Richard Akpan

Richie Akpan

Cybersecurity Professional

IT Security Graduate specializing in threat detection, vulnerability assessment, and security operations

About Me

Passionate about cybersecurity and protecting digital assets

I am a recent IT Security graduate passionate about cybersecurity and dedicated to protecting digital assets from evolving threats. With hands-on experience in security tools and technologies, I focus on implementing robust security measures and identifying vulnerabilities before they can be exploited.

My expertise includes setting up SIEM solutions, creating monitoring dashboards, conducting vulnerability assessments, and developing incident response plans. I continuously expand my knowledge to stay ahead of emerging threats and security challenges.

I believe in a proactive approach to cybersecurity, focusing on prevention while maintaining readiness for rapid response to security incidents. My goal is to contribute to organizations by strengthening their security posture and protecting their valuable digital assets.

Projects

Explore my cybersecurity home lab projects

SIEM Implementation

SIEM Implementation

Security Monitoring Analysis

Security Information and Event Management system setup and configuration for comprehensive security monitoring and threat detection.

  • Deployed ELK Stack (Elasticsearch, Logstash, Kibana) in a virtualized environment
  • Configured log collection from multiple sources including Windows, Linux, and network devices
  • Developed custom dashboards for real-time security monitoring
  • Implemented automated alerting for suspicious activities
View Details
Splunk Dashboard

Splunk Dashboard

Splunk Analytics Visualization

Custom Splunk dashboard development for security event visualization and real-time threat monitoring.

  • Installed and configured Splunk Enterprise in a home lab environment
  • Created custom data inputs and parsing configurations
  • Developed interactive dashboards for security monitoring
  • Implemented saved searches and alerts for threat detection
View Details
Wazuh Deployment

Wazuh Deployment

Wazuh Monitoring Compliance

Implementation of Wazuh for endpoint security monitoring, threat detection, and compliance management.

  • Deployed Wazuh server and agents across multiple endpoints
  • Configured file integrity monitoring and rootkit detection
  • Implemented security policy monitoring and compliance checks
  • Set up automated response actions for security incidents
View Details
OpenVAS Vulnerability Scanner

OpenVAS Vulnerability Scanner

Vulnerability Assessment Scanning

Setup and configuration of OpenVAS vulnerability scanner for comprehensive network vulnerability assessment.

  • Installed and configured OpenVAS in a virtualized environment
  • Conducted network-wide vulnerability scans
  • Analyzed and prioritized vulnerabilities based on risk
  • Developed remediation plans for identified vulnerabilities
View Details
Network Monitoring

Network Monitoring

Network Monitoring Security

Implementation of network monitoring tools for traffic analysis and intrusion detection.

  • Deployed Zeek (formerly Bro) for network traffic analysis
  • Configured Suricata IDS/IPS for intrusion detection
  • Implemented network traffic visualization with ELK stack
  • Created custom detection rules for suspicious network activities
View Details
Incident Response

Incident Response

Incident Response Forensics

Development of incident response procedures and implementation of digital forensics tools.

  • Created comprehensive incident response playbooks
  • Set up digital forensics workstation with specialized tools
  • Conducted simulated incident response exercises
  • Implemented automated evidence collection procedures
View Details

Certifications

Professional qualifications and achievements

CompTIA Security+

CompTIA

Issued: January 2025

Industry-standard certification validating baseline skills for core security functions.

Cisco CCNA

Cisco

Issued: March 2025

Certification validating skills in network fundamentals, security, and automation.

Certified Ethical Hacker

EC-Council

Issued: February 2025

Certification in ethical hacking methodologies and penetration testing techniques.

Skills & Tools

Technical expertise and proficiencies

Security Tools

  • SIEM (Security Information and Event Management)
  • Splunk
  • Wazuh
  • OpenVAS
  • Wireshark
  • Metasploit
  • Nessus
  • Snort/Suricata IDS/IPS
  • OSSEC
  • Kali Linux

Technical Skills

  • Network Security
  • Security Scripting (Python, Bash)
  • Threat Detection & Analysis
  • Incident Response
  • Access Control Management
  • Malware Analysis
  • Identity & Access Management
  • Cloud Security (AWS, Azure)
  • Security Policy Development
  • Security Architecture

Methodologies

  • NIST Cybersecurity Framework
  • ISO 27001/27002
  • MITRE ATT&CK Framework
  • Threat Modeling
  • Defense in Depth
  • Penetration Testing
  • Vulnerability Assessment
  • Risk Assessment

Contact

Get in touch for collaborations or inquiries

Feel free to reach out for collaborations or inquiries about cybersecurity projects and opportunities.

harkpanrichie@gmail.com

+1 (352) 514-4767

Gainesville, Florida