Skip to content
View Tam-George10's full-sized avatar
🎯
Focusing
🎯
Focusing
  • Lagos, Nigeria

Block or report Tam-George10

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Tam-George10/README.md

πŸ‘‹πŸ½ Hi, I'm Tam-George Belema

Cybersecurity Analyst (Blue Team) β€’ SOC Operations β€’ Python Automation

Typing SVG

Cybersecurity Animation 1 Cybersecurity Animation 2 Cybersecurity Animation 3


🧭 About Me

  • πŸ›‘οΈ Cybersecurity Analyst (Blue Team) focused on detection, monitoring, and incident response
  • 🧠 Strong foundation in networking, security fundamentals, and SOC workflows
  • πŸ“Š Hands-on experience with Splunk, Elastic Stack (ELK), and Wireshark for log & network investigations
  • 🐍 Use Python for scripting, automation, and security tooling
  • πŸ§ͺ Hands-on practitioner: labs, detections, log analysis, and analyst-style investigations
  • πŸ“‚ Turning practical security labs into recruiter-ready GitHub portfolio projects
  • 🎯 Career goal: Entry-level SOC / Blue Team Analyst

πŸ§ͺ SOC Portfolio β€” Live Investigation Repositories

Each project includes:

  • Scenario overview
  • Evidence & logs
  • Detection logic
  • Analyst reasoning
  • Lessons learned

🎯 Professional Focus

  • Security Operations Center (SOC)
  • Incident Response & Alert Triage
  • Log Analysis & SIEM Concepts (Splunk / Elastic Stack)
  • Detection Engineering (entry-level)
  • Threat Monitoring & Investigation
  • Offense-informed defensive security

πŸ… Certifications & Training

πŸ” IBM SkillsBuild

  • Cybersecurity Fundamentals
    Issued: September 14, 2025

    • Threats, vulnerabilities, and risk concepts
    • Security controls and defensive best practices
    • Core cybersecurity principles for enterprise environments
  • Explore Emerging Tech
    Issued: September 14, 2025

    • Cloud, AI, and emerging technologies
    • Security implications of modern technology stacks

🌐 Cisco Networking Academy

  • Introduction to Cybersecurity
    Issued: July 12, 2025

    • Cyber threats and attack methodologies
    • Defensive strategies and SOC fundamentals
  • Networking Basics
    Issued: June 12, 2025

    • TCP/IP fundamentals
    • IP addressing, protocols, and network communication

πŸ› οΈ Udemy

  • Complete Ethical Hacking Bootcamp
    Completed: September 9, 2025

    Focus: Attacker Tradecraft for Defensive Security

    • Understanding common attacker initial access techniques
    • Windows exploitation concepts, including analysis of vulnerabilities such as EternalBlue (SMB exploitation)
    • Post-exploitation techniques and artifacts left in logs, memory, and system activity
    • Windows privilege escalation concepts and indicators
    • Malware behavior fundamentals and execution flow
    • Network-based attacks and how malicious activity appears in traffic
    • Password attacks and authentication weaknesses (defensive awareness)
    • Web application attack concepts (authentication and input validation flaws)

    This training strengthened my ability to think like an attacker in order to
    improve detection logic, log analysis, and incident response effectiveness.

πŸ”— Certification Verification


πŸ› οΈ Technical Skills

πŸ›‘οΈ Blue Team & Security

  • SOC workflows & analyst triage
  • Incident response lifecycle
  • Log analysis fundamentals
  • Threat detection concepts
  • MITRE ATT&CK framework familiarity
  • Windows & Linux security fundamentals

πŸ“Š SIEM & Log Analysis

  • Splunk: search queries, investigations, alert analysis
  • Elastic Stack (ELK): Kibana queries, log filtering, timeline analysis
  • Windows Event Logs & Sysmon
  • Sigma rule concepts

🌐 Network & Threat Investigation

  • Wireshark packet analysis for malicious traffic identification
  • Network-based attack detection and protocol abuse analysis
  • Identification of C2 indicators and suspicious network behavior
  • Phishing email analysis and malicious payload identification
  • Sandbox-based threat isolation and behavioral observation
  • Malware triage and execution artifact recognition
  • Vulnerability research and exploit awareness using Searchsploit

🐍 Programming & Automation

  • Python scripting & automation
  • Object-Oriented Programming (OOP)
  • Log parsing & structured data handling
  • Security-focused scripting

πŸ§ͺ Hands-On Blue Team Training (TryHackMe)

  • βœ… 146 completed rooms
  • πŸ›‘οΈ Completed Incident Response and Detection & Monitoring rooms
  • πŸ“Š Practiced real SOC analyst workflows:
    • Alert triage
    • Log analysis
    • Evidence correlation
    • Detection logic reasoning
  • 🧠 Applied MITRE ATT&CK concepts to simulated real-world attacks
  • 🧾 Documenting labs as SOC-style case studies in this portfolio
  • πŸ… Earned multiple TryHackMe badges demonstrating consistency and hands-on depth
  • πŸ”— Profile: View on TryHackMe

Focus Areas

  • Incident response lifecycle
  • Windows event analysis
  • Network activity investigation
  • Log-based threat detection
  • Attacker behavior recognition

TryHackMe is used strictly as a hands-on training platform,
not for badge or leaderboard collection.


πŸ“Œ Current & Upcoming Goals

  • πŸ“– CompTIA Security+ (in progress)
  • πŸ“– CompTIA CySA+ (planned)
  • πŸ› οΈ Detection-focused Python tooling
  • πŸ§ͺ Sigma rule creation
  • πŸ“Š Advanced SIEM queries (Splunk / Elastic)

πŸ—ΊοΈ Roadmap

  • βœ… Foundational cybersecurity certifications (IBM, Cisco)
  • πŸ”„ Security+ preparation
  • πŸ”„ CySA+ preparation
  • ⏳ Detection engineering portfolio expansion
  • 🎯 Entry-level SOC / Blue Team role

πŸ“« Contact


Detect early. Respond fast. Defend smart.

Cybersecurity Lock Animation

Pinned Loading

  1. Incident-Response Incident-Response Public

    Incident Response Writeups documents hands-on investigations covering detection, containment, eradication, and recovery of real-world security incidents. It demonstrates SOC workflows, evidence han…

    1