Skip to content
View kodefole-web's full-sized avatar

Block or report kodefole-web

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please donโ€™t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this userโ€™s behavior. Learn more about reporting abuse.

Report abuse
kodefole-web/README.md

My name is Kyle Efole & Iโ€™m an aspiring Cybersecurity professional looking to acquire an entry-level Security Analyst position. I have hands-on experience in incident response, memory forensics, malware analysis, threat hunting, and IDS rule engineering.


๐Ÿ›ก๏ธ Featured Incident Response Projects

Here are my four end-to-end IR case studies using real security tools and workflows:

๐Ÿ”น Imperial Memory โ€“ Memory Forensics Memory forensics using Volatility to extract credentials, decrypt an encrypted archive, and identify hidden indicators from a memory dump.

๐Ÿ”น Mail & Trail โ€“ Splunk Log Analysis & Threat Hunting Investigated malicious URL activity captured in a honeypot using Telnet, Splunk, SPL queries, VirusTotal, and Base64 decoding.

๐Ÿ”น One of Us โ€“ Malware Triage & Backdoor Trojan Analysis Triaged 271 suspicious files using VirusTotal and ClamAV to identify a Trojan with a Meterpreter-style backdoor and extract its MD5 hash.

๐Ÿ”น Pigs Rule โ€“ Network Traffic Analysis & Snort Rule Engineering Analyzed tcpdump packet captures, detected suspicious RDP traffic on port 3389, and wrote custom Snort IDS rules to generate alerts visualized in Snorby.


๐Ÿงฐ Tools & Technologies

๐Ÿ”น SOC Tools

  • Splunk
  • Snort / Snorby
  • Volatility
  • Wireshark
  • tcpdump
  • ClamAV
  • VirusTotal
  • Base64 decoding tools

๐Ÿ”น Systems & Platforms**

  • Linux (Ubuntu / Kali)
  • Windows Server (memory images)
  • Virtualization labs

๐Ÿ”น Technical Skills**

  • Incident Response
  • Malware Triage
  • Memory Forensics
  • SIEM Analysis
  • Network Traffic Analysis
  • Writing Snort rules
  • Hashing (MD5/SHA)
  • Log Filtering / Threat Hunting
  • MITRE ATT&CK mapping

๐Ÿ“œ Certification

  • CompTIA Security+ (SY0-701)

๐Ÿš€ What Iโ€™m Working Toward

  • Breaking into a SOC Tier 1 Analyst role
  • Strengthening my detection skills
  • Improving cloud security fundamentals (AWS / Azure)
  • Continuing Blue Team projects and home labs

๐Ÿ“ซ Connect With Me Email: kodefole@gmail.com
LinkedIn: www.linkedin.com/in/kyle-olivier-efole

Thanks for stopping by! Always open to opportunities, mentorship, and collaboration in cybersecurity.

Pinned Loading

  1. Incident-Response-Imperial-Memory- Incident-Response-Imperial-Memory- Public

    Memory Forensics investigation using Volatility to extract credentials,decrypt encrypted artifacts,and analyze RAM for hidden indicators

  2. Incident-Response-Mail-and-Trail- Incident-Response-Mail-and-Trail- Public

    Log analysis and threat hunting using Telnet, mailbox credential extraction, SPL queries, URL analysis, and VirusTotal verification

  3. Incident-Response-One-of-Us- Incident-Response-One-of-Us- Public

    Malware Triage of 271 files using ClamAV and VirusTotal to isolate a Trojan with a backdoor installed and extract the malicious MD5 signature

  4. Incident-Response-Pigs-Rule- Incident-Response-Pigs-Rule- Public

    Network Traffic Analysis with tcpdump and custom Snort IDS rule creation to detect suspicious RDP activity and visualize alerts in Snorby

    1