Hi, I'm Jcyber-protect (Joel Ibazebo)!
Hot-Headed Cybersecurity Enthusiast | Security Analyst
Welcome to my GitHub! I’m a passionate Security Analyst with hands-on experience in cyber defense, threat detection, and hunting. My journey in cybersecurity is driven by curiosity, continuous learning, and a relentless pursuit of digital safety.
What I Do
- Security Analyst with a knack for investigating, analyzing, and defending against cyber threats.
- Powershell Scripting expert—automating, investigating, and hardening environments.
- Phishing Campaigns—designing, analyzing, and defending against real-world phishing attacks.
- Hands-on practitioner on the TryHackMe platform.
- Certified SOC Analyst I & II (EC-Council).
Top Skills & Tools
- PowerShell Scripting
- Phishing Campaign Simulation & Analysis
- Threat & Vulnerability Detection
- SIEM Tools (Wazuh, Splunk, Elastic SIEM, Nessus, etc.)
- Cloud Security (AWS EC2)
- MITRE ATT&CK Framework
- Incident Response
- Passbolt Password Management
- Threat Hunting
- Vulnerability Assessment Tools (Nmap, Nessus)
Projects I’m Proud Of
- Password Manager with Passbolt: Built and deployed a secure password manager using Passbolt, fully hosted on AWS EC2.
- T Honeypot: Deployed custom honeypots to monitor, detect, and analyze malicious activity.
- Wazuh Open Source Security Platform: Installed and configured Wazuh for real-time threat and vulnerability detection, including agent assignment and management.
Certifications & Qualifications
- BSc IT (Network and Security)
- EC-Council Certified SOC Analyst I & II
- CompTIA A+
- Microsoft SC-900
- Google Cybersecurity Certificate
Hobbies & Interests
- Reading (security blogs, tech books, and more)
- Swimming
- Studying (always learning new cybersecurity tactics & strategies)
- Diving deep into the MITRE ATT&CK table
- Long-distance driving
- Phishing campaigns
- Vulnerability assessment using Nmap to scan for open ports
- Vulnerability assessment using Nessus
Connect With Me
LinkedIn
Email
Fun Facts
- I thrive in fast-paced, high-pressure SOC environments.
- My curiosity for “how attacks work” keeps me up at night (and loving it!).
- I believe every security event is a story waiting to be unraveled.
- I’ve had my fair share of being a script kiddie—entry-level black hat dabbling in credential harvesting, session hijacking with JSON, and SMTP extraction—but now I’m passionately transitioning into the defensive side of cybersecurity to protect networks and digital assets from threat actors.
“Stay curious, stay secure.”