Aspiring cybersecurity professional with hands-on training in security operations, risk management, incident response, and tools such as SIEM, Wireshark, and Linux command-line utilities. Strong foundational knowledge in system hardening, and compliance frameworks. Eager to contribute to a dynamic cybersecurity team and continue growing within the field. .
Conducted a comprehensive security audit for Botium Toys, assessing asset management, encryption protocols, and compliance with international standards. Identified key vulnerabilities and recommended security enhancements such as AES-256 encryption, access control policies, and an intrusion detection system (IDS). The audit improved the company’s risk posture, ensuring regulatory compliance and enhanced data protection.
View OnlinePerformed an internal IT audit to assess compliance with PCI DSS, GDPR, and SOC 2 standards. Evaluated security controls, password policies, and incident response plans. Recommended the implementation of multi-factor authentication (MFA), centralized identity management, and SIEM solutions for real-time monitoring. This audit provided the company with a clear roadmap for improving security governance.
View OnlineInvestigated a distributed denial-of-service (DDoS) attack targeting a multimedia company’s network. Utilized network forensic tools to analyze traffic anomalies and identified an ICMP flood attack. Recommended firewall rules, IP spoofing prevention, and IDS/IPS solutions to mitigate future threats. The report provided actionable strategies for improving network resilience.
View OnlinePerformed a security risk assessment for a social media company following a major data breach. Identified critical vulnerabilities, including weak authentication methods and inadequate firewall configurations. Proposed security enhancements such as MFA enforcement, strict password policies, and firewall hardening. The recommendations helped improve the organization’s overall security framework.
View OnlineAnalyzed a SYN flood attack affecting a company’s web server. Captured network traffic logs using Wireshark and identified the attack pattern. Proposed rate-limiting, SYN cookies, and firewall filtering as mitigation strategies. The analysis contributed to strengthening the organization’s ability to detect and prevent denial-of-service attacks.
View OnlineEmail: Teniolaadesida5@gmail.com
Phone: 240-596-9527
LinkedIn: Teniola Adesida