An organisation recently experienced a Distributed Denial of Service (DDoS) attack, during which I actively participated as a member of the cyber security team. My responsibilities encompassed the crucial phases of containing the incident and orchestrating the recovery efforts to restore our systems to their normal operational state.
In response to this security breach, my role involved implementing strategic measures aimed at halting the ongoing DDoS attack, safeguarding our network infrastructure, and mitigating potential damage.
This multifaceted involvement required close collaboration with fellow security professionals and IT experts to promptly address the threat and create robust cybersecurity strategies to minimise any adverse impact on our organisation’s operations.
Moreover, my responsibilities extended to the recovery phase, where meticulous efforts were undertaken to restore affected systems and services to their pre-incident state. This involved not only technical aspects but also coordination with relevant stakeholders to ensure a comprehensive and resilient recovery process.
For more detailed information about the specific actions taken, methodologies employed, and outcomes achieved during this project, please refer to the link provided below. Your interest and further exploration of the details are encouraged and welcomed.
I had the opportunity to contribute to a project focused on ensuring that our organisation met internal standards and external regulations. The goal was to avoid non-compliance with government regulations and potential fines, ultimately bolstering the organisation's security stance. In my role within the team, I played a key part in crafting policies using ISO27001 and ensuring strict adherence to our policy compliance framework.
Additionally, we initiated a comprehensive organisational training program aimed at educating staff on the importance of cyber security. The training covered various aspects, including phishing, password management, ransomware, and social engineering. I took the lead in conducting these training sessions (creating training materials and videos) and closely monitored the performance of employees. Identifying individuals with lower performance or test scores, I worked to enhance their training to ensure a solid understanding of the material.
The emphasis was on conveying to employees the significance of the training, the consequences of potential incidents, and the importance of identifying risks as a proactive measure against threats.
To learn more about this project, kindly click the button below.
Web application portals, which are accessible to the public, act as a bridge connecting organisations with their potential customers. In my role as a cyber security analyst, I delved into the potential risks associated with these portals and explored strategies to mitigate these risks, keeping in mind the need to safeguard the confidentiality, integrity, and availability of the information provided by these portals.
These risks pose a vulnerability that malicious actors could exploit, leading to cyber-attacks and downtime for the organisation. Fortunately, there are established guidelines to help identify and address risks related to publicly accessible web applications. The OWASP (Open Web Application Security Project), a non-profit organization, has outlined comprehensive guidelines for enhancing software security. These guidelines cover various risks, including but not limited to cross-site scripting, injection attacks, security misconfiguration, and broken access control.
Through my research, I identified several types of risks that organisation's should be mindful of when operating a publicly available portal, along with effective mitigation strategies. I particularly emphasised the threat of injection attacks, which are commonly employed by malicious actors to gain unauthorised access to an organisation's database, undermining the fundamental principles of cybersecurity (Confidentiality, Integrity, and Availability) in a web application.
For more details on this project, please click the button below.
I worked as a security analyst in a team with a compliance officer and a security manager. Together, we did a security audit for our organization. It was a teamwork project, and I played a crucial part. Collaboration is a skill i enjoy and constantly practise. We conducted this audit to enhance our organization's security and prevent fines from government agencies for not following the rules. To learn more about this project, just click the button below
I played a vital role in a collaborative project with my team, where we proactively detected various incidents within the organisations network, including phishing emails, suspicious logins, and files with malware. We diligently developed and executed multiple mitigation strategies to contain and recover from these security breaches.
For further insights into this project, please click the action button below.
In today's era of digital transformation, organisations must prioritise cloud security as they adopt cloud-based tools and services into their infrastructure.
I actively contributed to a project within an organisation undergoing digital transformation, where our team was tasked with the secure migration of the entire infrastructure to cloud-based platforms.
To gain a deeper understanding of this project and explore its particulars, please click on the designated action button below to access additional details.
I possess a strong grasp of cyber threat intelligence and excel at recognizing the various cyber threats that organizations may encounter. My expertise encompasses analysing the threat landscape, conducting threat modeling, and effectively communicating my findings to stakeholders.
In a recent project, I conducted extensive research to outline the primary threats and risks confronting an organisation, specifically a smart vehicle manufacturer, in its day-to-day operations. I delved into the potential consequences these threats could have on the company's assets, intellectual property, and customer trust. This thorough understanding of the threat landscape is vital for the organisation to craft robust cybersecurity strategies and proactively mitigate risks. My analysis also included a threat profile, identifying potential threat actors, their motivations, capabilities, and likely attack vectors. Furthermore, I employed threat modeling techniques to assess vulnerabilities and prioritise security concerns, thereby helping the organisation bolster its overall security posture.
Additionally, we reviewed the MITRE ATT&CK framework to empower the organization's security team with insights into the various tactics and techniques used by adversaries. This knowledge equips the team to remain well-prepared for potential security threats in the future.
The accompanying diagram illustrates the key stages in the cyber threat intelligence process, encompassing information gathering, threat modeling, and the dissemination of findings to stakeholders.
For a comprehensive overview of this project, please click the action button below to access further details.
As a cyber security analyst, I conducted a vulnerability management task where I scanned the Android Oreo OS with the IP address 192.168.12.5 using the OpenVAS scanner on a Linux operating system. To carry out this task, I utilized the Oracle VM Virtual Box to install Linux OS on my MacBook. The installation process was smooth, and I successfully installed the OpenVAS scanner as well. The purpose of using the OpenVAS scanner was to identify potential vulnerabilities in the Android Oreo OS.
Engaging in this task significantly enhanced my understanding of vulnerability identification and the implementation of appropriate mitigations. I thoroughly enjoyed the experience and found it highly enlightening.
For a proper overview of this project, kindly click on the action button below to learn more.
Logical representation of wireless sensor networks spread in a remote area, including an analysis of the routing protocol and MAC protocol, with energy efficiency in mind. How the cluster head nodes transfer data to the base station and connect with the cluster members. The implementation of the network on Packet tracer utilises the Ipv6 addressing scheme.
For a proper overview of this project, kindly click on the action button below to learn more.
Copyright © 2025 Oyekemi Portfolio - All Rights Reserved.