Cybersecurity Portfolio

About Me

Aspiring cybersecurity professional with hands-on training in security operations, risk management, incident response, and tools such as SIEM, Wireshark, and Linux command-line utilities. Strong foundational knowledge in system hardening, and compliance frameworks. Eager to contribute to a dynamic cybersecurity team and continue growing within the field. .

Projects

Botium Toys: Risk Assessment & Compliance Audit

Conducted a comprehensive security audit for Botium Toys, assessing asset management, encryption protocols, and compliance with international standards. Identified key vulnerabilities and recommended security enhancements such as AES-256 encryption, access control policies, and an intrusion detection system (IDS). The audit improved the company’s risk posture, ensuring regulatory compliance and enhanced data protection.

View Online

Mock Security Audit

Performed an internal IT audit to assess compliance with PCI DSS, GDPR, and SOC 2 standards. Evaluated security controls, password policies, and incident response plans. Recommended the implementation of multi-factor authentication (MFA), centralized identity management, and SIEM solutions for real-time monitoring. This audit provided the company with a clear roadmap for improving security governance.

View Online

DDoS Attack Analysis

Investigated a distributed denial-of-service (DDoS) attack targeting a multimedia company’s network. Utilized network forensic tools to analyze traffic anomalies and identified an ICMP flood attack. Recommended firewall rules, IP spoofing prevention, and IDS/IPS solutions to mitigate future threats. The report provided actionable strategies for improving network resilience.

View Online

Security Risk Assessment

Performed a security risk assessment for a social media company following a major data breach. Identified critical vulnerabilities, including weak authentication methods and inadequate firewall configurations. Proposed security enhancements such as MFA enforcement, strict password policies, and firewall hardening. The recommendations helped improve the organization’s overall security framework.

View Online

SYN Flood Attack Analysis

Analyzed a SYN flood attack affecting a company’s web server. Captured network traffic logs using Wireshark and identified the attack pattern. Proposed rate-limiting, SYN cookies, and firewall filtering as mitigation strategies. The analysis contributed to strengthening the organization’s ability to detect and prevent denial-of-service attacks.

View Online
View Wireshark TCP/HTTP Log

Certifications

Contact

Email: Teniolaadesida5@gmail.com

Phone: 240-596-9527

LinkedIn: Teniola Adesida