AJAYI BOLUWATIFE
Information Security & Offensive Operations

SIEM engineer, red team practitioner, and automation builder. I deliver measurable risk reduction through detection engineering and adversarial simulations.

┌──(boluwatife㉿portfolio)-[~/security]
└─$ nmap -sV --script vuln enterprise-siem.lab

~/Reconnaissance

profile

Offensive security engineer with deep focus on SIEM engineering, purple team exercises, and security automation. I build detection pipelines, simulate real-world attacks, and help organizations mature their security posture.

eJPT eLearnSecurity (in progress) Splunk Core User CompTIA Security+ (in progress) AZ-900 (in progress) TryHackMe Top 50%

core philosophy

Every attack simulation improves detection logic. I build for resilience, not compliance. real world testing drives measurable defense improvements.

$ whoami
> Ajayi Boluwatife · Offensive Security · SIEM Architect

~/Exploits

Master Pentesting menu screenshot
Master Pentesting Framework
PythonBashNmapHydra
Modular pentesting automation suite with recon, enumeration, web testing, credential attacks, and post‑exploitation modules. Designed for authorized red‑team exercises.
$ ./master-pentest --target 192.168.0.1 --scan full
  • 15+ integrated tools (Nmap, Gobuster, Hydra, Metasploit)
  • Used in internal penetration tests & CTFs
SSH brute force simulation terminal
SSH brute force simulation
HydraMetasploitLog Analysis
Simulated credential stuffing against Ubuntu lab server, analyzed auth logs, deployed rate-limiting and IDS alerts.
$ hydra -l root -P rockyou.txt ssh://target.lab
  • Improved detection rules for authentication anomalies
Web app pentest conversation
web app penetration test
Burp SuiteZAPSQLmap
Detected SQLi, XSS, clickjacking on live staging apps. Collaborated with developers on remediation.
  • Delivered executive & technical reports with PoC
AI scanner tool interface
AI vulnerability scanner
PythonScikit-learn
ML-based anomaly detection on HTTP requests — reduced false positives by 40%.
  • Integrated into CI pipeline for proactive scanning
JARVIS AI terminal preview
J.A.R.V.I.S AI terminal
Kali LinuxNLPBash
AI assistant for pentesting: natural language → Nmap, gobuster, reverse-shell generation.
  • Accelerated reconnaissance & reporting
Metadata harvester login screen
metadata harvester
ExifToolPythonOSINT
Forensic extraction of GPS, authors, hidden data from images/PDFs/Office docs.
  • Used in red-team OSINT & data leakage audits

~/Defense

enterprise SIEM lab
SplunkELKSysmonSigma
Production-grade SIEM with correlation rules, MITRE ATT&CK mapping, real-time dashboards. 50k+ EPS ingestion.
  • 38% faster incident detection
  • Automated alerts for anomalous PowerShell
network defense & IDS
SnortWiresharkpfSenseVLAN
Deep packet inspection, custom Snort rules, zero-trust segmentation. Uncovered plaintext creds.
  • 25% reduction in false positives
  • Deployed network honeypot
vulnerability management
NessusBurp SuiteMetasploit
Full-cycle vuln assessment, exploitation, remediation reports. CVSS v3.1 prioritization.
  • 70% reduction in critical vulns
  • 15+ professional reports
security automation
PythonBashThreat Intel APIs
Log parser for malicious IPs + OTX enrichment. CIS Level 1 Linux hardening script.
  • Automated weekly vuln reports
  • Containerized scanner with Trivy
ubuntu server hardening
UFWFail2BanSSH Hardening
CIS Level 1, Cloudflare Tunnel, intrusion prevention. Reduced attack surface by 63%.
$ sudo ufw enable && fail2ban-client status sshd
  • Achieved compliance benchmark
SOC analysis lab
WazuhElasticsearchFilebeat
Centralized logging, custom decoders for SSH brute-force, MITRE ATT&CK mapping.
  • Real-time Kibana dashboards & alerting

~/Tools

Python
Bash
Splunk
ELK
Snort
Wireshark
Burp Suite
Metasploit
Nmap
pfSense
Nessus
Wazuh

~/Contact

SIEM architect, red team operator, automation engineer — open to senior security roles.

boluwatife06-bit@proton.me

RESUME — on request