WinRAR CVE-2023-38835 Vulnerability Exploitation
→
Summary
Conducted a practical demonstration and analysis of the critical directory traversal vulnerability in WinRAR versions 6.22 and below.
Recent Microbiology graduate with a strong foundation in scientific analysis, transitioning expertise to cybersecurity, cloud security, and web application security. Developed robust technical skills through intensive bootcamps and hands-on projects, including vulnerability exploitation, digital forensics, and secure system implementation. Eager to leverage a passion for digital defense and proactive problem-solving to contribute to cutting-edge security challenges in a dynamic tech environment.
Cybersecurity & Cloud Trainee / National Youth Service Corps Member
Akute, Ogun State, Nigeria
→
Summary
Currently serving at a leading tech school, gaining practical experience in cybersecurity and cloud technologies while contributing to educational initiatives and internal projects.
Highlights
Completed an intensive Cybersecurity and Ethical Hacking bootcamp, mastering advanced techniques in penetration testing, vulnerability assessment, and digital forensics.
Applied theoretical knowledge to real-world scenarios, including the exploitation of CVE-2023-38835 vulnerability in WinRAR versions 6.22 and below.
Contributed to the development and implementation of a Certificate Authority (CA) system, enhancing secure internal communication and digital identity management.
Designed and deployed a digital signature project to ensure data integrity and authenticity for critical organizational documents.
Cyber Safety Educator
→
Summary
Educated students on essential cyber safety practices, promoting secure online behavior and digital literacy.
Highlights
Delivered engaging presentations and workshops to over 100 students on critical cyber safety topics, including phishing, strong passwords, and online privacy.
Empowered participants with practical knowledge and tools to protect themselves from common cyber threats, significantly increasing awareness levels.
Registration Booth Volunteer
→
Summary
Managed participant registration and provided logistical support for a major cybersecurity event, ensuring smooth operations.
Highlights
Facilitated the registration process for over 200 attendees, ensuring efficient check-in and providing a positive first impression.
Contributed to the overall success of Cyberfest '24 by managing crowd flow and providing timely assistance to participants.
Member
→
Summary
Actively contributed to the planning and execution of tech events and initiatives as a member of the Google Developer Group Organizing Committee.
Highlights
Collaborated with a diverse team to organize and promote tech meetups, workshops, and hackathons for the local developer community.
Supported community engagement efforts, helping to foster a vibrant learning environment for aspiring and experienced tech professionals.
Student Ambassador
→
Summary
Represented Cowrywise on campus, promoting financial literacy and responsible investment among students.
Highlights
Organized and led campus outreach initiatives, educating peers on personal finance management and the benefits of digital investment platforms.
Successfully engaged over 50 students in financial literacy workshops, contributing to increased awareness and adoption of financial planning tools.
→
Diploma
Software Engineering / Cloud & Cybersecurity (Inferred)
→
B.Sc.
Microbiology
Issued By
Udacity
Issued By
Tech4dev
Issued By
Linux (Organized by Andela)
Ethical Hacking, Vulnerability Assessment, Penetration Testing, Digital Forensics, Web Application Security, Network Security, Security Architecture, Incident Response, Security Operations.
Kubernetes, Cloud Native, Cloud Infrastructure Security, AWS Security, Azure Security, GCP Security, Container Security.
Linux, Windows OS, WinRAR Vulnerability (CVE-2023-38835), CA Certificates, Digital Signatures, Application Development, Project Management Tools.
Problem-solving, Analytical Thinking, Team Collaboration, Communication, Technical Education, Adaptability, Research.
Threat Intelligence, Malware Analysis, Security Research.
DevSecOps, Cloud Compliance, Infrastructure as Code Security.
OWASP Top 10, API Security, Secure Coding Practices.
→
Summary
Conducted a practical demonstration and analysis of the critical directory traversal vulnerability in WinRAR versions 6.22 and below.
→
Summary
Developed and implemented a Certificate Authority system for an organization to manage digital certificates and enhance secure communication.
→
Summary
Created a system for generating and verifying digital signatures to ensure the authenticity and integrity of digital documents.
→
Summary
Collaborated with a team at Althub to develop a waste management application, Eazybinz, focusing on efficient waste collection and disposal.