Skip to content
View Yomi-stack's full-sized avatar
  • Lagos, Nigeria

Block or report Yomi-stack

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Yomi-stack/README.md

Hello, I'm Abayomi

I’m transitioning into Cybersecurity after 5 years as a professional dog breeder.
Breeding taught me valuable skills that I now apply to security:

  • 🛡️ Risk management & safeguarding valuable assets
  • 🔍 Attention to detail in monitoring logs, patterns, and anomalies
  • 📑 Record-keeping & compliance mindset
  • 🤝 Building trust and handling sensitive client data

Objective

To grow as a Cybersecurity Analyst and contribute to protecting digital environments.

Skills

[Provide skills and associated project. Make sure to hyperlink the project - Remove this afterwards]]

Skill Associated Project
Malware Traffic Analysis and Sandboxing Malware Traffic Analysis and Sandboxing
Network Traffic Monitoring and Attack Detection Detection Lab
Security Automation with Shuffle SOAR SOC Automation Lab
Incident Response Planning and Execution SOC Automation Lab
Case Management with TheHive SOC Automation Lab
Scripting and Automation for Threat Mitigation SOC Automation Lab

Tools

[Provide tools and break them down into categories. Use ChatGPT to help create the link - Remove this afterwards]]

Network

Endpoint

SIEM

Certifications

Projects

-Malware Traffic Analysis and Sandboxing|

Popular repositories Loading

  1. Yomi-stack Yomi-stack Public

  2. Malware-Traffic-Analysis-and-Sandboxing Malware-Traffic-Analysis-and-Sandboxing Public

    Identify recurring malware traffic behaviors through VirusTotal analysis and correlate them with MITRE ATT&CK techniques to enhance threat intelligence and defensive strategies.