My name is Kyle Efole & Iβm an aspiring Cybersecurity professional looking to acquire an entry-level Security Analyst position. I have hands-on experience in incident response, memory forensics, malware analysis, threat hunting, and IDS rule engineering.
π‘οΈ Featured Incident Response Projects
Here are my four end-to-end IR case studies using real security tools and workflows:
πΉ Imperial Memory β Memory Forensics Memory forensics using Volatility to extract credentials, decrypt an encrypted archive, and identify hidden indicators from a memory dump.
πΉ Mail & Trail β Splunk Log Analysis & Threat Hunting Investigated malicious URL activity captured in a honeypot using Telnet, Splunk, SPL queries, VirusTotal, and Base64 decoding.
πΉ One of Us β Malware Triage & Backdoor Trojan Analysis Triaged 271 suspicious files using VirusTotal and ClamAV to identify a Trojan with a Meterpreter-style backdoor and extract its MD5 hash.
πΉ Pigs Rule β Network Traffic Analysis & Snort Rule Engineering Analyzed tcpdump packet captures, detected suspicious RDP traffic on port 3389, and wrote custom Snort IDS rules to generate alerts visualized in Snorby.
π§° Tools & Technologies
πΉ SOC Tools
- Splunk
- Snort / Snorby
- Volatility
- Wireshark
- tcpdump
- ClamAV
- VirusTotal
- Base64 decoding tools
πΉ Systems & Platforms**
- Linux (Ubuntu / Kali)
- Windows Server (memory images)
- Virtualization labs
πΉ Technical Skills**
- Incident Response
- Malware Triage
- Memory Forensics
- SIEM Analysis
- Network Traffic Analysis
- Writing Snort rules
- Hashing (MD5/SHA)
- Log Filtering / Threat Hunting
- MITRE ATT&CK mapping
- CompTIA Security+ (SY0-701)
π What Iβm Working Toward
- Breaking into a SOC Tier 1 Analyst role
- Strengthening my detection skills
- Improving cloud security fundamentals (AWS / Azure)
- Continuing Blue Team projects and home labs
π« Connect With Me
Email: kodefole@gmail.com
LinkedIn: www.linkedin.com/in/kyle-olivier-efole
Thanks for stopping by! Always open to opportunities, mentorship, and collaboration in cybersecurity.
