Skip to content
View seyifalode-cmd's full-sized avatar

Block or report seyifalode-cmd

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
seyifalode-cmd/README.md

Oluwaseyi Michael Falode · Cloud & Cybersecurity Engineer

Building secure, scalable cloud infrastructure — and hunting the threats that target it.

View Full Project Portfolio →

I work across the full cloud security stack: infrastructure automation with Terraform and Ansible, container orchestration with Kubernetes and Docker, CI/CD pipelines with Jenkins, and proactive threat detection using CrowdStrike Falcon and Splunk. My projects reflect real-world engineering problems — not tutorials.


What I Work With

Cloud & Infrastructure AWS · Azure · Terraform · Ansible · EC2 · S3 · Lambda · Key Vault · Auto Scaling · Load Balancers

Containers & Orchestration Kubernetes · Docker · Docker Compose · Docker Swarm · Spring Boot on K8s

CI/CD & Automation Jenkins (multi-node, pipelines, Groovy libraries) · Python CD · Infrastructure as Code

Security & Threat Detection CrowdStrike Falcon · Splunk · MITRE ATT&CK · SOC Monitoring · Threat Hunting · EDR · Azure Key Vault


Featured Projects

Project What It Is
Kubernetes Container Security Pipeline Three-layer DevSecOps pipeline: Trivy image scanning + OPA Gatekeeper admission control + Falco runtime threat detection on a live Minikube cluster
CrowdStrike Threat Hunt — SCATTERED SPIDER Hypothesis-driven threat hunt against a real-world eCrime group using CrowdStrike Falcon CQL, mapped to MITRE ATT&CK v14
Wiz + Palo Alto Cloud IR Playbook End-to-end cloud incident response — Wiz Toxic Combination detection (Log4Shell + public S3 + IAM escalation) with Palo Alto Cortex XDR automated containment
Splunk SOC Monitoring Lab End-to-end SOC monitoring environment built in Splunk with detection rules and dashboards
AWS Disaster Recovery Strategy Multi-region AWS DR architecture with RTO/RPO targets and automated failover
Azure Key Vault Lab Secrets management and access policy automation using Azure Key Vault
Kubernetes Rolling Deployment Zero-downtime rolling deployments on Kubernetes with health checks and rollback

Project Categories

Security & Threat Detection

Cloud Infrastructure (AWS & Azure)

Kubernetes & Containers

CI/CD & Jenkins

Ansible & Configuration Management

Terraform & IaC Testing


Currently Working On

  • Expanding the CrowdStrike threat hunting portfolio
  • Cloud security architecture and detection engineering

View All Repositories

Pinned Loading

  1. azure-cloud-security-lab azure-cloud-security-lab Public

    Hands-on Azure security lab — Entra ID, RBAC, Key Vault, Defender for Cloud, Microsoft Sentinel, VNet/NSG, and Azure Monitor with KQL

    1

  2. crowdstrike-threat-hunt-portfolio crowdstrike-threat-hunt-portfolio Public

    CrowdStrike threat hunting portfolio

    1

  3. disaster-recovery-strategy-aws disaster-recovery-strategy-aws Public

    Enterprise Disaster Recovery Strategy with RTO/RPO design, hybrid cloud architecture, and 3-2-1 backup model (CloudOps & Security project)

  4. k8s-container-security-pipeline k8s-container-security-pipeline Public

    Three-layer Kubernetes container security pipeline: Trivy (image scanning) + OPA Gatekeeper (admission control) + Falco (runtime threat detection)

  5. splunk-soc-monitoring-lab splunk-soc-monitoring-lab Public

    SOC Analyst lab using Splunk — SPL queries, threat detection, alerts, and dashboard

  6. wiz-paloalto-cloud-ir-playbook wiz-paloalto-cloud-ir-playbook Public

    Cloud incident response playbook using Wiz CNAPP and Palo Alto Cortex XDR — Toxic Combination detection on AWS