Summary
Overview
Work History
Education
Skills
Accomplishments
Certification
Additional Information
Work Preference
Languages
Timeline
Generic
Oluwatobiloba Jeremiah Aladetuyi

Oluwatobiloba Jeremiah Aladetuyi

Cybersecurity Analyst
Lagos,LA

Summary

Oluwatobi Aladetuyi is a cybersecurity professional specializing in penetration testing, ethical hacking, and security operations. He holds multiple industry-recognized certifications, including ISC2 Certified in Cybersecurity (CC), CompTIA Security+ SY0-701, and Cisco cybersecurity certifications. Additionally, he has completed specialized training, such as the Cybersecurity Within IT and ICS Domains course from the U.S. Department of Homeland Security.

Oluwatobi has extensive hands-on experience with offensive security, vulnerability management, and security operations through multiple cybersecurity training programs and real-world engagements.

  • Penetration Testing & Ethical Hacking: Proficient in web application security, API security, network penetration testing, and cloud security assessments. He has conducted security testing against OWASP Top 10 vulnerabilities, including SQL Injection (SQLi), Cross-Site Scripting (XSS), Cross-Site Request Forgery (CSRF), and Insecure Direct Object References (IDOR).
  • Endpoint & Threat Detection: Skilled in Endpoint Detection and Response (EDR), Extended Detection and Response (XDR), and Managed Detection and Response (MDR) solutions, leveraging tools like Sophos, CrowdStrike, and Microsoft Defender for Endpoint to detect and mitigate cyber threats.
  • Security Information & Event Management (SIEM) & Security Orchestration (SOAR): Experienced in Splunk, Elastic SIEM, and IBM QRadar for security log analysis, event correlation, and threat hunting. Familiar with SOAR platforms to automate security workflows and incident response.
  • Firewalls, IDS/IPS & Network Security: Knowledgeable in network defense mechanisms, intrusion detection and prevention systems (IDS/IPS), and next-generation firewalls such as Fortinet, Palo Alto, and Cisco Firepower.
  • Vulnerability Management & Risk Assessment: Proficient in Qualys, Nessus, and OpenVAS for vulnerability scanning and risk assessment, ensuring proactive threat mitigation.
  • Active Directory Security & Identity Management: Familiar with Active Directory (AD) security, Group Policy management, and privilege escalation techniques for both defensive and offensive security operations.
  • Virtual Desktop & Infrastructure Security: Experience working with VDMR (Virtual Desktop Monitoring & Response) solutions and securing virtualized environments.
  • Hacktify Cybersecurity Internship: Gained hands-on experience in penetration testing, vulnerability exploitation, and web application security, working on real-world security challenges.
  • Wilses Cyber Security Solutions (Final Weeks of Internship): Conducted vulnerability assessments, security audits, and penetration testing using Burp Suite, Nikto, Metasploitable2, Nessus, and other offensive security tools.

Oluwatobi is a Cybersecurity Trainer at Cyber Protection Academy, where he educates aspiring cybersecurity professionals on offensive and defensive security techniques. He is also in the process of launching a blog dedicated to security tutorials and internet safety, aiming to bridge the cybersecurity skills gap by sharing knowledge on penetration testing, network security, and threat intelligence.

Oluwatobi aspires to pursue a cybersecurity degree while continuing to advance in penetration testing, threat intelligence, and incident response. His career focus includes:
Web application & API security
Cloud security & DevSecOps
Threat hunting & cyber threat intelligence
Security automation & SOAR implementation

Beyond cybersecurity, Oluwatobi is a classical trumpet player, conductor, and music consultant. He has organized and conducted brass ensembles, chamber groups, and orchestras, and was part of the Pan-Africa Ensemble that recorded the AFREXIM Bank anthem in Egypt in 2021.

With a unique blend of technical expertise, leadership, and a commitment to cybersecurity education, Oluwatobi is dedicated to securing web applications, enterprise networks, and critical infrastructure against evolving cyber threats.

Overview

1
1

COMPTIA SECURITY+ SY0 - 701

1
1
year of professional experience
1
1
year of post-secondary education

Work History

INTERN - CYBERSECURITY

HACKTIFY CYBER SECURITY
02.2025 - 03.2025

Hacktify’s cybersecurity internship is a hands-on training program designed to equip participants with practical experience in web application security, penetration testing, and vulnerability assessment. The program covers various cybersecurity concepts, focusing on real-world attack scenarios and security best practices.

Key Features of the Internship
Hands-on Labs
: Interns work on practical labs covering vulnerabilities like Injection, Cross-Site Scripting (XSS), SQL Injection (SQLi), Insecure Direct Object References (IDOR), Cross-Site Request Forgery (CSRF), Cross-Origin Resource Sharing (CORS) misconfigurations, and more.


OWASP Top 10 Focus: The training emphasizes the OWASP Top 10 security risks, ensuring interns gain an in-depth understanding of common web vulnerabilities and their mitigations.


Offensive and Defensive Security: Participants learn both how to exploit vulnerabilities and how to secure applications against them.
Certification of Completion: After completing different modules, interns receive certificates to validate their skills and knowledge.


Guidance from Experts: The program includes mentorship from industry professionals who provide insights into penetration testing, ethical hacking, and security best practices.


Bug Bounty Readiness: Interns gain experience relevant to bug bounty programs, helping them prepare for real-world security research and vulnerability disclosure programs.

INTERN - CYBERSECURITY

WILSES CYBER SECURITY SOLUTIONS
01.2025 - 03.2025

Cybersecurity Internship at Wilses Cyber Security Solutions

The Wilses Cyber Security Solutions internship is an intensive 3-month hands-on training program designed to provide participants with practical experience in penetration testing, vulnerability assessment, and cybersecurity analysis. This program is structured to help interns develop real-world skills in ethical hacking, web application security, and network security.

Key Features of the Internship

Practical Hands-on Labs
Interns engage in real-world security assessments using industry-standard tools and techniques. Topics covered include:
Web Application Security: Exploring vulnerabilities like SQL Injection (SQLi), Cross-Site Scripting (XSS), CSRF, CORS misconfigurations, and IDOR.
Network Security: Learning about scanning, enumeration, and exploitation of network-based vulnerabilities.
Security Tools & Frameworks: Hands-on experience with tools such as Burp Suite, Nikto, Metasploitable2, Nessus, and more.

Offensive and Defensive Security Training
Interns are trained in both red team (offensive) and blue team (defensive) security approaches, learning how to identify, exploit, and remediate vulnerabilities effectively.

Real-World Simulated Attacks
The program includes simulations of cyber-attacks and penetration testing scenarios, preparing interns for CTFs (Capture The Flag) challenges and real-world security assessments.

Mentorship & Career Development
Interns receive mentorship from experienced cybersecurity professionals, helping them build a strong foundation in ethical hacking, security auditing, and risk management.



IT & CYBERSECURITY ENGINEER

CYBERTECH NEXUS
03.2025 - Current

Designing and implementing security measures

Monitoring networks and systems for security threats

Conducting vulnerability assessments and penetration testing

Investigating security incidents and breaches

Configuring firewalls, IDS/IPS, and endpoint security solutions

Ensuring compliance with security frameworks (NIST, ISO 27001, GDPR, etc.)

Security awareness training and incident response planning

Managing servers, networks, and IT systems

Installing and configuring hardware and software

Ensuring system performance, uptime, and security

Troubleshooting IT-related issues

Managing databases, cloud services, and virtualization

Implementing and monitoring backup and disaster recovery plans

Supporting users and providing technical assistance

CYBERSECURITY TRAINER

CYBER PROTECTION ACADEMY
03.2025 - Current
  • Delivered dynamic presentations to facilitate learning and retention among diverse audiences.
  • Streamlined processes for creating, updating, and distributing training materials, resulting in significant time savings for staff members involved in these tasks.
  • Conducted comprehensive needs assessments to identify gaps in knowledge and skills, informing future program development.
  • Developed customized training materials for various industries, ensuring relevance to the target audience.
  • Contributed to the retention of top talent by providing employees with the resources and support necessary to excel in their roles.
  • Enhanced training accessibility, converting traditional materials into e-learning formats.
  • Boosted training session effectiveness with integration of multimedia tools.
  • Customized leadership development programs, resulting in marked increase in leadership capabilities across departments.
  • Promoted a culture of continuous learning by advocating for professional development opportunities.
  • Facilitated team-building exercises to foster collaboration between department members.
  • Mentored new hires, resulting in stronger staff development and increased productivity.
  • Provided one-on-one mentoring to help individuals reach their full potential within the organization.

CYBERSECURITY BOOTCAMP: CERTIFIED COMPTIA SECURITY

GOMYCODE
07.2024 - 12.2024
  • Introduction and Ethics in Cybersecurity: Gained foundational knowledge of cybersecurity principles and ethical practices essential for safeguarding sensitive systems and data
  • Networking: Developed a solid understanding of network infrastructure, protocols, and security measures to protect communication channels
  • Active Defense: Practiced real-time monitoring and response strategies to mitigate active cyber threats and vulnerabilities
  • Attacks, Threats, and Vulnerabilities: Studied and identified common cyber- attack vectors, threat analysis techniques, and system vulnerabilities
  • Architecture & Design (I & II): Designed secure system architectures and implemented advanced design principles to enhance resilience against attacks
  • Cryptography & Secure Solutions: Learned cryptographic principles and implemented secure encryption solutions in various applications
  • Solution Implementation & Operations (I & II): Deployed and managed secure systems, focusing on operational security and proactive defense mechanisms
  • Governance, Compliance, and Audits: Acquired expertise in cybersecurity governance, compliance requirements, and audit procedures for maintaining regulatory standards
  • Risk Management: Conducted risk assessments and implemented strategic risk mitigation plans to ensure business continuity and data integrity.

Education

Diploma In Cybersecurity - CYBERSECURITY

ALLEN AVENUE IKEJA LAGOS
GOMYCODE
07.2024 - 12.2024

Diploma In Cybersecurity - CYBERSECURITY

ALISON - VIRTUAL
USA
05.2024 - 10.2024

Skills

  • TryHackMe
  • Participated and received a prize in Advent of Cyber 2024, applying defensive strategies to mitigate real-world
  • Cyberattacks
  • Simulated penetration tests on virtual environments using tools like Metasploit, Burp Suite, and Nmap
  • Enhanced blue team skills through log analysis and incident response scenarios in "Cyber Defense Pathway"
  • Explored ethical hacking techniques, including privilege escalation, buffer overflow, and exploit development
  • Let's Defend
  • Completed SOC Analyst Level 1 Pathway on Let's Defend, mastering SIEM log analysis, malware triage, and
  • Incident response
  • Investigated simulated incidents, including phishing attacks, unauthorized access, and malware infections
  • Proactively hunted for threats by analyzing network traffic, endpoint logs, and alert data in real-time
  • Scenarios
  • HackTheBox
  • Exploited vulnerable systems and escalated privileges to root/admin in a controlled lab environment
  • Conducted network enumeration using Nmap, Netcat, and Wireshark to discover vulnerabilities
  • Gained root access to Linux servers by identifying SUID binaries and abusing misconfigured services
  • Bypassed web application security measures using techniques like SQL injection, and XSS Performed
  • Reverse engineering on binaries to discover and exploit vulnerabilities in custom applications
  • SOFT AND TECHNICAL SKILLS
  • Soft Skills:
  • Verbal and written communication, Active Listening, Public Speaking, Teamwork, Collaboration
  • Networking, Critical Thinking, Decision Making, Creativity, Analytical Thinking, Resourcefulness, Decision
  • Making, Reliability, Time Management, Accountability, Self-discipline, Adaptability, Motivation, Delegation
  • Strategic Thinking, Flexible, Resilience, Learning Agility, Self-awareness, Confidence, Positive, Patience
  • Growth-mindset
  • Technical Skills:
  • Networking, TCP/IP, Firewall Management, Cybersecurity Basics, Penetration Testing
  • VPN Configuration, API Security and Management, Malware Analysis, Threat Analysis, Social Engineering
  • Security Frameworks (NIST, ISO 27001), Internet of Things (IoT) etc
  • Tools: Burpsuite, Nessus, Nmap, Windows Server, Virtualization (Vmware, VirtualBox, Hyper-V), Windows
  • MacOS, Kali Linux, Metasploit, Aircrack-ng, Wireshark, Social Engineering Toolkit (SET) etc

Accomplishments

  • Diploma in Cybersecurity
  • CompTIA Security +
  • CompTIA Security+ SY0-701
  • CISCO
  • Ethical Hacker
  • Network Basics
  • Introduction to Cybersecurity
  • OPSWAT
  • Introduction to Critical
  • Infrastructure Protection (ICIP)
  • International Information
  • System Security Certification
  • Consortium
  • Certified Cybersecurity CC, (ISC)²
  • SimpliLearn
  • Introduction to Cloud Security
  • Introduction to CISSP Security
  • Assessment & Testing and
  • Security Operations
  • Project Management (101)
  • Cybersecurity and
  • Infrastructure Security Agency (CISA)
  • DHS CISA
  • ICS Cybersecurity Evaluation (401)
  • ISC Cybersecurity Training (300)-04 Cybersecurity within IT and ICS Domains (FY21)-01 Differences of Industrial
  • Control Systems (FY22)

Certification

COMPTIA: CompTIA Security+ SY0-701

International Information System Security Certification Consortium: Certified Cybersecurity CC, (ISC)²

CISCO: Ethical Hacker, Network Basics, Introduction to Cybersecurity

ISO 27001: Information Security Management Systems Certified

OPSWAT: Introduction to Critical Infrastructure Protection (ICIP)

SimpliLearn: Introduction to Cloud Security, Introduction to CISSP Security Assessment & Testing and Security Operations, Project Management (101)

Cybersecurity and Infrastructure Security Agency (CISA)
DHS CISA
: ICS Cybersecurity Evaluation (401), ISC Cybersecurity Training (300), 210W-04 Cybersecurity within IT and ICS Domains (FY21), 210W-01 Differences of Industrial Control Systems (FY22)

Additional Information

  • Completed comprehensive cybersecurity training covering fundamental principles, network security, data protection, and threat management. Developed foundational knowledge of cybersecurity practices and best practices for safeguarding digital assets.

Work Preference

Work Type

Full TimePart TimeContract WorkInternshipGig Work

Work Location

On-SiteRemoteHybrid

Important To Me

Career advancementWork-life balancePersonal development programsHealthcare benefitsWork from home optionPaid time offTeam Building / Company RetreatsCompany CultureFlexible work hours

Languages

English
Advanced (C1)

Timeline

IT & CYBERSECURITY ENGINEER

CYBERTECH NEXUS
03.2025 - Current

CYBERSECURITY TRAINER

CYBER PROTECTION ACADEMY
03.2025 - Current

INTERN - CYBERSECURITY

HACKTIFY CYBER SECURITY
02.2025 - 03.2025

INTERN - CYBERSECURITY

WILSES CYBER SECURITY SOLUTIONS
01.2025 - 03.2025

Diploma In Cybersecurity - CYBERSECURITY

ALLEN AVENUE IKEJA LAGOS
07.2024 - 12.2024

CYBERSECURITY BOOTCAMP: CERTIFIED COMPTIA SECURITY

GOMYCODE
07.2024 - 12.2024

Diploma In Cybersecurity - CYBERSECURITY

ALISON - VIRTUAL
05.2024 - 10.2024
Oluwatobiloba Jeremiah AladetuyiCybersecurity Analyst