Skip to content

Quick Highlights

15+

Vulnerabilities identified in production WordPress environments (misconfigurations, outdated plugins, weak auth, missing HTTPS).

SOC

Building a simulated SOC with Wazuh SIEM: log collection, alert monitoring, FIM, and vuln detection.

168

Secure enterprise network lab design (7 floors, 168 users) with VLANs, pfSense firewall rules, and assessment writeups.

About Me

I’m King Awhaetoma, a cybersecurity professional focused on SOC and defensive security. I like work that blends technical investigation with clear documentation—alerts, logs, tickets, and actionable recommendations.

My strengths include network traffic analysis, SIEM monitoring (Splunk), and practical security testing. I’m comfortable collaborating with teams, writing reports for non-technical stakeholders, and aligning recommendations to frameworks like NIST.

Right now, I’m sharpening my SOC workflow skills through hands-on projects (Wazuh SIEM, enterprise network lab design, and vulnerability assessment) with the goal of growing into a strong SOC Analyst.

Work Experience

Security Analyst (Project-Based)

Innovation Connect (InnC) • Remote

Oct 2025 – Present
  • Conducted security assessments on production WordPress environments, identifying 15+ vulnerabilities including misconfigurations, outdated plugins, weak authentication, and missing HTTPS.
  • Reduced risk of unauthorized access by auditing user roles, removing inactive accounts, and enforcing multi-factor authentication (MFA).
  • Collaborated with a 5-member security team to deliver a Security Audit Report and Incident Response Plan for executive leadership.
  • Documented findings for non-technical stakeholders and aligned recommendations with NIST security principles.

Data Analyst Intern

Zoptic • Remote

May 2023 – Aug 2023
  • Analyzed biometric data for 150+ athletes, designing 5 interactive Power BI dashboards that improved performance tracking and reduced reporting time by 30%.
  • Collaborated with IT staff to implement data access controls, lowering the risk of unauthorized exposure of sensitive data.
  • Automated recurring reporting tasks, saving the team 10+ hours per week.

Key Projects

Compliance Dashboard (GRC) + Wazuh SIEM Integration

Featured
Compliance Dashboard preview

Built a full-stack Governance, Risk, and Compliance dashboard to manage frameworks, controls, assessments, and audit evidence. Designed to mirror real GRC platforms and integrated concepts from a Wazuh SIEM lab to align compliance tracking with SOC workflows.

  • Framework tracking: HIPAA, NIST CSF, SOC 2, ISO 27001, CIS
  • Control assessments and audit-ready evidence management
  • Clean admin dashboard UI using modern full-stack architecture
  • Aligned with SOC monitoring and compliance reporting workflows
View on GitHub → React TypeScript TailwindCSS Zod Next.js Supabase GRC Wazuh

Log Analyzer (Brute-Force Detection Tool)

Built a Python log analysis tool that parses authentication logs, counts failed login attempts per IP, flags suspicious sources using a configurable threshold, and generates an investigation report. Simulates real SOC workflows including brute-force detection, alert triage, and incident documentation.

View on GitHub → Python SOC Tool Log Analysis

Security Operations & Monitoring (SOC Capstone)

Deployed a Wazuh SIEM lab using Docker (manager, indexer, dashboard) and built workflows for alert monitoring, investigation, and documentation. Validated log collection and reviewed security events such as authentication failures, suspicious processes, and user creation activity.

View on GitHub →

Enterprise Network Security & Assessment Lab

Designed a secure 7-floor enterprise network (168 users, servers, printers) in Cisco Packet Tracer. Implemented VLAN segmentation, routing, pfSense firewall rules, IDS concepts, and produced NIST-aligned documentation. Completed vulnerability assessment using CVSS scoring and traffic analysis.

View on GitHub →

Skills & Tools

Security

  • Monitoring/SIEM: Splunk, Microsoft Defender (monitoring), alert triage
  • Offense-to-Defense: Vulnerability analysis, phishing analysis, log analysis, threat hunting
  • Tools: Wireshark, Nmap, Burp Suite, Metasploit

Networking

  • Core: TCP/IP, DNS, DHCP
  • Enterprise: VLANs, trunking, routing
  • Firewall/VPN: pfSense firewall rules, VPN configuration

GRC & Technical

  • Risk & Compliance: NIST CSF, NIST 800-53, ISO 27001, SOC 2
  • Threat Intel: IOC analysis, TTP identification, threat actor profiling
  • Programming: Python, Bash, Java
  • Digital Forensics: Magnet Axiom, FTK Imager, Eraser

Education

Ball State University • Muncie, IN
B.S. in Applied Cybersecurity, Minor: Music Production • GPA: 3.9
Relevant coursework: Network Security, Ethical Hacking, Defensive Security, Digital Forensics, System Administration, Shell Scripting, Programming

Certifications

  • • CompTIA Security+
  • • CompTIA CySA+
  • • Palo Alto Certified Cybersecurity Practitioner
  • • Splunk Core Certified User

Let’s Connect

Open to SOC / Blue Team internships and entry-level roles.