Holo Olagoke - Holo Integrated Ops
I am passionate Cybersecurity Analyst and software engineering based in Nigeria. My mission is to help individuals and businesses stay safe online through effective and tailored cybersecurity solutions and build effective web application.
Your trusted partner in exploring cybersecurity tips, SOC analyst insights, and software engineering resources to protect and innovate in the digital space.
Technologies and Tools
- Bash
- Python
- JavaScript
- React
- Nde JS
- Next JS
- HTML & CSS
- SQL
- Wireshark
- tcpdump
- SIEM & Log Management
- VirusTotal
- AbuseIPDB
- Nmap
- OpenVAS
- Sysmon
- Volatility
- JIRA
My Skills
Bridging Cyber Defense and Software Development for a Resilient Digital World: Protecting systems through intelligent monitoring, rapid detection, data-driven defense, building secure, scalable, and seamless web solutions from code to cloud.
My Learning Journey
I am passionate about building my skills in cybersecurity and software engineering. Below is a snapshot of the areas I&aposve been focus on:
Foundation of Cybersecurity
Recognized core skills and knowledge needed to become a cybersecurity analyst. Identified how security attacks impact business operations. Understood security ethics and Identified common tools used by cybersecurity analysts.
Managing Security Risks
Identified the primary threats, risks, and vulnerabilities to business operations. Examined how organizations use security frameworks and controls to protect business operations. Defined commonly used Security Information and Event Management (SIEM) tools. Used a playbook to respond to threats, risks, and vulnerabilities.
Network and Network Security
Analyzed incident reports to identify threats and vulnerabilities. Developed security risk assessments and comprehensive cybersecurity incident reports. Describe system hardening techniques.
Linux and SQL
Learnt the relationship between operating systems, applications, and hardware, graphical user interface to a command line interface. Navigated and managed the file system using Linux commands via the Bash shell. Used SQL to create and retrieve information from a database.
Assests Threats and Vulnerability
Classified assesst, analyzed an attack surface to find risks and vulnerabilities, ientified threats, such as social engineering, malware and web-based exploits ans summarized the threat modeling process.
Detection and Response
Identified the steps to contain, eradicate, and recover from an incident. Analyzed packets to interpret network communications. Understood basic syntax, components of signatures and logs in Intrusion Detection Systems (IDS) and Network Intrusion Detection Systems (NIDS) tools. Performed queries in Security Information and Event Management (SIEM) tools to investigate an event.
Automate CYbersecurity Tasks with Python
Learnt the use of Python programming language in cybersecurity. Created new, user-defined Python functions. Used regular expressions to extract information from text. Practice debugging code.
TCP/IP
Learnt operational functions of Internet technologies (which include IPv4, IPv6, TCP, UDP, addressing, routing, domain names, etc.) and PC/laptop's security and gateway Internet setup and basic principles. Used Wireshark experiment to see the TCP/IP packets and security systems in action.
Wireshark Packets Capture
Installed and set up Wireshark on Ubuntu. Used a display filter to detect HTTP and HTTPS packets. Used a display filter to detect IP Addresses in packets.
Software Engineering and Development
Gained practical experience across the Software Development Life Cycle (SDLC) — from requirements gathering to deployment and maintenance.
Frontend Application Development
Mastering technologies like HTML, CSS, JavaScript, and React to create user-friendly, responsive, and interactive web interfaces.
Backend Application Development
Developed robust and scalable server-side applications using Node.js, PHP, and Python (Flask) — integrating APIs, managing authentication, and implementing secure logic for real-world use cases.
Database Management System
Learnt SQLite, MySQL, and MariaDB for data modeling, query optimization, and system integration.