Skip to content
View okedeleoea's full-sized avatar
๐Ÿ 
Available!!
๐Ÿ 
Available!!

Block or report okedeleoea

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this userโ€™s behavior. Learn more about reporting abuse.

Report abuse
okedeleoea/README.md

๐Ÿ‘‹ Hi, Iโ€™m Olanrewaju Emmanuel Okedele Cybersecurity Analyst | SOC & Detection Engineering | Cloud Security (GCP) ๐Ÿ“ Ontario-focused | Open to Junior SOC / Cybersecurity Analyst roles ๐Ÿ›ก๏ธ About Me Iโ€™m a cybersecurity professional with a strong foundation in cloud-native security operations, SIEM detection engineering, and incident analysis. My focus is on practical, hands-on learningโ€”turning real attack simulations into detections, alerts, and incident reports that mirror how modern SOC teams operate, especially in Google Security Operations (Chronicle) and cloud environments. I document my work rigorously to demonstrate how attacks surface in logs, how controls prevent impact, and how analysts investigate and close incidents. ๐Ÿ”ง Core Skills SOC & Detection: Log analysis, alert tuning, threat hunting, incident response Cloud Security: Google Cloud IAM, Security Command Center, Cloud Logging, DLP SIEM Platforms: Google Security Operations (Chronicle), Elastic (foundational) Automation: Python (log parsing, anomaly detection, enrichment), Bash (basic) Security Concepts: MITRE ATT&CK, NIST CSF, CD/CR, least privilege Tools: Nmap, Burp Suite, OWASP ZAP, Kali Linux, Git ๐Ÿ… Certifications & Training Google Cybersecurity Professional Certificate Google Cloud Cybersecurity Certificate IBM Cybersecurity Breaches Case Studies & Capstone Project Google Security Operations โ€“ Fundamentals (Chronicle platform) Google Security Operations โ€“ Deep Dive (advanced detections & tuning) Google Modern Security Operations (Autonomic SecOps, CD/CR) (ongoing) Microsoft Python Programming for Development (in progress) ๐Ÿš€ Featured Projects Quality over quantity. Each project is SOC-style, documented, and defensible. ๐Ÿ” Network Discovery Lab (SOC Perspective) Repo: network-discovery-lab Simulated internal reconnaissance and credential misuse Validated firewall controls blocking lateral movement (SMB) Built Elastic KQL detections Wrote a full SOC incident report Skills: Detection engineering, log analysis, incident documentation ๐Ÿ“Š SIEM Detection Engineering Lab (in progress) Focus: SIEM-first alerts (no exploitation noise) Brute-force login detection Suspicious PowerShell execution Alert thresholds & false positive discussion โ˜๏ธ Google Cloud Security Labs Security Command Center threat findings IAM least privilege enforcement Cloud DLP redaction Secure VPC & private services ๐Ÿ Python Threat Hunting Log anomaly detection using pandas & Isolation Forest Automated parsing of failed logins and suspicious activity ๐Ÿง  How I Work Cloud-first, low-resource labs (no heavy VM dependency) Detection > exploitation Logs โ†’ alerts โ†’ investigation โ†’ report Everything documented with screenshots, queries, and lessons learned

๐Ÿ”น Projects

Project Description Technologies
Python Port Monitor Logs real-time port status changes Python, Termux/Kali, Linux
Pen-testing Scripts Automates basic penetration tests Python, Nmap, Linux
Hash Cracking Simulator SHA256 password hashing & cracking Python, Hashcat, John the Ripper

Check out my GitHub repositories for more projects. #[Google Skills: https://www.skills.google/public_profiles/ca1d4bd4-ca6f-4645-bea5-9c2629da495e]

#Certifications on Credly - https://www.credly.com/users/olanrewaju-okedele

๐Ÿ”น Connect with Me

Pinned Loading

  1. portscan_event portscan_event Public

    Python-based port monitoring tool built in Termux/Kali. Logs real-time status changes of common network ports. python, cybersecurity, termux, port-scanning, linux

    1

  2. external-network-recon-nmap external-network-recon-nmap Public

    External network reconnaissance and service enumeration using Nmap (Pentest Portfolio Project)

  3. Apache-Web-Server-Enumeration-Misconfiguration-Analysis Apache-Web-Server-Enumeration-Misconfiguration-Analysis Public

    A hands-on Apache web server enumeration lab using Kali Linux, focusing on service discovery, misconfiguration analysis, vulnerability correlation, and professional pentest reporting.

  4. network-discovery-lab network-discovery-lab Public

    A hands-on network discovery lab focused on internal reconnaissance techniques, service visibility, and defensive validation. Emphasizes how SOC analysts identify, document, and assess reconnaissanโ€ฆ

    1

  5. network-detection-lab network-detection-lab Public

    SIEM-first network detection and SOC alert engineering