Whoami ?

$ An entry-level cybersecurity analyst with hands-on training in static malware analysis, phishing detection, log and packet analysis who is actively seeking a cybersecurity role. I am constantly learning and building my skills to defend assets and solve real-world security problems.

Learn more about what I do

What I have done.

Home Lab

Built a cybersecurity home lab simulating enterprise infrastructure with Kali Linux, Windows 11, and Windows Server/Active Directory. Integrated Splunk SIEM for log analysis, detection engineering, and incident response, enabling hands-on practice in SOC.

Phishing and Malware Analysis

Completed multiple hands-on labs focused on analyzing phishing emails and malware samples where I conducted email header analysis, performed static analysis to inspect indicators of compromise (IOCs) and sandbox analysis to observe runtime behavior then documented findings to simulate real-world incident response workflows.

SOC Simulations

Completed multiple SOC/SIEM scenarios on LetsDefend, including case creation, playbook execution, log analysis, containment and escalation to Tier 2 when required - practicing real-world SOC workflows and incident response procedures.

My Work and Leadership Experience.

I have completed a few virtual internships on Forage and I am currently a Computer Science intern at ACETEL.

Competed in 5-member team solving defensive cybersecurity challenges. Independently owned 11/12 flags in THE CARD using Splunk log analysis and threat intel.

Engaged in SOC projects including analyzing logs, investigating incidents, creating alerts with SIEM, correlating threats and documenting response procedures effectively.

Completing this learning path helped me build practical foundational SOC analyst skills through interactive labs covering malware analysis, phishing detection and packet analysis.

I have solved multiple labs & challenges, investigated alert of various types with Letsdefend's simulated SOC SIEM. This has helped me in gaining practical hands-on skills in SOC related activities.

I ran for the Vice President I Office of NACOS, ABU for 2025/2026 session. One of my agenda is to host the school's first CTF and foster national and international collaborations.

I served as the Assistant Director of Software of the Nigerian Association of Computing Students, ABU chapter for the 2023/2024 session where I assisted the Director in Software related affairs.

Read my write-ups on hashnode.

I sometimes write the step by step process of my investigations and analysis.



My Next Steps.

  • Conclude my learning on Letsdefend's SOC Analyst Path through which I have gained practical hands-on security operations skills and knowledge demonstrated by multiple projects including Home lab development, phishing, log and malware analysis amongst others.
  • I am currently working on a forage internship where I ingested some logs into Splunk and built dashboards to gain insights.
  • Participate in SOC career simulation with CareerSimulator.
  • Gain hands-on experience with Elastic for Security on Elastic.
  • Gain hands-on experience with AWS services on AWS Skill Builder.

Find me on ...