HimalayasHimalayas logo
omoshofcourse UserOU
Open to opportunities

omoshofcourse User

@omoshofcourseuser

I am a SOC Analyst who turns telemetry into threat insights through DFIR, OSINT, and incident response.

Kenya
Message

What I'm looking for

I’m looking to grow in a SOC/DFIR environment where I can improve detection quality, triage faster with automation, and turn telemetry and forensic evidence into clear IOCs, timelines, and actionable recommendations.

I’m a cybersecurity professional with a network engineering foundation and specialized training in digital forensics, threat intelligence, and security operations. I’m ISC² Certified in Cybersecurity and focused on turning evidence into clear, actionable next steps for incident response.

In simulated and capstone work, I’ve conducted hard drive and PCAP investigations using Linux CLI and Wireshark/TCPDump to extract indicators, reconstruct timelines, and produce reports with IOCs and recommended detection filters for SIEM ingestion. I’ve also performed end-to-end malware threat hunts, generating hashes/strings, searching images for hidden artifacts, and recommending enrichment and detections.

My DFIR approach emphasizes disciplined methodology—recovering hidden data via steganography, applying file signature analysis and file carving, and documenting chain of custody. I also build threat intelligence using OSINT, research threat actors and attack vectors, and analyze dark web infrastructure to support threat hunting and prevention strategies.

As a NOC Intern, I operated and tuned network telemetry (syslog, netflow, SNMP) across multi-site infrastructure, triaged anomalous events with packet-level analysis, and delivered timelines and root-cause reporting for SOC investigations. I automated log-forwarding pipelines, developed Python/Bash tooling to flag suspicious patterns, and authored runbooks/playbooks to improve triage and escalation consistency.

Experience

Work history, roles, and key accomplishments

LD

Malware Threat-Hunt Capstone

Let's Defend

Performed an end-to-end malware threat hunt on a provided system image by generating IOCs (hashes/strings/filenames) and analyzing the image in a VM environment. Reconstructed malware spread and persistence mechanisms and delivered an investigative brief with SIEM-ready detection/enrichment recommendations.

Education

Degrees, certifications, and relevant coursework

ISC2 logoIS

ISC2

ISC² Certified in Cybersecurity (CC), Cybersecurity

Activities and societies: OSINT investigations, dark web operations, and digital evidence analysis using forensic methodologies; focused on incident documentation and anomaly detection.

Completed ISC2 Certified in Cybersecurity (CC) with hands-on work across threat intelligence, OSINT investigations, dark web research, and digital evidence analysis.

Let's Defend logoLD

Let's Defend

Let's Defend SOC Learning (Blue Team), Security Operations (SOC)

Activities and societies: Threat hunting and incident response exercises including PCAP/network analysis, OSINT threat intelligence reporting, and structured evidence handling.

Completed Let's Defend SOC Learning (Blue Team) focused on security operations and practical SOC investigation workflows.

MB

Microsoft Blue Team Academy (BTJA)

Microsoft Student SOC Path (BTJA) Foundations, SOC Fundamentals

Activities and societies: Built investigation and triage skills for common SOC alerts, including enrichment, escalation criteria, and incident timeline documentation.

Completed the Microsoft Student SOC Path Team Junior (BTJA) Pathway Program Foundations, building SOC and blue-team fundamentals.

Find your dream job

Sign up now and join over 100,000 remote workers who receive personalized job alerts, curated job matches, and more for free!

Sign up
Himalayas profile for an example user named Frankie Sullivan