top of page
WhatsApp Image 2026-01-02 at 5.27.08 PM (1).jpeg

Hello

My name is Rhoda Smart, also known as Smarkeyss.

​

I work in cybersecurity with a focus on researching and analyzing real-world vulnerabilities. My core interest is understanding how CVEs actually work, from root cause, to proof of concept, to detection and mitigation. This blog is where I document that process clearly and practically.

​

I have written CVE analyses as a content creator for a product-focused security company. My work involves breaking down vulnerabilities, validating technical details, and presenting accurate and reproducible explanations. That experience shapes how I approach research here.

​

I learn by doing. I work with AI tools and security tooling, and I rely on hands-on testing. I cross-check findings against trusted technical sources, analyze relevant code paths, and focus on producing explanations that reflect how systems behave in practice, not just in theory.

​

This space is for anyone curious about how vulnerabilities really work, whether you are learning, researching, building, or defending systems.

  • Facebook
  • Twitter
  • LinkedIn
  • Instagram

My Story

My academic background is in Materials and Metallurgical Engineering from the Federal University of Technology, Owerri. That training shaped how I think about systems, how and why things fail, how stress propagates, and how small weaknesses can lead to larger breakdowns.

​

I later earned a diploma in Data Engineering from Develhope. This strengthened my understanding of data systems, pipelines, and infrastructure. I also have a solid working knowledge of database administration and system processes, which helps when analyzing vulnerabilities that involve persistence layers, access control, or data handling.

​

My move into cybersecurity developed naturally from there. I research vulnerabilities by reading advisories, analyzing source code, testing proofs of concept, and validating claims against real system behavior. I use AI as a research aid, not as a shortcut, to explore ideas, compare patterns, and speed up analysis while keeping human judgment at the center.

​

I am currently pursuing the PNPT certification, with a growing focus on offensive security, detection logic, and practical mitigation. This blog reflects an ongoing journey of learning, testing, and refinement.

​

Outside cybersecurity, I am also a farmer. Farming reinforces discipline, patience, and respect for real constraints. Problems are visible, mistakes have cost, and results are measurable. That mindset influences how I approach security research, grounded, methodical, and focused on cause and effect.

​

I am open to collaboration, shared research, and thoughtful discussion. I am also open to opportunities where careful vulnerability analysis and clear technical writing are valued.

Contact

I'm always looking for new and exciting opportunities. Let's connect.

+2348126169752

bottom of page