SecByArafai logo

SecByArafai

Faith Akerele

Cybersecurity Enthusiast | Blue Team Track

Snort • Zeek • Splunk Wireshark • PCAP Analysis Linux • Kali • Ubuntu • Windows Nmap • Bash • Python

About

I’m Faith Akerele, an aspiring Cybersecurity Analyst with a primary focus on Blue Team operations — including network defense, intrusion detection, and malware traffic analysis. I build and manage realistic home lab environments where I simulate attacks, investigate incidents, and create structured SOC-style reports to sharpen my detection and response skills.

While my main interest lies in defensive security, I also explore Red Team techniques to understand how attackers think. This includes basic penetration testing, vulnerability scanning, and exploitation fundamentals, which I use to strengthen my defensive strategies.

I regularly work with tools like Wireshark, Zeek, Snort, Splunk, Nmap, Kali Linux, Metasploitable, and document my findings clearly to reflect real-world security workflows. My goal is to combine this hands-on lab work with strong reporting skills to contribute effectively in a SOC, incident response, or junior analyst role.

I value clear communication, methodical investigation, and practical learning.

Skills & Tools

Detection & Monitoring

Snort, Splunk, Security Onion, Sysmon

Traffic & Forensics

Wireshark, PCAP analysis, tshark

Scanning & Hardening

Nmap, basic hardening checklists, bash scripting

Platforms

Linux (Kali/Ubuntu), Windows (workstation/server), VMware

Languages

Bash, Python (automation / parsing), C#, Markdown for reports

Soft Skills

Clear documentation, structured reports, professional communication

Certifications

CompTIA Security+ (in progress)

Studying core security concepts: network, identity, risk, and incident response. ETA: March 2026.

CompTIA CySA+ (planned)

Blue‑team analytics path: threat detection, log analysis, SIEM use‑cases. ETA: Q4 2026, after Security+.

Hands‑On Projects

Contact

Email: faithakerele14@gmail.com • LinkedIn: profile

I’m available for junior roles, apprenticeships, and internships. Based in the UK, open to remote/hybrid.