Cybersecurity analyst | Threat and Vulnerable management | Log analysis | Continue learning on Faith and protecting digital property.
-
12:16
(UTC -12:00) - in/osikoyamichael
Pinned Loading
-
Virtualized-SOC-Environment-for-Nmap-Reconnaissance-Detection
Virtualized-SOC-Environment-for-Nmap-Reconnaissance-Detection PublicThis project demonstrates the design and implementation of a Virtualized Security Operations Center (SOC). The goal was to create a controlled environment to simulate real-world network reconnaissa…
-
Threat-hunt-using-splunk
Threat-hunt-using-splunk PublicThis project simulates a proactive threat hunt based on a law enforcement advisory. Using the BOTSv2 (Boss of the SOC) dataset within Splunk, I identified an adversary conducting stealthy reconnais…
Something went wrong, please refresh the page to try again.
If the problem persists, check the GitHub status page or contact support.
If the problem persists, check the GitHub status page or contact support.

