I’m an IT Support professional turning cybersecurity analyst, grounded in Endpoint security, user support, and troubleshooting experience. I bring a practical edge to security—translating technical issues into clear, actionable defense strategies. With a strategist’s mindset and growing expertise in networking, Python, SQL, and Linux tools, I’m driven to protect what others depend on.
Growing up in the heart of 'God's Own State,' Nigeria, my technical journey began early, collecting and repairing old electronics at childhood.
That childhood curiosity has evolved into a robust IT background, equipping me with the capacity to troubleshoot complex system issues and collaborate effectively to achieve shared goals. Today, I channel that same problem-solving drive, sharpened by my love for chess, into critical thinking and rigorous attention to detail within security settings.
- Security & Support: Endpoint Security, User Support, Troubleshooting, Defense Strategies
- Networking: DNS, TCP/IP, Connectivity Diagnostics
- Tools & Languages: Python, SQL, Linux, Command Line
Scenario: A client couldn't access the internet despite being connected to Wi-Fi.
Action: Diagnosed a "soft" failure using ping and nslookup. Traced the root cause to a static, invalid DNS entry (10.0.0.0).
Result: Restored connectivity by configuring Cloudflare Public DNS and flushing the cache.
Scenario: Client suspected persistent malware mechanisms on a workstation. Action: Conducted a forensic audit using Sysinternals Autoruns and VirusTotal API. Identified and disabled high-risk unsigned drivers while avoiding false positives in the Registry (WoW64). Result: Achieved 0 active intrusions and maintained 100% system stability.
Scenario: Production workstation suffered random crashes (IRQL_NOT_LESS_OR_EQUAL).
Action: Analyzed memory dump files (.dmp) using BlueScreenView. Traced the kernel panic to missing Intel Thermal Framework drivers.
Result: Eliminated crashes by deploying OEM-specific chipset drivers.
Scenario: A compromised USB installer dropped a persistent Trojan into System32 protected by TrustedInstaller.
Action: Identified the unsigned payload and used CLI commands (takeown, icacls) to escalate privileges and override system file protections.
Result: Successfully eradicated the malware without requiring a system re-image.
- [System Administration:ENSIGN_COLLEDGE 2025-28]
