SOC Operations Lab
Hands-on SOC lab covering log analysis, alert investigation, and detection workflows using SIEM tooling and Wireshark packet captures.
Cybersecurity Portfolio
Cyber Security Analyst Threat Intelligence Ethical Hacker Network Security
BSc Information Security & Forensics
Background
Cyber Security Analyst with hands-on experience supporting National Treasury security operations in Nairobi. I combine SOC, network security, and practical GRC exposure with Forage simulations from Datacom, Mastercard, and Deloitte.
I am hands-on with Wireshark, Nmap, Metasploit, Autopsy, SIEM workflows, and basic Python scripting, and I work with Azure fundamentals. I apply risk-based thinking informed by the Data Protection Act 2019 and Computer Misuse and Cybercrimes Act 2018 in project documentation and investigation reporting.
Practical
Hands-on SOC lab covering log analysis, alert investigation, and detection workflows using SIEM tooling and Wireshark packet captures.
Network security configurations and analysis — port scanning, traffic analysis, firewall rule walkthroughs, and VPN setup documentation.
Offensive security practice covering vulnerability scanning, exploitation with Metasploit, and security assessment documentation in a controlled lab environment.
Digital forensics investigations using Autopsy for disk and file analysis. Includes case writeups and evidence documentation following forensic investigation procedures.
Labs covering access control models, privilege management, and risk assessment frameworks with hands-on documentation of security controls.
Expertise
Academic
Professional
The National Treasury, Nairobi
Forage
Conducted risk assessment, built a structured risk register, and presented prioritised controls for simulated executive stakeholders.
Analysed phishing threats and redesigned targeted security awareness recommendations for vulnerable business units.
Worked through enterprise cyber scenarios across threat intelligence, IAM, and security architecture advisory workflows.
Credentials
Evidence
Comprehensive documentation of investigations, risk assessments, detection engineering, and job simulation results. All materials stored in Google Drive with full credential trails.
SIEM detection rules, threat hunting queries, and log analysis documentation.
View FolderRisk assessments, security governance frameworks, and compliance documentation.
View FolderDatacom, Deloitte, and Mastercard cybersecurity job simulation reports and deliverables.
View FolderProject reflections, security methodologies, and documented learning outcomes.
View FolderLeadership
Invictus Performance, Waiyaki Way, Nairobi
Get in Touch
Open to junior cybersecurity roles, internship opportunities, and security collaborations. Based in Nairobi, Kenya. Let's connect.
theondeda@gmail.com github.com/Archer7Mi linkedin.com/in/michaelndeda +254 711 677 140