Hey! I am

Pernelle Mensah

I'm a

visitors so far

Professional Experience

2024 – Present

Cybersecurity consultant and Workflow automation specialist

Freelance, New York

  • Cybersecurity Assessment
    • Conducted structured security assessments for SMBs in finance, healthcare and non-profit sectors
    • Delivered actionable reports with prioritized improvements for access control, user awareness, and infrastructure hardening
  • Business Workflow Automation
    • Designed and implemented no-code/low-code workflow automations using Make.com, Zapier, and business-related tools to streamline CRM synchronizations, financial reporting and communication, reducing manual effo rt for clients by 30–50%

2019-2024

Microservices cybersecurity research engineer

Nokia Bell Labs, France

  • Contributed to a team of 5 researchers, to design a micro-services behavioral analysis solution to decrease detection time of anomalous behaviors and secure telecommunication infrastructures
    • Conducted technical analysis and identified requirements for 5G and 6G cloud-native platforms
    • Designed and implemented detection metrics to identify micro-services anomalous behaviors
    • Refactored existing vulnerability testing platform to adapt to proposed solution and validate results, leveraging existing testing resources and decreasing experimentation time
  • Administered and hardened lab testing platform using best practices (Linux)
  • Presented to 15+ internal, academic and international events – Co-authored 4 patents

2015-2019

Cloud Cybersecurity research engineer / PhD candidate

Nokia Bell Labs, France

  • Completed a Ph.D. thesis addressing risk assessment in Cloud infrastructures using attack graphs
    • Analyzed and synthesized 150+ security research articles to identify security gaps
    • Designed, implemented and tested risks’ evaluation, prioritization and remediation in dynamic environment
    • Integrated cloud vulnerabilities in attack graph modeling, increasing modeling accuracy
  • Planned and implemented a large scale reproducible Cloud platform of 1000+ virtual nodes using Puppet, Openstack and Onos controller to validate proposed security algorithms
  • Administered and hardened lab testing platform using best practices (Linux)
  • Published and presented results obtained from 4 years of research to 15+ internal, local and international events, including peer-reviewed conferences and workshops

Dynamic Topology Extraction in Cloud Infrastructures

Connectivity graph reconstruction for networking cloud infrastructures

Generation and dynamic update of attack graphs in cloud providers infrastructures

2015

Cybersecurity research engineer (internship)

Nara Institute of Science and Technology (NAIST), Japan

Investigated HTTPS phishing risks across 1,000+ SSL certificates – Developed a browser plugin using machine learning to detect spoofed visual patterns and improve user protection

  • Extracted and analyzed data from 100+ web servers and 1000+ certificates
  • Identified security gap due to parameters similarities between legitimate and malicious websites
  • Designed a machine-learning system based on visual perception parameters to address former gap for legitimate websites exploited by phishing actors
  • Improved users protection by programming and integrating solution in a browser plugin
  • Published results obtained to an international workshop:
    AJNA: anti-phishing JS-based visual analysis, to mitigate users’ excessive trust in SSL/TLS

Projects

AWS Serverless CI/CD Website (Front end & Back End)

  • Designed and deployed a serverless web application showcasing a live, dynamic résumé using AWS services including S3, CloudFront, Route 53, and Lambda
  • Implemented a CI/CD pipeline using GitHub Actions to automatically test and deploy infrastructure updates defined in Terraform
  • Integrated a DynamoDB backend and API Gateway for visitor count tracking, secured with IAM policies and AWS Cognito
  • Used CloudFormation and Terraform for Infrastructure as Code, ensuring reproducibility and version-controlled deployments
  • Enforced security best practices with HTTPS via AWS Certificate Manager, least-privilege IAM roles, and automated vulnerability scanning.
  • Added a custom domain and CDN caching with CloudFront for global availability and performance optimization

Certifications

Cloud Solutions Architect Certificate

AWS

See online.

Cloud Practitioner Certificate

AWS

See online.

CISSP

ISC2

Certified Information Systems Security Professional Certificate.

See online.

Education

2015-2019

Ph.D. in Cybersecurity – Cloud Attack Graph Modeling

Nokia, France and CentraleSupelec, France

Thesis: Generation and Dynamic Update of Attack Graphs in Cloud Providers Infrastructures

2012-2015

Master in Computer Science

Telecom SudParis, France

Specialization in systems and network security.

Contact

Contact Me