๐ Hi, Iโm Olanrewaju Emmanuel Okedele Cybersecurity Analyst | SOC & Detection Engineering | Cloud Security (GCP) ๐ Ontario-focused | Open to Junior SOC / Cybersecurity Analyst roles ๐ก๏ธ About Me Iโm a cybersecurity professional with a strong foundation in cloud-native security operations, SIEM detection engineering, and incident analysis. My focus is on practical, hands-on learningโturning real attack simulations into detections, alerts, and incident reports that mirror how modern SOC teams operate, especially in Google Security Operations (Chronicle) and cloud environments. I document my work rigorously to demonstrate how attacks surface in logs, how controls prevent impact, and how analysts investigate and close incidents. ๐ง Core Skills SOC & Detection: Log analysis, alert tuning, threat hunting, incident response Cloud Security: Google Cloud IAM, Security Command Center, Cloud Logging, DLP SIEM Platforms: Google Security Operations (Chronicle), Elastic (foundational) Automation: Python (log parsing, anomaly detection, enrichment), Bash (basic) Security Concepts: MITRE ATT&CK, NIST CSF, CD/CR, least privilege Tools: Nmap, Burp Suite, OWASP ZAP, Kali Linux, Git ๐ Certifications & Training Google Cybersecurity Professional Certificate Google Cloud Cybersecurity Certificate IBM Cybersecurity Breaches Case Studies & Capstone Project Google Security Operations โ Fundamentals (Chronicle platform) Google Security Operations โ Deep Dive (advanced detections & tuning) Google Modern Security Operations (Autonomic SecOps, CD/CR) (ongoing) Microsoft Python Programming for Development (in progress) ๐ Featured Projects Quality over quantity. Each project is SOC-style, documented, and defensible. ๐ Network Discovery Lab (SOC Perspective) Repo: network-discovery-lab Simulated internal reconnaissance and credential misuse Validated firewall controls blocking lateral movement (SMB) Built Elastic KQL detections Wrote a full SOC incident report Skills: Detection engineering, log analysis, incident documentation ๐ SIEM Detection Engineering Lab (in progress) Focus: SIEM-first alerts (no exploitation noise) Brute-force login detection Suspicious PowerShell execution Alert thresholds & false positive discussion โ๏ธ Google Cloud Security Labs Security Command Center threat findings IAM least privilege enforcement Cloud DLP redaction Secure VPC & private services ๐ Python Threat Hunting Log anomaly detection using pandas & Isolation Forest Automated parsing of failed logins and suspicious activity ๐ง How I Work Cloud-first, low-resource labs (no heavy VM dependency) Detection > exploitation Logs โ alerts โ investigation โ report Everything documented with screenshots, queries, and lessons learned
| Project | Description | Technologies |
|---|---|---|
| Python Port Monitor | Logs real-time port status changes | Python, Termux/Kali, Linux |
| Pen-testing Scripts | Automates basic penetration tests | Python, Nmap, Linux |
| Hash Cracking Simulator | SHA256 password hashing & cracking | Python, Hashcat, John the Ripper |
Check out my GitHub repositories for more projects. #[Google Skills: https://www.skills.google/public_profiles/ca1d4bd4-ca6f-4645-bea5-9c2629da495e]
#Certifications on Credly - https://www.credly.com/users/olanrewaju-okedele
- LinkedIn: Olanrewaju Emmanuel Okedele
- X: https://x.com/okedeleoea
- Email:
okedeleoea@gmail.com