Hello, I'm
Oyetade Olayinka
A cybersecurity professional who builds real-world threat detection systems. I simulate attacks, detect them with Splunk SIEM, and document every finding to industry standard. I don't just study security, I practise it.
/ Career
A brief overview of my career
SOC Analyst
Iron Defense
Monitored and triaged security alerts in a production SOC environment, investigating suspicious endpoint, network, and authentication activity using Splunk, Sysmon, and Windows Event Logs. Reviewed alerts to determine true positive, false positive, and suspicious activity, documented investigation findings, escalated confirmed threats, and supported incident response workflows. Created clear incident timelines, identified indicators of compromise, and recommended remediation steps to reduce risk and improve detection quality.
Front-End Developer
CSDC Systems
Developed and maintained responsive web interfaces using HTML, CSS, JavaScript, and front-end frameworks for an enterprise solutions company serving government clients across Nigeria. Worked with UI components, API-connected pages, and navigation flows to improve usability and performance. Strengthened technical problem-solving, debugging, and documentation skills that directly support SOC investigation and security analysis work.
IT Technician
NNPC
Provided hands-on IT support at one of Nigeria's largest organisations, resolving hardware and software issues for staff across the department. Diagnosed and repaired endpoint problems, supported system configurations, and maintained operational uptime for critical workstations. Built foundational knowledge of enterprise IT infrastructure and endpoint environments that underpins current security operations work.
BSc in Cybersecurity / Computer Science
Babcock University
Completed undergraduate studies with a focus on cybersecurity, computer networks, operating systems, programming, and security fundamentals. Built a strong foundation in threat analysis, system security, scripting, and technical problem-solving, supporting continued growth toward SOC analysis and threat detection roles.
SOC Analyst
Iron Defense
Monitored and triaged security alerts in a production SOC environment, investigating suspicious endpoint, network, and authentication activity using Splunk, Sysmon, and Windows Event Logs. Reviewed alerts to determine true positive, false positive, and suspicious activity, documented investigation findings, escalated confirmed threats, and supported incident response workflows. Created clear incident timelines, identified indicators of compromise, and recommended remediation steps to reduce risk and improve detection quality.
Front-End Developer
CSDC Systems
Developed and maintained responsive web interfaces using HTML, CSS, JavaScript, and front-end frameworks for an enterprise solutions company serving government clients across Nigeria. Worked with UI components, API-connected pages, and navigation flows to improve usability and performance. Strengthened technical problem-solving, debugging, and documentation skills that directly support SOC investigation and security analysis work.
IT Technician
NNPC
Provided hands-on IT support at one of Nigeria's largest organisations, resolving hardware and software issues for staff across the department. Diagnosed and repaired endpoint problems, supported system configurations, and maintained operational uptime for critical workstations. Built foundational knowledge of enterprise IT infrastructure and endpoint environments that underpins current security operations work.
BSc in Cybersecurity / Computer Science
Babcock University
Completed undergraduate studies with a focus on cybersecurity, computer networks, operating systems, programming, and security fundamentals. Built a strong foundation in threat analysis, system security, scripting, and technical problem-solving, supporting continued growth toward SOC analysis and threat detection roles.
/ Featured Projects
A selection of professional work, published apps, and experimental prototypes.
Built a Windows endpoint detection environment using Splunk and Sysmon to simulate, detect, and investigate four MITRE ATT&CK techniques: LSASS Credential Dumping (T1003.001), Malicious Service Creation (T1543.003), Registry Run Key Persistence (T1547.001), and Scheduled Task Persistence (T1053.005). Authored SPL detection rules with automated alerting, tuned to zero false positives. All findings documented in structured incident reports, detection logic write-ups, and portfolio case studies following SOC documentation standards.
/ Tech Stack
Breakdown of my technical skills, categorized by domain and proficiency
SIEM & Detection
Endpoint Telemetry
Frameworks & Methodology
Infrastructure
/ Contact Me
Feel free to reach out. I'm always open to discussing new projects and opportunities.