Cybersecurity Professional | SOC β IAM Transition | Identity & Access Management
I'm a cybersecurity professional with 4 years in Security Operations, now deliberately transitioning into Identity and Access Management. I document everything I build β because learning in public keeps me accountable and might save someone else a few hours of troubleshooting.
| Lab | What I Built | Key Concepts |
|---|---|---|
| AWS IAM β Users, Groups & S3 Access | Created IAM user groups with scoped permissions, provisioned IAM users, verified least-privilege access | RBAC, IAM Policies, Principle of Least Privilege |
| Auth0 OIDC Authentication Lab | Configured OIDC auth flow end-to-end using Auth0, decoded a live JWT token and analysed every claim | OIDC, OAuth 2.0, JWT, Authorization Code Flow |
| Lab | Description |
|---|---|
| CyberOps Workstation Setup | Homelab environment setup for security monitoring and detection |
SOC / Detection
- SIEM: Splunk, Microsoft Sentinel, QRadar, ArcSight ESM, Rapid7, AlienVault, Logsign
- EDR/XDR: CrowdStrike Falcon, Microsoft Defender for Endpoint, SentinelOne, Carbon Black, Trend Micro Vision One, Cynet
- Frameworks: MITRE ATT&CK, NIST 800-61, SANS IR
Identity & Access Management (Building)
- AWS IAM, Auth0, OIDC / OAuth 2.0, JWT
- Currently learning: Microsoft Entra ID, Conditional Access, PIM
I write about cybersecurity, homelabs, and the realities of working in security on Medium.
Recent posts:
- Learning Cybersecurity the Fun Way Through Homelabs
- The One Mistake Incident Responders Can't Afford to Make
- Cybersecurity FOMO: Are You Chasing Trends or Closing Gaps?
- Community Manager at CyberSecHaven
- Volunteer with Slum2School Africa and Tech4Dev
- Advocate for women and non-traditional backgrounds in cybersecurity
"The best way to learn security is to build things, break them, and write about what happened."