
SOC Analyst
SOC Analyst
FAITH
FAITH
FAITH
OKONOBOH
OKONOBOH
OKONOBOH

I am a SOC Analyst, Helping Organisations detect, analyse, and respond to cyber threats through security monitoring and network analysis.
I am a SOC Analyst, Helping Organisations detect, analyse, and respond to cyber threats through security monitoring and network analysis.
SCROLL
SCROLL
ABOUT ME
ABOUT ME
Aspiring SOC Analyst helping organisations detect and respond to cyber threats.
Skilled in security monitoring, log analysis, and network traffic investigation using Wireshark, Graylog, and Wazuh.
Passionate about identifying suspicious activity, investigating incidents, and supporting security operations to keep systems safe.
Aspiring SOC Analyst helping organisations detect and respond to cyber threats.
Skilled in security monitoring, log analysis, and network traffic investigation using Wireshark, Graylog, and Wazuh.
Passionate about identifying suspicious activity, investigating incidents, and supporting security operations to keep systems safe.
Tools and Technologies
Tools and Technologies
The tools and technologies I rely on to deliver effective threat detection and incident response.
The tools and technologies I rely on to deliver effective threat detection and incident response.
GrayLog
GrayLog
Use Graylog to collect, analyze, and monitor log data in real time for effective threat detection.
Use Graylog to collect, analyze, and monitor log data in real time for effective threat detection.
WireShark
WireShark
Utilize Wireshark for deep packet analysis and network threat investigation.
Utilize Wireshark for deep packet analysis and network threat investigation.
Wazuh
Wazuh
Utilize Wireshark for deep packet analysis and network threat investigation.
Utilize Wireshark for deep packet analysis and network threat investigation.
Kali linux
Kali linux
Use Kali Linux as a penetration testing environment for security analysis and vulnerability assessment.
Use Kali Linux as a penetration testing environment for security analysis and vulnerability assessment.
Nmap
Nmap
Use Nmap to scan networks, discover hosts, and identify open ports and services.
Use Nmap to scan networks, discover hosts, and identify open ports and services.
Windows
Windows
Use Windows as a primary operating system for system monitoring, analysis, and security operations.
Use Windows as a primary operating system for system monitoring, analysis, and security operations.
PROJECTS
PROJECTS
INCIDENT RESPONSE
INCIDENT RESPONSE
INCIDENT RESPONSE
ENDPOINT SECURITY
ENDPOINT SECURITY
ENDPOINT SECURITY
BASIC SCRIPTING
BASIC SCRIPTING
BASIC SCRIPTING
FIREWALLS AND IDS/IPS
FIREWALLS AND IDS/IPS
FIREWALLS AND IDS/IPS
LOG MONITORING
LOG MONITORING
LOG MONITORING
THREAT DETECTION
THREAT DETECTION
THREAT DETECTION
NETWORK ANALYSIS
NETWORK ANALYSIS
NETWORK ANALYSIS
SIEM TOOLS
SIEM TOOLS
SIEM TOOLS
EDUCATION
EDUCATION
Masters in Cybersecurity
University of Reohampton
2026
Cybersecurity Master’s student with hands on experience in network security, digital forensics, and incident response. Skilled in tools like Wireshark, Nmap, Wazuh, Graylog, and Kali Linux for threat detection, analysis, and security monitoring. Equipped to support security operations and protect systems and data.
CONTACT
CONTACT
Reach out to discuss entry-level SOC roles, Internships, or cybersecurity collaborations
Reach out to discuss entry-level SOC roles, Internships, or cybersecurity collaborations
OKONOBOH
OKONOBOH
OKONOBOH



