DEV Community

Samuel Adeduntan  profile picture

Samuel Adeduntan

Detail-oriented junior security specialist with 2+ years of experience in security analytics, incident response, and threat detection. Proficient in SIEM platforms (Splunk), vulnerability assessment

Education

M.A. Cybersecurity (DePaul), M.Sc. Software Dev (Quantic), B.A. Sociology & Religion

Pronouns

he, his, him

Work

SOC Analyst | Projects: Wazuh SIEM, Pentesting, Endpoint & Email Security, Network Monitoring

#DAY 12: My Project Summary & Learning Journey.

#DAY 12: My Project Summary & Learning Journey.

2
Comments
5 min read

Want to connect with Samuel Adeduntan ?

Create an account to connect with Samuel Adeduntan . You can also sign in below to proceed if you already have an account.

Already have an account? Sign in
#DAY 11: High Availability – Deploying a Reverse Proxy (Nginx)

#DAY 11: High Availability – Deploying a Reverse Proxy (Nginx)

1
Comments
3 min read
#DAY 10:Adding an API JSON Query Monitor in Uptime Kuma

#DAY 10:Adding an API JSON Query Monitor in Uptime Kuma

1
Comments
2 min read
#DAY 8 & 9: Cross-Platform Monitoring - Adding a Windows Host

#DAY 8 & 9: Cross-Platform Monitoring - Adding a Windows Host

Comments
8 min read
#DAY 7: The First Fire Drill: Incident Simulation

#DAY 7: The First Fire Drill: Incident Simulation

Comments
3 min read
#DAY 6 - Organization & Public Status Page

#DAY 6 - Organization & Public Status Page

Comments
3 min read
#DAY 5 - Getting Proactive: Telegram Alert Configuration

#DAY 5 - Getting Proactive: Telegram Alert Configuration

1
Comments
3 min read
#DAY 4 - Expanding My Monitoring Scope: External & Advanced Checks

#DAY 4 - Expanding My Monitoring Scope: External & Advanced Checks

1
Comments
5 min read
#DAY 3 - Monitoring Internal Services: FTP & SSH

#DAY 3 - Monitoring Internal Services: FTP & SSH

1
Comments
3 min read
#DAY 2: Deploying the Monitoring Dashboard - Uptime Kuma

#DAY 2: Deploying the Monitoring Dashboard - Uptime Kuma

1
Comments
2 min read
#DAY 1: Docker & Core Concepts

#DAY 1: Docker & Core Concepts

2
Comments
2 min read
#Pre-DAY 1: Laying the Foundation: Docker & Concepts

#Pre-DAY 1: Laying the Foundation: Docker & Concepts

1
Comments
3 min read
#DAY 9: Accelerating Analysis with Splunkbase

#DAY 9: Accelerating Analysis with Splunkbase

1
Comments
3 min read
#DAY 8: Guardian of the Filesystem

#DAY 8: Guardian of the Filesystem

1
Comments
3 min read
#DAY 7: From Data to Detection

#DAY 7: From Data to Detection

1
Comments
5 min read
#DAY 6: Closing the On-Prem Loop

#DAY 6: Closing the On-Prem Loop

1
Comments
3 min read
#DAY 5: Configuring the Data Pipeline

#DAY 5: Configuring the Data Pipeline

1
Comments
3 min read
#DAY 4: The Field Agent

#DAY 4: The Field Agent

3
Comments
3 min read
#DAY 3: The Cloud Brain

#DAY 3: The Cloud Brain

5
Comments
4 min read
#DAY 2: From Installation to Operational Verification

#DAY 2: From Installation to Operational Verification

2
Comments
3 min read
#DAY 1: DFIR Lab Setup

#DAY 1: DFIR Lab Setup

5
Comments
4 min read
A Technical Deep Dive: Investigating Exchange Exploits and Lateral Movement in Splunk

A Technical Deep Dive: Investigating Exchange Exploits and Lateral Movement in Splunk

1
Comments 2
4 min read
Breaking & Securing the Web: An HTTP Credential Sniffer and Analyzer Project

Breaking & Securing the Web: An HTTP Credential Sniffer and Analyzer Project

1
Comments
5 min read
A Personal Journey: Understanding Reflected XSS Through My DVWA Setup

A Personal Journey: Understanding Reflected XSS Through My DVWA Setup

1
Comments
3 min read
A Technical Deep Dive: Exploiting SQL Injection Vulnerabilities

A Technical Deep Dive: Exploiting SQL Injection Vulnerabilities

1
Comments 1
5 min read
Complete Walkthrough Guide: File Integrity Monitoring (FIM) on Windows

Complete Walkthrough Guide: File Integrity Monitoring (FIM) on Windows

1
Comments 2
5 min read
File Integrity Monitoring with Wazuh SIEM Tool

File Integrity Monitoring with Wazuh SIEM Tool

2
Comments
3 min read
The Art of Recon: What Happens When a Target Only Has One Door?

The Art of Recon: What Happens When a Target Only Has One Door?

Comments
4 min read
From Enumeration to Exploitation: How a Hidden Directory Unlocked Sensitive User Data

From Enumeration to Exploitation: How a Hidden Directory Unlocked Sensitive User Data

Comments
5 min read
Wazuh On-Prem Installation for a Single-Node (All-in-One) Made Easy: Complete SIEM Setup Walkthrough

Wazuh On-Prem Installation for a Single-Node (All-in-One) Made Easy: Complete SIEM Setup Walkthrough

Comments
13 min read
Breaking into Cybersecurity: My Experience and Career Roadmap

Breaking into Cybersecurity: My Experience and Career Roadmap

Comments
4 min read
loading...