Skip to content
View seyifalode-cmd's full-sized avatar

Block or report seyifalode-cmd

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
seyifalode-cmd/README.md

Oluwaseyi Michael Falode · Cloud & Cybersecurity Engineer

Building secure, scalable cloud infrastructure — and hunting the threats that target it.

View Full Project Portfolio →

I work across the full cloud security stack: infrastructure automation with Terraform and Ansible, container orchestration with Kubernetes and Docker, CI/CD pipelines with Jenkins, and proactive threat detection using CrowdStrike Falcon and Splunk. My projects reflect real-world engineering problems — not tutorials.


What I Work With

Cloud & Infrastructure AWS · Azure · Terraform · Ansible · EC2 · S3 · Lambda · Key Vault · Auto Scaling · Load Balancers

Containers & Orchestration Kubernetes · Docker · Docker Compose · Docker Swarm · Spring Boot on K8s

CI/CD & Automation Jenkins (multi-node, pipelines, Groovy libraries) · Python CD · Infrastructure as Code

Security & Threat Detection CrowdStrike Falcon · Splunk · MITRE ATT&CK · SOC Monitoring · Threat Hunting · EDR · Azure Key Vault


Featured Projects

Project What It Is
CrowdStrike Threat Hunt — SCATTERED SPIDER Hypothesis-driven threat hunt against a real-world eCrime group using CrowdStrike Falcon CQL, mapped to MITRE ATT&CK v14
Splunk SOC Monitoring Lab End-to-end SOC monitoring environment built in Splunk with detection rules and dashboards
AWS Disaster Recovery Strategy Multi-region AWS DR architecture with RTO/RPO targets and automated failover
Azure Key Vault Lab Secrets management and access policy automation using Azure Key Vault
Kubernetes Rolling Deployment Zero-downtime rolling deployments on Kubernetes with health checks and rollback
Load-Balanced Autoscaling Web Servers AWS ALB + Auto Scaling Group provisioned end-to-end with Terraform

Project Categories

Security & Threat Detection

Cloud Infrastructure (AWS & Azure)

Kubernetes & Containers

CI/CD & Jenkins

Ansible & Configuration Management

Terraform & IaC Testing


Currently Working On

  • Expanding the CrowdStrike threat hunting portfolio
  • Cloud security architecture and detection engineering

View All Repositories

Pinned Loading

  1. kubernetes-rolling-deployment-demo kubernetes-rolling-deployment-demo Public

    Java

  2. crowdstrike-threat-hunt-portfolio crowdstrike-threat-hunt-portfolio Public

    CrowdStrike threat hunting portfolio

    1

  3. azure-key-vault-lab azure-key-vault-lab Public

    Deploying and managing Azure Key Vault for secure secrets, keys, and certificate management — including RBAC vs. Vault Access Policy, purge protection, and least privilege access control.

  4. disaster-recovery-strategy-aws disaster-recovery-strategy-aws Public

    Enterprise Disaster Recovery Strategy with RTO/RPO design, hybrid cloud architecture, and 3-2-1 backup model (CloudOps & Security project)

  5. load-balanced-autoscaling-webservers load-balanced-autoscaling-webservers Public

    HCL

  6. splunk-soc-monitoring-lab splunk-soc-monitoring-lab Public

    SOC Analyst lab using Splunk — SPL queries, threat detection, alerts, and dashboard