We can organize an interview with Aldin or any of our 25,000 available candidates within 48 hours. How would you like to proceed?
Schedule Interview NowMy name is Adedeji O. and I have over 2 years of experience in the tech industry. I specialize in the following technologies: Splunk, Vulnerability Assessment, Linux, Incident Response Readiness Assessment, Incident Management, etc.. I hold a degree in Bachelor's. Some of the notable projects I've worked on include: Indexing Pipeline Project Documentation, Cybersecurity Monitoring & Response Flow (Practical Lab), AWS CloudTrail Log Simulation and Detection Analysis Using Splunk, Performance Monitoring in Splunk, In-depth Analysis of Windows System Logs Using Splunk SPL Queries, etc.. I am based in Apapa, Nigeria. I've successfully completed 10 projects while developing at Softaims.
I possess comprehensive technical expertise across the entire solution lifecycle, from user interfaces and information management to system architecture and deployment pipelines. This end-to-end perspective allows me to build solutions that are harmonious and efficient across all functional layers.
I excel at managing technical health and ensuring that every component of the system adheres to the highest standards of performance and security. Working at Softaims, I ensure that integration is seamless and the overall architecture is sound and well-defined.
My commitment is to taking full ownership of project delivery, moving quickly and decisively to resolve issues and deliver high-quality features that meet or exceed the client's commercial objectives.
Main technologies
2 years
1 Year
1 Year
1 Year
Potentially possible
Frontdreams Technology
In this project, I built a complete Summary Indexing Pipeline in Splunk using a custom dataset of authentication logs. My goal was to transform a raw CSV authentication dataset into real time analytic
I came across a visual representation of a Cybersecurity Monitoring and Response Flow (see figure below), which outlined the logical steps an attacker might take, and how security layers such as EDR,
This project represents a realistic end-to-end Security Operations Center (SOC) investigation scenario designed to simulate and analyze AWS CloudTrail logs using Splunk. The purpose was to develop an
This project required me to build a dynamic dashboard in Splunk that monitored and visualized critical database activities, specifically DELETE, UPDATE, and INSERT events across PostgreSQL, SQL Serve
System logs are the digital footprints of a computer’s core operations — from service starts, shutdowns, driver failures, to power transitions. They are invaluable for system administrators, cybersec
Bachelor's in Computer Science