Forem

Samuel Adeduntan  profile picture

Samuel Adeduntan

Detail-oriented junior security specialist with 1+ years of experience in security analytics, incident response, and threat detection. Proficient in SIEM platforms (Splunk), vulnerability assessment

Education

M.A. Cybersecurity (DePaul), M.Sc. Software Dev (Quantic), B.A. Sociology & Religion

Pronouns

he, his, him

Work

SOC Analyst | Cybersecurity Projects: Wazuh SIEM, Pentesting, Endpoint & Email Security

A Technical Deep Dive: Investigating Exchange Exploits and Lateral Movement in Splunk

A Technical Deep Dive: Investigating Exchange Exploits and Lateral Movement in Splunk

4
Comments 1
4 min read
Breaking & Securing the Web: An HTTP Credential Sniffer and Analyzer Project
Cover image for Breaking & Securing the Web: An HTTP Credential Sniffer and Analyzer Project

Breaking & Securing the Web: An HTTP Credential Sniffer and Analyzer Project

3
Comments
5 min read
A Personal Journey: Understanding Reflected XSS Through My DVWA Setup
Cover image for A Personal Journey: Understanding Reflected XSS Through My DVWA Setup

A Personal Journey: Understanding Reflected XSS Through My DVWA Setup

1
Comments
3 min read
A Technical Deep Dive: Exploiting SQL Injection Vulnerabilities
Cover image for A Technical Deep Dive: Exploiting SQL Injection Vulnerabilities

A Technical Deep Dive: Exploiting SQL Injection Vulnerabilities

1
Comments 1
5 min read
Complete Walkthrough Guide: File Integrity Monitoring (FIM) on Windows
Cover image for Complete Walkthrough Guide: File Integrity Monitoring (FIM) on Windows

Complete Walkthrough Guide: File Integrity Monitoring (FIM) on Windows

1
Comments 2
5 min read
File Integrity Monitoring with Wazuh SIEM Tool
Cover image for File Integrity Monitoring with Wazuh SIEM Tool

File Integrity Monitoring with Wazuh SIEM Tool

2
Comments
3 min read
The Art of Recon: What Happens When a Target Only Has One Door?
Cover image for The Art of Recon: What Happens When a Target Only Has One Door?

The Art of Recon: What Happens When a Target Only Has One Door?

Comments
4 min read
From Enumeration to Exploitation: How a Hidden Directory Unlocked Sensitive User Data
Cover image for From Enumeration to Exploitation: How a Hidden Directory Unlocked Sensitive User Data

From Enumeration to Exploitation: How a Hidden Directory Unlocked Sensitive User Data

Comments
5 min read
Wazuh On-Prem Installation for a Single-Node (All-in-One) Made Easy: Complete SIEM Setup Walkthrough
Cover image for Wazuh On-Prem Installation for a Single-Node (All-in-One) Made Easy: Complete SIEM Setup Walkthrough

Wazuh On-Prem Installation for a Single-Node (All-in-One) Made Easy: Complete SIEM Setup Walkthrough

Comments
12 min read
Breaking into Cybersecurity: My Experience and Career Roadmap
Cover image for Breaking into Cybersecurity: My Experience and Career Roadmap

Breaking into Cybersecurity: My Experience and Career Roadmap

Comments
4 min read
loading...