Obioma's Blog
I document my cybersecurity journey, home lab tutorials, and career insights. Follow me on Medium to see how I build.
VISIT MY MEDIUMHi, my name is
Performance-driven Cybersecurity Analyst with appreciable experience in Information Assurance, Security Operations, and Continuous Monitoring. Hackviser Student Ambassador with a dedicated focus on SOC workflows, Incident Response, and FISMA/NIST compliance frameworks. Proven ability to mitigate high-risk technical challenges, successfully managed 100% delivery of enterprise-level lab requirements during critical hardware failures by applying asset prioritization and risk management principles. Expert at translating complex Information Security policies into actionable technical training
The Challenge: Simulated a real-world external attack on a virtualized corporate network to identify weak points.
The Challenge: Tasked with detecting hidden malicious activity within high-volume network traffic.
The Challenge: Building an automated workflow to detect and log unauthorized access attempts.
➜ ~ cat sql_forensics_report.log
[INFO] Scanning MariaDB logs for anomalies...
[ALERT] Suspicious query detected: 'OR 1=1' from IP 192.168.1.105
[ACTION] Traffic isolated. Source: Non-standard country origin.
Conducted forensic analysis on login logs using complex SQL queries (AND, OR, LIKE) to filter suspicious activity.
View Evidence on GitHub >>
➜ ~ ./analyze_malware.py --target=fake_authenticator
[CRITICAL] C2 Domain identified: 'g00gle-auth-update.com'
[INFO] Victim User: shutchenson
[STATUS] Report generated: MTA-2025-01-22
Traced spoofed domain & C2 exfiltration path.
View Malware Report >>
➜ ~ python3 evtx_hunter.py evidence.evtx
[INFO] Parsing Windows Event Log (Binary)...
[ALERT] Event 4720 Detected: New User 'backup_admin' created!
[WARN] Event 1102 Detected: Audit Logs were cleared.
Lightweight forensic framework for rapid triage. Features evtx_hunter for detecting Windows persistence & log wiping, and image_forensics for finding malware hidden in metadata.
View Source Code >>... // More incidents coming soon ...
Penetration Testing, Vulnerability Scanning, Threat Analysis, OWASP Top 10, Risk Assessment, Security Reporting.
TCP/IP, Wireshark (Packet Analysis), Intrusion Detection, Cryptography, Identity & Access Management (IAM).
Kali Linux, Metasploit, Nmap, Burp Suite, VMware, Command-Line Interfaces (CLI).
Python (Intermediate), Bash Scripting (Automation).
B.Sc. in Cybersecurity
Miva Open University, Abuja
Expected May 2026
Relevant Coursework: Network Security, Penetration Testing, Digital Forensics, Intrusion Detection, Security Governance.
Hackviser Student Ambassador
October 2025 – Present