Skip to content
View AdedapoOG's full-sized avatar

Block or report AdedapoOG

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 250 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
AdedapoOG/README.md

Hello, I'm Ade

Cybersecurity Analyst SOC | Incident Response | Security Automation

I am a Cybersecurity Analyst with a robust foundation in accounting and financial technology, certified by Google and CompTIA Security+. Specialized in access control, threat management, and incident response. Proven ability to implement effective security measures and conduct thorough vulnerability assessments. Committed to leveraging my analytical skills and cybersecurity expertise to safeguard organizations against cyber attacks. I build hands-on labs and playbooks that turn alerts into decisions.
Currently working on SIEM projects with Splunk, phishing investigations, and SOC automations.

Objective

I have a robust academic foundation in Financial Technology and an unwavering passion for a career in Information Cybersecurity. I have a solid grounding in accounting, and now I am poised to harness my expertise to safeguard sensitive data and fortify information systems. My academic pursuits have equipped me with a profound grasp of cybersecurity principles, risk management, and network security protocols. Through practical experience and a proactive approach. I have honed the art of deciphering analyzing intricate systems and complex situations. I am eager to channel my dedication to data protection, contribute to threat identification and prevention, and continually elevate my competencies in this dynamically evolving specialized area.

Skills

Skill Associated Project
Metasploit 2 vulnerabilities analysis Detection Lab
Metasploit 2 vulnerabilities recommendations Detection Lab
Security Information & Event Management (SIEM) SOC Automation Lab
Intrusion Detection & Attack Simulation SOC Automation Lab
Network & System Security SOC Automation Lab
Incident Response & Threat Hunting SOC Automation Lab
End to End Detection Analysis Zenith_Phishing_Lab

Tools

SIEM

Network

Endpoint

EDR & Threat Detection

Identity & Access

Offensive Security

Cloud & Automation

Certifications

Projects

Detection Lab SOC Automation Lab Fintech Application

Pinned Loading

  1. AdedapoOG AdedapoOG Public

  2. Detection-Lab Detection-Lab Public

    Metasploitable 2 vulnerability assessment: Nmap/Nikto/SMB/MySQL tests, evidence, and remediation recommendations.

    1

  3. SOC-Automation SOC-Automation Public

    Hands-on SOC home lab with Splunk SIEM, Kali, Metasploitable; log ingestion, detections, alerts, and attack simulations.

    1

  4. Zenith_Phishing_Lab Zenith_Phishing_Lab Public

    A simulated phishing incident investigation project using email analysis, IOCs, MITRE mapping, and Splunk log review.

    1