Skip to content
View Eziuzor-SEC's full-sized avatar

Block or report Eziuzor-SEC

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Eziuzor-SEC/README.md

Hi, I'm Michael Eziuzor πŸ‘‹

πŸ” SOC Analyst | Blue Team | Threat Detection & Incident Response | Open to remote & relocation opportunities


About Me

  • πŸ›‘οΈ SOC Analyst with hands-on training and a background in Network Operations (NOC)
  • πŸ“ Based in Lagos, Nigeria | Open to remote & relocation opportunities
  • πŸŽ“ BSc Physiology, University of Benin (2023)
  • πŸ”­ Currently sharpening my blue team skills on LetsDefend
  • 🌍 Targeting SOC roles in the UK, Ireland, Germany, Netherlands, Canada & USA

Certifications

  • βœ… CompTIA Security+ (2025)
  • βœ… CompTIA Network+ (2025)
  • βœ… Fortinet Certified Fundamentals – FCF (2026)

Technical Skills

  • SOC & Blue Team: Alert Triage, Incident Response, IOC Lookup, Threat Intelligence, Phishing Analysis, Email Header Analysis, Escalation Procedures
  • SIEM & Monitoring: Splunk, Log Analysis, SIEM Alerting, Network Traffic Analysis
  • Threat Intel Tools: VirusTotal, URLScan.io, AbuseIPDB
  • Networking: LAN/WAN, IP Addressing, Routing Protocols (RIP v2, OSPF), VLANs, DHCP, Subnetting, Port Security, Cisco Packet Tracer
  • Security: Firewall Concepts, FortiGate Security Policies, Access Control, Risk Management, Password Policies
  • Systems: Windows & Linux Basics, Basic Linux CLI
  • Social Engineering Awareness: SEToolkit (Phishing Simulation)

Projects

πŸ”΅ SOC Investigations β€” LetsDefend

Documented incident investigations from the LetsDefend SOC platform including phishing analysis, XSS detection, IOC lookups, and SIEM-based alert triage.

πŸ“ View Writeups


Connect With Me

Popular repositories Loading

  1. Eziuzor-SEC Eziuzor-SEC Public

    SOC Analyst | Blue Team | Threat Detection & Incident Response

  2. SOC-Investigations SOC-Investigations Public

    Documented SOC incident investigations from the LetsDefend platform

  3. Phishing-Analysis-Report Phishing-Analysis-Report Public

    Detailed phishing email analysis using industry-standard SOC methodology and threat intelligence tools

  4. Threat-Intelligence-Report Threat-Intelligence-Report Public

    Structured threat intelligence report on the Emotet malware family using MITRE ATT&CK framework

  5. Incident-Response-Playbook Incident-Response-Playbook Public

    Step-by-step incident response playbook for common SOC attack scenarios

  6. Windows-Event-Log-Analysis Windows-Event-Log-Analysis Public

    Analysis of Windows Event Logs to identify suspicious activity including brute force attacks, privilege escalation, and log tampering