SecByArafai

Faith Akerele

Cybersecurity Enthusiast | Blue Team Track

Snort • Zeek • Splunk Wireshark • PCAP Analysis Linux • Kali • Ubuntu • Windows Nmap • Bash • Python

About

I’m Faith Akerele, also known as SecByArafai, a cybersecurity student focused on Blue Team operations. My work centres around network defense, intrusion detection, and malware traffic analysis.

I build and manage realistic home lab environments where I simulate attacks, investigate incidents, and produce structured SOC-style reports to develop practical detection and response skills.

Alongside defensive security, I explore Red Team fundamentals such as basic penetration testing and vulnerability scanning to better understand attacker behaviour and strengthen my defensive approach.

I regularly use tools including Wireshark, Zeek, Snort, Splunk, Nmap, and Kali Linux, and I document my work to reflect real-world security workflows.

I’m currently working towards a junior SOC analyst or incident response role, where I can apply my hands-on skills and continue learning in a real-world environment.

Skills & Tools

Detection & Monitoring

Snort, Splunk, Security Onion, Sysmon

Traffic & Forensics

Wireshark, PCAP analysis, tshark

Scanning & Hardening

Nmap, basic hardening checklists, bash scripting

Platforms

Linux (Kali/Ubuntu), Windows (workstation/server), VMware

Languages

Bash, Python (automation / parsing), C#, Markdown for reports

Soft Skills

Clear documentation, structured reports, professional communication

Hands‑On Projects

Contact

Email: faithakerele14@gmail.com • LinkedIn: profile

I’m available for junior roles, apprenticeships, and internships. Based in the UK, open to remote/hybrid.