Skip to content
View LyticOnaope's full-sized avatar

Block or report LyticOnaope

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
LyticOnaope/README.md

👋 Hi there, I'm Onaope

🎓 Psych Graduate 📊 EX Financial Cost Analyst 🛡️ Cybersecurity Enthusiast 🧑‍💻Tech Explorer 🔗Linkedin 📧Email 🐤X


👨‍💻 About Me

I'm a driven and curious professional transitioning from a psychology and cost analysis background into the world of cybersecurity. With hands on experience working as a Financial Cost Analyst at an asphalt production firm (FSK), I've honed my analytical and problem-solving skills that I now channel into cybersecurity, threat detection, and ethical hacking.

With a solid background in financial systems management, account vulnerability assessments, and technical support, I now specialize in network security, incident response, threat intelligence, and SOC operations. My journey is one of continuous learning, blending soft skills from psychology, sharp cost analysis from my professional role, and a relentless curiosity for digital defense.

Welcome to my GitHub a reflection of my Progression, Projects, and Evolution in the Tech space 🚀 where curiousity fuels countinious learning.


🛠️ Technical Skills

  • Cybersecurity Skills:
    SOC Monitoring • Packet Analysis • Vulnerability Scanning • Threat Intelligence • Risk Assessment • Firewall Configuration • Snort & pfSense Setup • Incident Response • Malware Log Analysis • Penetration Testing • Endpoint Security • Network Monitoring

  • Tools & Platforms:
    Wireshark • Nmap • pfSense • Metasploit • Wazuh • Linux (Ubuntu, Kali) • Snort • TryHackMe • Burp Suite • VirtualBox

  • Data & Analysis Tools:
    Excel • Power BI • SQL • Cost Estimation & Reporting •


💼 Soft Skills

Communication • Analytical Thinking • Emotional Intelligence • Problem Solving • Documentation • Team Collaboration • Critical Thinking


🔭 Core Competencies

🔐 Network & Endpoint Security 🧠 Threat Detection & Incident Response 🕵️ Vulnerability Analysis & Risk Mitigation 📊 Security Information & Event Management (SIEM) 📡 Firewall Configuration & Network Hardening 🗂️ Asset & Access Control 📈 Continuous Learning & Upskilling 📊 SOC Tools & Alert Handling 🛜 Network Traffic Analysis 🤿 Snort IDS/IPS


🌱 Currently Exploring

🌱 Currently Exploring 🤿 AI in Cybersecurity 🔄 SOC Workflow Automation 🧑‍💻 Penetration Testing 🛡️ Ethical Hacking 🧑‍💻 Red vs Blue Team Tactics


⚡ **Fun Facts **

I'm passionate about tech, but I'm equally devoted to family and love. From analyzing costs and market trends to sniffing packets I enjoy solving problems across disciplines.


📫 Let's Connect

🧠 My Philosophy

"Cybersecurity isn’t just about defense it’s about curiosity, creativity, and the constant pursuit of knowledge."

 _Thanks for stopping by! Don’t forget to follow and check back for new projects. Let’s grow together._ 💪

Popular repositories Loading

  1. Data_Analysis Data_Analysis Public

    This repository contains my data analysis projects. highlighting my data journey and my analytical skills, with creative and compelling dashboard

  2. LyticOnaope LyticOnaope Public

    Config files for my GitHub profile.

  3. Threat-intelligence-assessment-project- Threat-intelligence-assessment-project- Public

    This project presents a passive threat intelligence assessment on Raptack, a FinTech company. It includes OSINT-based recon, security risk analysis, MITRE ATT&CK mapping (FIN7), key findings, and r…

  4. SOHO-Network-Design-Security-Optimization-Law-Firm SOHO-Network-Design-Security-Optimization-Law-Firm Public

    Designed a secure SOHO network for a law firm using Cisco Packet Tracer. Implemented DHCP, internal DNS, VLANs, and inter VLAN routing to fix connectivity, scalability, and security issues. Improve…

  5. ZHVA ZHVA Public

    A simulated vulnerability assessment of Zero Health’s internal network. Identified critical CVEs, performed risk analysis, and proposed mitigation strategies using tools like Nmap, , and Netdiscove…

  6. zphisher-Report zphisher-Report Public

    A simulated phishing attack using Zphisher in a controlled Kali Linux lab environment. This project demonstrates how attackers use fake login pages and tunneling to capture credentials. Conducted e…