Skip to content
View Dekiridi's full-sized avatar

Block or report Dekiridi

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Dekiridi/README.md

👋 Hi there, I'm Dekiridi

🛡️ Cybersecurity Enthusiast | Ex-Banker | Tech Explorer 🔗 LinkedIn 📧 Email GitHub

👨‍💻 About Me

I’m a passionate Cybersecurity and IT professional transitioning from a successful 9+ year career in Banking and Finance at the Central Bank of Nigeria, With a solid background in financial systems management, account vulnerability assessments, and technical support, I now specialize in network security, incident response, threat intelligence, and SOC operations. I’ve worked extensively with enterprise systems like Temenos T24 and Oracle ERP, and I’m excited about leveraging AI and automation to advance threat detection and cyber defense.

Welcome to my portfolio—where finance meets tech, and curiosity fuels continuous growth. 🚀

🛠️ Technical Skills

SOC Monitoring • Malware Log Analysis • Penetration Testing • Threat Intelligence • Risk Assessment • Endpoint Security • Firewall Configuration • Incident Response • Network Monitoring • Access Control Tools & Platforms: Wireshark • Nmap • Metasploit • Wazuh • pfSense • Linux • Temenos T24 • Oracle ERP • Kali linux • Ubuntu

Soft Skills:

Communication & Reporting • Critical Thinking • Problem Solving • Cross-Team Collaboration

🔭 Core Competencies

🔐 Network & Endpoint Security 🧠 Threat Detection & Incident Response 🕵️ Vulnerability Analysis & Risk Mitigation 📊 Security Information & Event Management (SIEM) 📡 Firewall Setup & Network Hardening 🗂️ Asset & Access Control 📈 Continuous Learning & Upskilling

🌱 Currently Exploring

AI in Cybersecurity 🤖 SOC Workflow Automation 🔄 Penetration Testing 🛡️ Ethical Hacking 🧑‍💻 Red vs Blue Team Tactics

✨ Fun Fact Once a banker, now a breaker—of firewalls (legally, of course 😄). From managing national financial systems to sniffing packets with Wireshark, my journey into cybersecurity has been both humbling and exhilarating.

📈 GitHub Stats

💬 Let’s Connect

“Cybersecurity isn’t just about defense—it’s about curiosity, precision, and the will to never stop learning.”

Pinned Loading

  1. SOC-Capstone-Threat-Detection-Wireshark-pfSense-Wazuh SOC-Capstone-Threat-Detection-Wireshark-pfSense-Wazuh Public

    A cybersecurity capstone project showcasing threat detection and incident response using Wireshark for network traffic analysis, pfSense for firewall policy enforcement, and Wazuh for SIEM-based ev…

  2. Cybersecurity-Threat-Detection-Intelligence Cybersecurity-Threat-Detection-Intelligence Public

    A comprehensive threat intelligence analysis of Densa State Government’s digital infrastructure (densastate.gov.ng), uncovering vulnerabilities, and threat intelligence analysis targeting governmen…

  3. SOC-Threat-Detection-Log-Analysis-Lab-Wazuh-Hydra-Wireshark SOC-Threat-Detection-Log-Analysis-Lab-Wazuh-Hydra-Wireshark Public

    A cybersecurity lab simulating real-world threat detection using Hydra brute-force, Wireshark traffic capture, Wazuh SIEM, and pfSense firewall segmentation — showcasing incident detection, respons…

  4. Lazarus-Group-Threat-Intelligence-Report-APT38-Tactics-Techniques-and-Countermeasures Lazarus-Group-Threat-Intelligence-Report-APT38-Tactics-Techniques-and-Countermeasures Public

    In-depth cybersecurity threat analysis on Lazarus Group (APT38), focusing on attack vectors, motivations, and countermeasures. Highlights advanced threat tactics like phishing, malware, SWIFT explo…

  5. BUILDING-A-SIMPLE-NETWORK-USING-CISCO-PACKET-TRACER. BUILDING-A-SIMPLE-NETWORK-USING-CISCO-PACKET-TRACER. Public

    Hands-on project designing and securing a basic network topology using Cisco Packet Tracer — featuring IP configuration, firewall setup to block ICMP traffic, and network connectivity testing