I’m a cybersecurity enthusiast with a BTech in Cyber Security Science and currently pursuing a Master’s in Cloud and Network Security at the University of Bolton.
I am building a portfolio that showcases my practical skills in areas like Penetration testing, vulnerability assessment, network security, incident response, threat intelligence, malware analysis, cryptography, security auditing, risk assessment, ethical hacking, firewall configuration, intrusion detection and prevention, cloud security, identity and access management, security information and event management (SIEM), regulatory compliance, forensic analysis, wireless network security, security awareness training, phishing simulations.
I have a profound interest in technology and a dedication to solving complex problems.
I'm passionate about defending systems and data from threats. My academic background and hands-on learning reflect that passion. I'm looking to kick-start my cybersecurity career as a Security Analyst, where I can actively contribute to monitoring, analyzing, and mitigating real-world security incidents.
| Skill | Associated Project |
|---|---|
| Network Traffic Analysis and Attack Detection | ✅Network Traffic Analysis and Attack Detection |
| Intrusion Detection and Prevention System using Snort and Fail2ban | ✅ Intrusion Detection and Prevention System |
| Cloud Security Implementation | 🔄Coming soon |
| Phishing Attack Simulation | 🔄Coming soon |
- Operating Systems: Linux (Ubuntu, Kali), Windows
- Security Tools: Wireshark, Snort, Fail2Ban, Splunk MLTK, Nmap, Metasploit
- SIEM Platforms: Splunk
- Cloud Platforms: AWS
MSc – Cloud and Network Security (In Progress)
University of Bolton, United Kingdom
📅 May 2024 – May 2025
B.Tech – Cyber Security Science
Federal University of Technology Minna, Nigeria
📅 October 2017 – January 2024
Analyzed real-world packet captures using Wireshark to identify malicious traffic patterns. Focused on detecting reconnaissance scans, brute-force attempts, unauthorized access probes, and data exfiltration.
Configured and deployed Snort and Fail2Ban to detect and block real-time threats. Monitored and analyzed logs to identify SSH brute-force attempts, port scans, and ICMP floods, enabling automated IP banning and layered threat prevention.