
Hello
My name is Rhoda Smart, also known as Smarkeyss.
​
I work in cybersecurity with a focus on researching and analyzing real-world vulnerabilities. My core interest is understanding how CVEs actually work, from root cause, to proof of concept, to detection and mitigation. This blog is where I document that process clearly and practically.
​
I have written CVE analyses as a content creator for a product-focused security company. My work involves breaking down vulnerabilities, validating technical details, and presenting accurate and reproducible explanations. That experience shapes how I approach research here.
​
I learn by doing. I work with AI tools and security tooling, and I rely on hands-on testing. I cross-check findings against trusted technical sources, analyze relevant code paths, and focus on producing explanations that reflect how systems behave in practice, not just in theory.
​
This space is for anyone curious about how vulnerabilities really work, whether you are learning, researching, building, or defending systems.
My Story
My academic background is in Materials and Metallurgical Engineering from the Federal University of Technology, Owerri. That training shaped how I think about systems, how and why things fail, how stress propagates, and how small weaknesses can lead to larger breakdowns.
​
I later earned a diploma in Data Engineering from Develhope. This strengthened my understanding of data systems, pipelines, and infrastructure. I also have a solid working knowledge of database administration and system processes, which helps when analyzing vulnerabilities that involve persistence layers, access control, or data handling.
​
My move into cybersecurity developed naturally from there. I research vulnerabilities by reading advisories, analyzing source code, testing proofs of concept, and validating claims against real system behavior. I use AI as a research aid, not as a shortcut, to explore ideas, compare patterns, and speed up analysis while keeping human judgment at the center.
​
I am currently pursuing the PNPT certification, with a growing focus on offensive security, detection logic, and practical mitigation. This blog reflects an ongoing journey of learning, testing, and refinement.
​
Outside cybersecurity, I am also a farmer. Farming reinforces discipline, patience, and respect for real constraints. Problems are visible, mistakes have cost, and results are measurable. That mindset influences how I approach security research, grounded, methodical, and focused on cause and effect.
​
I am open to collaboration, shared research, and thoughtful discussion. I am also open to opportunities where careful vulnerability analysis and clear technical writing are valued.
Contact
I'm always looking for new and exciting opportunities. Let's connect.
+2348126169752



