Skip to content
View alexojocyber's full-sized avatar
:shipit:
Support me with a ⭐
:shipit:
Support me with a ⭐

Block or report alexojocyber

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
alexojocyber/README.md

Hi, I'm Alex Ojo

Cybersecurity Student | Google & IBM Certified | Aspiring SOC & GRC Analyst

Building hands-on experience in security monitoring, Linux security, Python automation, SIEM investigations, GRC compliance, and incident response. Passionate about learning, problem-solving, and building real-world cybersecurity projects.


πŸ› οΈ Skills

  • Security: Threat Detection, SIEM Monitoring, Incident Response, Brute Force Detection, Log Analysis, IOC Documentation, Risk Assessment, GRC Compliance
  • Tools: Splunk Cloud, Wireshark, Nmap, Linux CLI, Fail2Ban, PAM faillock, Metasploit (beginner)
  • Scripting: Python, Bash
  • Languages: SPL (Splunk Search Processing Language)
  • Frameworks: MITRE ATT&CK, NIST CSF, ISO 27001, PCI-DSS, GDPR, CIS Controls
  • Networking: TCP/IP, Ports, Protocols, Firewalls, SSH
  • Systems: Kali Linux, Ubuntu, Windows
  • Other: Documentation, Reporting, Power BI, Git/GitHub

πŸ”¬ Featured Projects

πŸ” GRC Security Audit β€” CipherPay Ltd (NEW)

Conducted a full security audit and risk assessment for a fictional fintech startup as a Junior GRC Analyst. Identified 14 risks across Critical, High, Medium and Low categories. Assessed 26 NIST CSF controls and 18 ISO 27001 controls. Delivered a 90-day remediation roadmap mapped to PCI-DSS and GDPR requirements. Skills: GRC, Risk Assessment, NIST CSF, ISO 27001, PCI-DSS, GDPR, Compliance Mapping


🐍 Python Automated Log Parser β€” SSH Brute Force Detection

Built a Python script that automatically parses Linux authentication logs, detects brute-force patterns, flags suspicious IPs, and generates a structured incident report with MITRE ATT&CK and NIST mapping. Skills: Python, Log Analysis, Automation, MITRE ATT&CK, NIST Mapping


πŸ” Splunk SIEM Lab β€” Brute Force Detection Dashboard

Ingested real Linux auth logs into Splunk Cloud, built 4 SPL detection queries, and created a live dashboard with bar charts, timeline analysis, and event tables. Mapped findings to MITRE ATT&CK T1110 and NIST controls. Skills: Splunk Cloud, SPL, SIEM, Dashboard Creation, MITRE ATT&CK, NIST Compliance


πŸ” SSH Brute Force Detection & Defense Lab

Simulated an SSH brute-force attack on Ubuntu, investigated authentication logs, and implemented automated IP blocking using Fail2Ban. Documented full attack timeline, IOCs, and defense configuration. Skills: SSH Security, Log Analysis, Fail2Ban, Incident Response, Linux Security


🚨 Enterprise SIEM Lab β€” PAM Brute Force Detection

Configured account lockout protection using PAM faillock to defend against brute-force attacks. Simulated failed login attempts, triggered lockout policies, mapped findings to MITRE ATT&CK, and recovered system after accidental lockout. Skills: Linux Security, PAM Configuration, Authentication Security, MITRE ATT&CK, Incident Recovery


🌐 Network Traffic Analysis β€” Wireshark

Analyzed PCAP files to identify anomalies, suspicious traffic, and common attack patterns. Skills: Packet Analysis, Network Security, Protocol Inspection


πŸ”’ Linux Server Hardening (Home Lab)

Configured user accounts, permissions, updates, and basic security controls. Skills: Linux Security, File Permissions, Hardening Practices


πŸ’» System Health Checker β€” Bash Script

Automation script that outputs system uptime, CPU/memory usage, disk space, logged-in users, and active processes. Skills: Bash, Linux Monitoring, Automation


πŸ“œ Certifications

  • Google Cybersecurity Professional Certificate β€” 2025
  • IBM Cybersecurity Analyst Professional Certificate β€” 2025

πŸ“ Repositories

Project Description
GRC-Security-Audit-CipherPay Full GRC security audit mapped to NIST CSF, ISO 27001, PCI-DSS and GDPR
Splunk-SIEM-Lab Splunk Cloud detection dashboard with SPL queries and MITRE ATT&CK mapping
Python-Log-Parser Automated Python script for SSH brute force detection and incident reporting
SSH-BruteForce-Detection-Lab SSH attack simulation, log analysis, and Fail2Ban defense
SIEM-Investigation-Lab PAM brute-force detection with MITRE ATT&CK mapping
Wireshark-Network-Analysis Packet captures + analysis reports
Linux-Security-Projects Hands-on Linux hardening and security configurations
System-Health-Checker-Bash Bash automation script for Linux system monitoring

πŸ“¬ Contact

πŸ“§ ojoo.alexxx@gmail.com

LinkedIn GitHub


Keep checking back β€” I update this portfolio as I learn more! πŸš€

Keep checking back β€” I update this portfolio as I learn more! πŸš€

Pinned Loading

  1. Splunk-SIEM-Lab Splunk-SIEM-Lab Public

    SOC detection lab using Splunk Cloud to ingest Linux auth logs, build brute force detection queries, and visualize attack timelines on a real-time dashboard.

  2. SSH-BruteForce-Detection-Lab SSH-BruteForce-Detection-Lab Public

    SOC investigation lab simulating SSH brute-force attack detection, IP analysis, and firewall blocking using Linux logs.

    1

  3. Python-Log-Parser Python-Log-Parser Public

    Automated Python script that parses Linux auth logs to detect SSH brute force attacks and generate incident reports

    Python 1

  4. SIEM-Investigation-Lab SIEM-Investigation-Lab Public

    Hands-on Security Operations (SOC) investigations using SIEM tools. Includes incident triage, log analysis, alert validation, MITRE ATT&CK mapping, IOC hunting, and real-world cyber incident reports.

    2

  5. Linux-Security-Projects Linux-Security-Projects Public

    Hands-on Linux security tasks, hardening steps, and command-line practice from my cybersecurity home lab.

    1

  6. Wireshark-Network-Analysis Wireshark-Network-Analysis Public

    Packet analysis and network investigation using Wireshark, including PCAP files, findings, and security observations.

    1