a woman with an afro is looking at the camera

SOC Analyst

SOC Analyst

FAITH

FAITH

FAITH

OKONOBOH

OKONOBOH

OKONOBOH

a woman with an afro is looking at the camera

I am a SOC Analyst, Helping Organisations detect, analyse, and respond to cyber threats through security monitoring and network analysis.

I am a SOC Analyst, Helping Organisations detect, analyse, and respond to cyber threats through security monitoring and network analysis.

SCROLL

SCROLL

ABOUT ME

ABOUT ME

Aspiring SOC Analyst helping organisations detect and respond to cyber threats.


Skilled in security monitoring, log analysis, and network traffic investigation using Wireshark, Graylog, and Wazuh.


Passionate about identifying suspicious activity, investigating incidents, and supporting security operations to keep systems safe.

Aspiring SOC Analyst helping organisations detect and respond to cyber threats.


Skilled in security monitoring, log analysis, and network traffic investigation using Wireshark, Graylog, and Wazuh.


Passionate about identifying suspicious activity, investigating incidents, and supporting security operations to keep systems safe.

Tools and Technologies

Tools and Technologies

The tools and technologies I rely on to deliver effective threat detection and incident response.

The tools and technologies I rely on to deliver effective threat detection and incident response.

GrayLog

GrayLog

Use Graylog to collect, analyze, and monitor log data in real time for effective threat detection.

Use Graylog to collect, analyze, and monitor log data in real time for effective threat detection.

WireShark

WireShark

Utilize Wireshark for deep packet analysis and network threat investigation.

Utilize Wireshark for deep packet analysis and network threat investigation.

Wazuh

Wazuh

Utilize Wireshark for deep packet analysis and network threat investigation.

Utilize Wireshark for deep packet analysis and network threat investigation.

Kali linux

Kali linux

Use Kali Linux as a penetration testing environment for security analysis and vulnerability assessment.

Use Kali Linux as a penetration testing environment for security analysis and vulnerability assessment.

Nmap

Nmap

Use Nmap to scan networks, discover hosts, and identify open ports and services.

Use Nmap to scan networks, discover hosts, and identify open ports and services.

Windows

Windows

Use Windows as a primary operating system for system monitoring, analysis, and security operations.

Use Windows as a primary operating system for system monitoring, analysis, and security operations.

  • INCIDENT RESPONSE

    INCIDENT RESPONSE

    INCIDENT RESPONSE

  • ENDPOINT SECURITY

    ENDPOINT SECURITY

    ENDPOINT SECURITY

  • BASIC SCRIPTING

    BASIC SCRIPTING

    BASIC SCRIPTING

  • FIREWALLS AND IDS/IPS

    FIREWALLS AND IDS/IPS

    FIREWALLS AND IDS/IPS

  • LOG MONITORING

    LOG MONITORING

    LOG MONITORING

  • THREAT DETECTION

    THREAT DETECTION

    THREAT DETECTION

  • NETWORK ANALYSIS

    NETWORK ANALYSIS

    NETWORK ANALYSIS

  • SIEM TOOLS

    SIEM TOOLS

    SIEM TOOLS

EDUCATION

EDUCATION

Masters in Cybersecurity

University of Reohampton

2026

Cybersecurity Master’s student with hands on experience in network security, digital forensics, and incident response. Skilled in tools like Wireshark, Nmap, Wazuh, Graylog, and Kali Linux for threat detection, analysis, and security monitoring. Equipped to support security operations and protect systems and data.

CONTACT

CONTACT

Reach out to discuss entry-level SOC roles, Internships, or cybersecurity collaborations

Reach out to discuss entry-level SOC roles, Internships, or cybersecurity collaborations

OKONOBOH

OKONOBOH

OKONOBOH

Create a free website with Framer, the website builder loved by startups, designers and agencies.