SOC-trained cybersecurity analyst specializing in AI red teaming. A decade of progressive IT and cybersecurity experience. I break AI systems to make them safer — and I build defenses that actually hold.
I'm a cybersecurity operations professional with over a decade of hands-on IT infrastructure experience, now operating at the intersection of traditional security operations and frontier AI security.
I hold an M.S. in Cybersecurity (GPA 3.7 / 4.0) from Oklahoma City University, plus industry certifications and ongoing training across AI security, cloud, and SOC fundamentals — including CCEP, an instructor-track credential in cybersecurity education.
Currently, I conduct active adversarial testing against frontier large language models — running jailbreak analysis, prompt injection assessments, and misuse evaluations. I publish sanitized red teaming frameworks on GitHub to advance AI safety.
On the defensive side, I've worked in a live enterprise SOC at Hobby Lobby Corporate IS, deploying MISP threat intelligence automation and monitoring security events with Splunk.
I operate at the intersection of two critical security domains
Security Operations | Blue Team | Incident Response
Adversarial Testing | Prompt Injection | AI Safety
Threat modeling, structured methodology, and security mindset transfer seamlessly between traditional infrastructure and frontier AI systems. I bring enterprise security rigor to AI safety — and AI-native thinking to security operations.
Published frameworks, case studies, and professional work
An AI-powered contract risk analyzer that chains three AI agents to extract every clause, red-team-score each one for hidden risk, and auto-draft negotiation language. Built in 48 hours with Streamlit and the OpenAI API.
Sanitized, NDA-compliant frameworks from active adversarial testing against frontier LLMs.
Enterprise security operations work, case studies, and incident response simulations.
Recognized credentials (Cisco CyberOps, Microsoft, Google, AWS) plus instructor-track and applied AI security training (CCEP, CTIGA, Securiti AI Security).
View AllComplete code repositories, frameworks, and ongoing security research projects.
Visit ProfileIndustry certifications and applied training across cybersecurity, AI security, and IT infrastructure
Certified Cybersecurity Educator Professional
Red Team Leaders · Nov 2025Certified Threat Intelligence & Governance Analyst
Red Team Leaders · Jan 2026AI Security Certification
Securiti AI · Jan 2026Cisco CyberOps Associate
Cisco · May 2025Full Specialization
Microsoft · Sep 2024Professional Specialization
Coursera · Jun 2023Certified Cloud Practitioner
AWS · Aug 2022Security, Compliance & Identity
Microsoft · Apr 2025+ Additional applied training: Azure AI Fundamentals, TryHackMe paths, TCM Security courses, and Forage virtual simulations (Mastercard, PwC, AIG).
Tools, platforms, and technologies I work with daily
A decade of progressive growth — from IT support to AI security specialist
Catholic Church of the Resurrection Magodo
Helpdesk • LAN/WAN • Endpoint SecurityNigeria Inter-Bank Settlement System (NIBSS)
Financial Infrastructure • System TestingHotels.ng — SaaS Platform
SaaS • Troubleshooting • DocumentationStarted U.S. certification pathway
Coursera • IT SpecializationMicrosoft Azure • AWS Cloud Practitioner • Cisco Cybersecurity
Azure AI • AWS CP • Cisco CyberEssentialsOklahoma City University
Google Cybersecurity • CodePath • Per ScholasFortune 500 Enterprise SOC · AI Evaluation contract work begins on independent platforms in parallel
Splunk • MISP • Imperva • Python AutomationOklahoma City University | GPA 3.7 / 4.0
CCEP • Cisco CyberOps • Microsoft SecurityIndependent / Contract — across Snorkel AI, Alignerr, Mercor, Meridian (Invisible), RemoteXperts, and LinkedIn's expert verification program
AI Red Teaming • Prompt Injection • Agent Evaluation • Reward-Hacking Detection • Multimodal SurfaceOklahoma City University added a cybersecurity book to their permanent collection in my name.
M.S. Cybersecurity from Oklahoma City University — GPA 3.7 / 4.0.
Interned at Hobby Lobby Corporate IS — Splunk, MISP, Imperva.
A decade of progressive IT experience spanning Nigeria and the United States — small business through Fortune 500.
Explore my experience through a command-line interface. Try it.
██████╗██╗ ██╗██╗███╗ ███╗ █████╗
██╔════╝██║ ██║██║████╗ ████║██╔══██╗
██║ ███████║██║██╔████╔██║███████║
██║ ██╔══██║██║██║╚██╔╝██║██╔══██║
╚██████╗██║ ██║██║██║ ╚═╝ ██║██║ ██║
╚═════╝╚═╝ ╚═╝╚═╝╚═╝ ╚═╝╚═╝ ╚═╝
🔐 AI Security Analyst & Red Teamer
M.S. Cybersecurity (GPA 3.7) | Industry Certs + Ongoing Training | A Decade in IT
Type help to see available commands, or whoami to start.
I'm currently available for AI security roles, SOC analyst positions, red teaming engagements, and consulting opportunities.
Whether you need an AI system stress-tested, a SOC analyst who understands both traditional and frontier threats, or a certified cybersecurity educator — I'm ready.