DEV Community

Samuel Adeduntan  profile picture

Samuel Adeduntan

Detail-oriented junior security specialist with 2+ years of experience in security analytics, incident response, and threat detection. Proficient in SIEM platforms (Splunk), vulnerability assessment

Education

M.A. Cybersecurity (DePaul), M.Sc. Software Dev (Quantic), B.A. Sociology & Religion

Pronouns

he, his, him

Work

SOC Analyst | Cybersecurity Projects: Wazuh SIEM, Pentesting, Endpoint & Email Security

#DAY 9: Accelerating Analysis with Splunkbase

#DAY 9: Accelerating Analysis with Splunkbase

1
Comments
3 min read

Want to connect with Samuel Adeduntan ?

Create an account to connect with Samuel Adeduntan . You can also sign in below to proceed if you already have an account.

Already have an account? Sign in
#DAY 8: Guardian of the Filesystem

#DAY 8: Guardian of the Filesystem

1
Comments
3 min read
#DAY 7: From Data to Detection

#DAY 7: From Data to Detection

1
Comments
5 min read
#DAY 6: Closing the On-Prem Loop

#DAY 6: Closing the On-Prem Loop

1
Comments
3 min read
#DAY 5: Configuring the Data Pipeline

#DAY 5: Configuring the Data Pipeline

1
Comments
3 min read
#DAY 4: The Field Agent

#DAY 4: The Field Agent

3
Comments
3 min read
#DAY 3: The Cloud Brain

#DAY 3: The Cloud Brain

6
Comments
4 min read
#DAY 2: From Installation to Operational Verification

#DAY 2: From Installation to Operational Verification

4
Comments
3 min read
#DAY 1: DFIR Lab Setup

#DAY 1: DFIR Lab Setup

5
Comments
4 min read
A Technical Deep Dive: Investigating Exchange Exploits and Lateral Movement in Splunk

A Technical Deep Dive: Investigating Exchange Exploits and Lateral Movement in Splunk

4
Comments 2
4 min read
Breaking & Securing the Web: An HTTP Credential Sniffer and Analyzer Project

Breaking & Securing the Web: An HTTP Credential Sniffer and Analyzer Project

3
Comments
5 min read
A Personal Journey: Understanding Reflected XSS Through My DVWA Setup

A Personal Journey: Understanding Reflected XSS Through My DVWA Setup

1
Comments
3 min read
A Technical Deep Dive: Exploiting SQL Injection Vulnerabilities

A Technical Deep Dive: Exploiting SQL Injection Vulnerabilities

1
Comments 1
5 min read
Complete Walkthrough Guide: File Integrity Monitoring (FIM) on Windows

Complete Walkthrough Guide: File Integrity Monitoring (FIM) on Windows

1
Comments 2
5 min read
File Integrity Monitoring with Wazuh SIEM Tool

File Integrity Monitoring with Wazuh SIEM Tool

2
Comments
3 min read
The Art of Recon: What Happens When a Target Only Has One Door?

The Art of Recon: What Happens When a Target Only Has One Door?

Comments
4 min read
From Enumeration to Exploitation: How a Hidden Directory Unlocked Sensitive User Data

From Enumeration to Exploitation: How a Hidden Directory Unlocked Sensitive User Data

Comments
5 min read
Wazuh On-Prem Installation for a Single-Node (All-in-One) Made Easy: Complete SIEM Setup Walkthrough

Wazuh On-Prem Installation for a Single-Node (All-in-One) Made Easy: Complete SIEM Setup Walkthrough

Comments
13 min read
Breaking into Cybersecurity: My Experience and Career Roadmap

Breaking into Cybersecurity: My Experience and Career Roadmap

Comments
4 min read
loading...