Ayodeji Akinsoyinu
Cincinnati, Ohio, United States
536 followers
500+ connections
View mutual connections with Ayodeji
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
View mutual connections with Ayodeji
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
View Ayodeji’s full profile
Other similar profiles
-
Vikram Singh- CISM, CRISC, CDPSE
Greater HoustonConnect -
Richard Nader, CISM
Cybersecurity Executive | Director, Cybersecurity
Essexville, MIConnect -
Mona Sethi
New York City Metropolitan AreaConnect -
Gina Carthan, M.A.
Greater St. LouisConnect -
Emma Bexon Connolly
Boston, MAConnect -
Chris Green
Expert Associate Partner, Enterprise Technology at Bain & Company
Atlanta Metropolitan AreaConnect -
Kevin Kohut
Rock Hill, SCConnect -
Tricia Wagner, ESQ, CIPP/US, CISSP, CISA, QSA (inactive)
Results oriented Privacy and Security Counsel
Washington DC-Baltimore AreaConnect -
Ingrid Lohneiss, CISSP, CISM, CRISC
Carmel, INConnect -
Maureen Jesuthasan
Greater Chicago AreaConnect -
Thiago Afonso
Miami-Fort Lauderdale AreaConnect -
Thomas Tinelli
New York, NYConnect -
Christopher Campbell, MBA, CISSP
Nashville Metropolitan AreaConnect -
Raffi Bederian
Los Angeles Metropolitan AreaConnect -
Sam Hellar
Raleigh-Durham-Chapel Hill AreaConnect -
Marcos Matos
Greater Tampa Bay AreaConnect -
David Trice, MPA, CPP, CFE
Corporate Security Technical Senior Manager at Altria
Woodinville, WAConnect -
Braxton Washington
Cincinnati Metropolitan AreaConnect -
David Sisto
San Francisco, CAConnect
Explore more posts
-
Titilope Ojelade
Did someone say Cybersecurity Awareness Month?🤭🤭🤭 Happy new month LinkedIn fam, and thank you for riding with me! This month, be prepared for back to back cybersecurity content. Trust me to make it fun and educating. Remember when I talked about emails yesterday? I want to take it a notch further by showing how you can use PhishTool to analyze your emails. Email analysis is simply the process of gathering information from emails. This can be done manually, but these days, there are automated tools like PhishTool to analyze emails faster and more efficiently. PhishTool is a sophisticated platform designed to give analysts the edge against phishing threats. It offers an unparalleled ability to reverse engineer phishing emails, tapping into threat intelligence, open-source intelligence (OSINT), and comprehensive email metadata analysis. The platform extracts all relevant metadata from suspicious emails, providing a detailed technical view. Built-in OSINT and heuristic detection systems then work in tandem to uncover the tactics, techniques, and procedures of phishing campaigns. Users can reverse engineer attachments and URLs, rapidly triaging potential threats directly from the interface. Like my mentors will say, cybercriminals have evolved and keep evolving. These days, emails are perfectly crafted. These cybercriminals don’t even need to spoof addresses as their have their own addresses, IP domains, legitimately registered. Also, are you aware that certain fields in emails can be updated by cybercriminals? Defense-in depth? It’s key. Cybersecurity should never be an afterthought. But what’s the fuss about phishing? As popular as phishing is, it still tops the charts when it comes to causes of security breaches. Nelson .A. Ojovbo Confidence Staveley CyberSafe Foundation Rafat Alabelewe Adedapo Bamgbade Olufemi Akojede Divine-Blessing Oviekhaye, ITIL, CC #PhishTool #emailanalysis #phishingemails #CyberSecurityAwarenessMonth #SOCAnalyst
4410 Comments -
Jamelle Sparrow
More than halfway through my P.A.T.H SE Workshop program and I love it here! Shanikqua Burks, MBA, CISSP drops tons of gems every Thursday. Recently, I chose to demo a completely unfamiliar product, Cribl, stepping out of my comfort zone. Cribl is a robust observability pipeline platform that aids in managing data flow by controlling collection, routing, and processing of observability data. It supports multiple destinations, data transformation on-the-fly, and eases the storage and processing load on systems. The ability to integrate it with Splunk makes Cribl a valuable tool aligning with my goals. Excited to showcase my knowledge of Cribl in the upcoming demo and eager to add this new skill to my repertoire! #Cribl #Splunk #Cybersecurity #data
196 Comments -
Mohammed A.
🚀Day 3 of the 30-Day SOC Analyst Challenge🚀 Setting Up a Secure Elasticsearch Environment on Vultr Cloud Today’s challenge was all about getting hands-on with cloud infrastructure. I set up a Vultr Cloud environment, created a VPC 2.0, installed Ubuntu 24.04, and configured it using the Linux shell. Here’s a quick rundown of what we accomplished: Vultr Cloud Setup: I started by creating a Virtual Private Cloud (VPC) 2.0 on Vultr, which provided the isolated network environment necessary for secure operations. Ubuntu 24.04 Installation: Installed the latest version of Ubuntu, 24.04, on the server to ensure a stable and secure foundation for our applications. Server Access Configuration: Using SSH, I accessed the server and configured elasticsearch.yml to restrict access. This step is crucial for ensuring that Elasticsearch is accessible only to authorized users. Firewall Configuration: To enhance security, I configured the firewall on Vultr to allow access only from my IP address. This step helps to minimize exposure and protect the server from unauthorized access. Today was a great exercise in cloud infrastructure and security configuration, which are essential skills for any SOC Analyst. Looking forward to continuing the journey tomorrow! #SOCAnalyst #Cybersecurity #CloudInfrastructure #Elasticsearch #Vultr #Linux #30DayChallenge #SOCAnalyst #Cybersecurity #LearningJourney #MyDFIR Learn more about the ELK Stack here: [ELK Stack on Elastic](https://www.elastic.co/). Interested in joining? Check out Steven at [MyDFiR.com](https://www.mydfir.com).
-
Kofi Quist
Three Tips to Approaching Entry Level Cybersecurity Jobs Two weekends ago, I hosted a webinar with Priscilla Amofa, MBA, ACIHRM to discuss the best ways to approach entry level cybersecurity jobs. Below are three best practices I put together from what turned out to be a deeply insightful experience. Enjoy! Article: http://alturl.com/f7ev3 Video: https://lnkd.in/ebS6JF-b #entrylevel #tips #cyber #jobs
151 Comment -
Kevin Apolinario
Hanging out today at APIsec. If you see me. Come by to say hi. It was good to see Corey J. Ball and Dan Barahona. I appreciate today's training and talks on api security. #itsupport #helpdesk #apisecurity #apiconference #cybersecurity #cybersec #Azure #aws #gcp #systemadmin #servicedesk
1173 Comments -
Fatimah Lawal
After basking in the euphoria of passing my ISC2 Certified in Cybersecurity exam, I am interested in adding another certification to my name. I am currently preparing to write the Fortinet Administrator Exam. If you have written the certification exam or you are also preparing to write yours, I will appreciate if you can share some study materials with me in the comment section below 👇. #cybersecurity #informationsecurity #womenincybersecurity
15
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore More