Skip to content
View AdedapoOG's full-sized avatar

Block or report AdedapoOG

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
AdedapoOG/README.md

Hello, I'm Ade

Cybersecurity Analyst SOC | Incident Response | Security Automation

I am a Cybersecurity Analyst with a robust foundation in accounting and financial technology, certified by Google and CompTIA Security+. Specialized in access control, threat management, and incident response. Proven ability to implement effective security measures and conduct thorough vulnerability assessments. Committed to leveraging my analytical skills and cybersecurity expertise to safeguard organizations against cyber attacks. I build hands-on labs and playbooks that turn alerts into decisions.
Currently working on SIEM projects with Splunk, phishing investigations, and SOC automations.

Objective

Cybersecurity professional with a strong foundation in Security Operations, threat detection, and incident response. Holder of an MSc in Financial Technology from Teesside University and certified across CompTIA Security+, Google Cybersecurity, and ISO 27001 Foundation, with Microsoft SC-200 currently in progress. Experienced in building and operating SIEM-driven detection environments using Splunk, Microsoft Sentinel, and ELK Stack, with practical expertise in log correlation, alert triage, phishing investigation, and detection engineering. Committed to continuous development and applying structured SOC methodology to real-world security challenges.

Skill Associated Project
Metasploit 2 vulnerabilities analysis Detection Lab
Metasploit 2 vulnerabilities recommendations Detection Lab
Security Information & Event Management (SIEM) SOC Automation Lab
Intrusion Detection & Attack Simulation SOC Automation Lab
Network & System Security SOC Automation Lab
Incident Response & Threat Hunting SOC Automation Lab
ISO/IEC 27001 ISMS Implementation (Hands-on) ISO27001 ISMS Implementation
End to End Detection Analysis Zenith_Phishing_Lab

Tools

SIEM

Network

Endpoint

EDR & Threat Detection

Identity & Access

Offensive Security

Cloud & Automation

Certifications

Projects

Detection Lab SOC Automation Lab Fintech Application

Pinned Loading

  1. AdedapoOG AdedapoOG Public

  2. ISO27001-ISMS-Implementation ISO27001-ISMS-Implementation Public

    A practical ISO/IEC 27001 ISMS implementation project including scope definition, risk assessment, policies, and control mapping aligned with Annex A.

    1

  3. Detection-Lab Detection-Lab Public

    Metasploitable 2 vulnerability assessment: Nmap/Nikto/SMB/MySQL tests, evidence, and remediation recommendations.

    1

  4. SOC-Automation SOC-Automation Public

    Hands-on SOC home lab with Splunk SIEM, Kali, Metasploitable; log ingestion, detections, alerts, and attack simulations.

    Python 1

  5. Zenith_Phishing_Lab Zenith_Phishing_Lab Public

    A simulated phishing incident investigation project using email analysis, IOCs, MITRE mapping, and Splunk log review.

    1