Robert Onuoha

Cybersecurity Graduate

Experienced in SOC, Security Consulting, Penetration Testing and Criticial Infrastructure Defence

user@terminal ~
$ whoami
Robert Onuoha - Cybersecurity Graduate
$

User Profile

Profile Image

System Scan Results

I’m a passionate cybersecurity graduate with a focus on security consulting, engineering, and penetration testing. My work blends technical depth—secure scripting and host monitoring with governance and compliance insight.

I’m especially interested in protecting critical national infrastructure, where strategic thinking and robust controls intersect. Whether assessing risk, drafting policy, or delivering security improvements, I aim to bridge business needs with effective, resilient cybersecurity solutions.

System Capabilities

Penetration Testing

Identifying and exploiting vulnerabilities in systems, networks, and applications to improve security posture.

90% Proficiency

Network Security

Designing and implementing secure network architectures and monitoring for malicious activities.

85% Proficiency

Secure Scripting

Automating tasks with secure practices and implementing monitoring to detect misuse, reduce vulnerabilities, and protect sensitive operations.

80% Proficiency

Incident Response

Responding to security breaches, investigating incidents, and implementing recovery plans.

75% Proficiency

Security Auditing

Conducting comprehensive security assessments and compliance audits.

88% Proficiency

SCADA

Monitoring industrial systems, anlysing threats, and implementing secure control strategies for ICS/OT networks.

80% Proficiency

Mission Logs

Project 1

Penetration Test

Performed a black-box penetration test on a vulnerable Linux-based host. Identified critical flaws, mapped findings to MITRE ATT&CK, and delivered a consultant grade report with executive summary and remediation plan.

Penetration Testing Security Audit Risk Assessment
Project 2

Linux File & Process Monitoring Tool

Developed a lightweight Bash script to detect file changes and suspicious process activity on Linux systems, designed for endpoint monitoring in low-infrastructure environments.

Secure Scripting Network Security Endpoint Hardening
Project 3

SolarWinds Breach Case Study

Conducted a comprehensive case study of the Nobelium attack on SolarWinds, modelling the full cyber kill chain, producing risk matrices, drafting policies, and proposing a post-breach defensive architecture with controls mapped according to NIST and ISO 27001 principles.

Incident Response Threat Intelligence Compliance

Secure Channel

Establish Secure Connection

Interested in working together or have a question?

Feel free to get in touch — I’m always open to discussing opportunities in cybersecurity consulting, penetration testing, or critical infrastructure defence.

robbyonuoha@gmail.com
+44 7565153638