focused on impact, innovation, and integrity.


🌐 Connect With Me


Docker Setup

title: “Docker Setup” date: 2025-06-11T12:32:25+03:00 section: “tutorials” categories: [“tutorials”, “docker”] title: Docker setup 🐳 date: 2024-05-06T12:43:45+03:00 author: Nicos draft: false tags: Docker Installation on Linux 🐋 Prerequisites: 64-bit Linux system: Verify using uname -m. If it outputs x86_64 or amd64, you’re good to go. Virtualization support: Check if your system supports hardware virtualization technologies like KVM. Refer to your distribution’s documentation for details. Steps: Update package lists: Bash sudo apt update # For Debian/Ubuntu-based systems sudo yum update # For Red Hat/CentOS-based systems Install dependencies: Bash sudo apt install apt-transport-https ca-certificates curl software-properties-common # For Debian/Ubuntu-based systems sudo yum groupinstall "Development Tools" # For Red Hat/CentOS-based systems Add Docker repository (choose one based on your distribution): Debian/Ubuntu:
Read more

Unit 42 Wireshark Quiz, January 2023

title: “Unit 42 Wireshark Quiz, January 2023” date: 2025-06-11T12:32:26+03:00 section: “security” categories: [“security”] title: Wireshark Malware Analysis date: 2025-02-7 author: Nicos draft: false tags: Quiz Question Review the pcap and answer the following questions for this month’s Unit 42 Wireshark quiz: When did the malicious traffic start in UTC? based on the first DNS interaction we can see the ip 192.168.1.27 What is the victim’s IP address? by visiting the statistics part of wireshark and going to the conversation section and selecting ipv4 you can see that ip addr 192.
Read more

Autoscaling

section: “Kubernetes and Cloud Native Essentials (LFS250)” categories: [“Kubernetes and Cloud Native Essentials (LFS250)”, “Cloud Native Architecture”] title: “Autoscaling” date: 2025-04-30 Autoscaling The autoscaling pattern describes the dynamic adjustment of resources based on the current demand. CPU and memory are the obvious metrics to decide on when to scale applications as load increases or decreases, but other methods based on time or business metrics can also be considered to scale your services up or down.
Read more

Characteristics Of Cloud Native Architecture

section: “Kubernetes and Cloud Native Essentials (LFS250)” categories: [“Kubernetes and Cloud Native Essentials (LFS250)”, “Cloud Native Architecture”] title: “Characteristics Of Cloud Native Architecture” date: 2025-04-30 Characteristics of Cloud Native Architecture Cloud Native Architecture Characteristics: Close High level of automation To manage all the moving parts of your cloud native application, automation is recommended in every step from development to deployment. This can be achieved by using modern automation tools and Continuous Integration/Continuous Delivery (CI/CD) pipelines (we will talk about pipelines more later in the course, but for now, please know that a CI/CD pipeline is a concept that can be used for the multiple steps that are needed when you deliver a new version of your software) that are backed by a version control system like git.
Read more

Cloud Native Architecture

title: Cloud Native Architecture date: 4-30-2025 author: Bruno draft: true tags: section: “Kubernetes and Cloud Native Essentials (LFS250)” categories: [“Kubernetes and Cloud Native Essentials (LFS250)”, “Cloud Native Architecture”] In this chapter, you will learn about the principles of modern application architecture, often referred to as Cloud Native Architecture. We will discover what makes these applications native to cloud systems and how they differ from traditional approaches. Learning Objectives By the end of this chapter, you should be able to:
Read more