Skip to main content
Security-first systems

Build · Scale · Secure · Validate

Jozbert James Bhoyi

$ role: "systems_engineer"; stack: ["saas", "distributed", "off_sec"];

I build and harden systems that survive real traffic and real threats.

Engineering leadership from architecture to production: reliable backends, clear APIs, and security that holds up when it matters. I also pentest web apps and APIs so you fix critical issues on your timeline — not after an incident.

A security-first engineer who designs scalable systems and validates them like an adversary — so delivery speed does not come at the expense of trust.

Systems

Built for load, failure, and change

Architecture and implementation choices tied to throughput, failure modes, and operability — so growth does not rewrite your stack every year.

Business

Ship faster without gambling uptime

Clear boundaries and pragmatic delivery: fewer surprises in production, lower cost from rework and outages, and a path to scale that finance and ops can reason about.

Security

Find the break paths early

Defense in depth in design and code — plus structured web pentesting to surface exploitable issues, misconfigurations, and logic flaws before they reach users.

Shipping is not the finish line — operating securely at scale is.

I optimize for observability, resilience, and explicit trust boundaries. Where risk warrants it, I pressure-test the surface like an attacker (within scope and rules of engagement) so remediation happens on your schedule.

What I Do

Engineering and security, end to end

System Architecture & Design

  • Backends and platforms designed for growth and fault isolation
  • Service boundaries, contracts, and multi-tenant-aware design
  • API design that teams can integrate without guesswork

Full-Stack Development

  • React frontends with production-grade structure and performance
  • Django, REST/GraphQL-style APIs, and disciplined service layers
  • End-to-end ownership from schema to deployment

Performance & Scalability

  • Latency, throughput, and cost trade-offs made explicit
  • Resilience patterns: availability, backoff, and graceful degradation

Security Engineering

  • Authentication stacks (e.g. JWT, MFA) and session hardening
  • Authorization models: RBAC, least privilege, and enforcement points
  • Threat modeling and architecture reviews that catch design-level risk

Web Penetration Testing

  • Web applications and APIs assessed against real attack patterns (OWASP-aligned)
  • Findings ranked with evidence, impact, and fix guidance — not noise
  • Retest available after remediation when scope allows

Auditing & Maintenance

  • Code and architecture reviews focused on risk and maintainability
  • Performance and reliability investigations with actionable outputs
  • Security-oriented reviews that complement (not replace) pentesting

Featured Work

Proof over claims

Live product Retail SaaS · POS · Inventory · Cloud sync

Stooqo — POS, inventory, and cloud sync for African SMEs

Hands-on engineering on a live platform used in the field: point of sale, stock control, and sync across devices so shops stay accurate under real-world retail constraints — not demo-day assumptions.

Visit stooqo.com
  • Role: product engineering on a deployed retail stack (POS + inventory + sync)
  • Technical: multi-context sync, identity-aware access, and APIs shaped for store workflows
  • Impact: SMEs run daily sales and stock on one system — fewer stockouts, faster checkout, ops that match how shops actually work
  • Delivery: security- and scale-aware choices without sacrificing clarity for store staff

Outcome: operational software adopted in the field — reliability and fit matter as much as features.

Engagement snapshot

Retail operations platform in production — POS, stock control, and sync across devices. • Store-facing surfaces for checkout and inventory • Backend services for identity, sync, and authoritative stock • Shaped for real connectivity constraints and day-to-day shop workflows Engineering emphasis: dependable behavior in the field, clear operator experience, and security- and scale-aware decisions — without diagram theatre.

Summary only — not an architecture diagram or client deliverable.

For Sale

Featured Platforms

Digital Product Security Tools

Web App Security Scanner

Automated security scanner for web applications, identifying vulnerabilities and providing remediation guidance.

  • Automated OWASP top 10 checks
  • Detailed reports with evidence
  • API integration ready
Live Product Tourism & NGO Platform

FahariYetu

A full-stack tourism and NGO web platform for ngo.therealjozbert.com, supporting community projects, listings, and visitor engagement.

  • Full-stack platform for tourism and NGO operations
  • Community project listings and visitor engagement
  • Built for real-world production use
Consultation Services

Security Audit Package

Professional security audit for your web applications and APIs, with detailed findings and recommendations.

  • Full assessment report
  • Remediation plan
  • Follow-up support

How I Work

How engagements run

1

Align on outcomes

Goals, constraints, risk appetite, and what “done” means for your users.

2

Shape the architecture

Boundaries, contracts, data ownership, and failure modes — explicit early.

3

Build in iterations

Shipping slices with observability so behavior is visible in production.

4

Harden and verify

Authorization, hardening, reviews — and targeted pentesting when it adds signal.

5

Hand off cleanly

Measure, tune, document: operators and the next engineer are not left guessing.

Engineering · Assessment · Advisory

Tell me what you are building — or what needs to be tested

Whether you need delivery, a scoped web assessment, or both: share context, timeline, and constraints. I respond with a concrete next step — not a generic pitch.

Request a reply

Used only to respond to this inquiry.

Email me directly · +255 695 613 653

info@therealjozbert.com