Cybersecurity-Portfolio

Ayanloye Olaitan

Cybersecurity Analyst | Threat Detection β€’ Incident Response β€’ Digital Forensics

I’m Olaitan, a security analyst who sees cybersecurity from both sides of the battlefield. With a foundation in blue team operations and a current focus on Digital Forensics Incident Response, I bring a layered, attacker-aware perspective to my role in threat detection and incident response. Currently, I transform lab-based simulations into technical security insights.


🎯 Summary


🧠 Cybersecurity Portfolio Projects

The table below reflects key areas of cybersecurity practice inspired by the Google Cybersecurity curriculum:

Practicals Toolkit
Conducting security audit for a mock organization NIST, INFOSEC, CIA triad, risk management
Exploring Network security by securing network architecture TCP/IP, firewalls, cloud networks
Command-line and database security using Linux & SQL Bash, SQL injection, access control
Identifying and mitigating risks Threat modeling, CVEs, asset inventory
Incident response detection and response focusing on playbooks SOC workflows, escalation, containment
Packet analysis and traffic inspection using Tcpdump & Wireshark PCAP, filters, network forensics
IDS/SIEM Monitoring and alerting Suricata, Splunk, Chronicle
Automating security tasks Python, log parsing, automation tools

πŸ§ͺ Personal Home Lab Projects

These are cybersecurity simulations I personally designed and executed in my home lab to deepen my understanding of threat detection, log analysis, and incident response.

πŸ” SSH Brute Force Attack & Mitigation

Scenario: Detected and responded to SSH brute-force attack targeting Ubuntu server

Attack Phase:

Defense Phase:

Key Findings:

πŸ“„ View Full Case Study PDF


🚨 Multi-Vector Attack Simulation & Investigation

Simulated realistic attack chain:

  1. Nmap reconnaissance scan
  2. Exploited weak FTP credentials (Hydra)
  3. Lateral movement attempt via SSH
  4. Suspicious file upload to web directory

Then investigated as blue team:

Tools: Wireshark, Splunk, FTK Imager, Linux audit logs


πŸ› οΈ Technical Capabilities

Threat Detection & Response

Attack Simulation & Testing

Investigative Skills


πŸ“œ Certifications

πŸŽ“ Current Training


πŸš€ Current Focus

πŸ“« Let’s Connect

I’m actively seeking entry-level SOC analyst or junior DFIR roles where I can contribute to real security operations while learning from experienced practitioners.

Open to: Internships, volunteer SOC work, mentorship, cybersecurity collaborations

πŸ“§ Email: ayanloyeola@gmail.com
πŸ”— LinkedIn: linkedin.com/in/ayanloye-ola
πŸ“ Portfolio Repo: github.com/A-Olarh/Cybersecurity-Portfolio


🧭 About This Portfolio

This repository is a personalized documentation of my cybersecurity journey, combining coursework, homelab simulations, and real-world inspired projects. All content is original and reflects my hands-on learning and technical growth.