Louis Okperiruisi professional portrait
Cybersecurity Analyst | SOC • SIEM • AI Security • Vulnerability Management

Louis A. Okperiruisi

I build security systems that detect, analyze, and respond to real-world attack scenarios. From securing infrastructure to supporting enterprise environments, I focus on practical cybersecurity, operations, and AI-driven defense solutions.

Currently Seeking

SOC Analyst • Cybersecurity Analyst • IT Support / Security Operations • Cloud Security roles

Open to Work NigeriaRemote / Hybrid / On-siteOpen to Relocation
Louis Okperiruisi performing field technical support and equipment maintenance in an industrial plant
Featured Visual

Industrial Field Support

Delivered field technical support, infrastructure maintenance, and equipment troubleshooting across active industrial environments.

What I Do

Security, Infrastructure, and Operational Support

I design and build security systems that detect, analyze, and respond to real-world cyber threats. My work focuses on security operations, detection engineering, and practical system implementation—where I develop solutions for phishing detection, behavioral threat analysis, API security, and AI-driven security systems. I combine SOC-level investigation thinking with hands-on execution to identify risks early, automate response, and strengthen system resilience. In addition, I support enterprise environments, optimize infrastructure, and ensure systems remain secure, stable, and operational.

SECURITY TOOL SNAPSHOT

Qualys
Nessus
OWASP ZAP
Snyk
Wazuh
Google Cloud
MetaDefender
Endpoint Central

Experience across security operations, vulnerability assessment, and cloud security

Operational Impact

Measurable Security Impact

This system demonstrates how layered security controls reduce risk exposure across modern applications by combining detection, validation, and automated response. By integrating phishing detection, behavioral analysis, prompt injection defense, and threat intelligence enrichment, the platform identifies and blocks high-risk activity before it reaches core application logic. Multi-layer email analysis using SPF, DKIM, DMARC, and URL inspection improves phishing detection accuracy and reduces the likelihood of credential compromise. Behavioral threat scoring provides visibility into suspicious user activity, enabling early detection of anomalies such as brute-force attempts, unusual access patterns, and privilege misuse. End-to-end PII masking ensures sensitive data is protected during processing, logging, and response handling, strengthening data protection and supporting compliance requirements. Integration with external threat intelligence (VirusTotal) enhances detection confidence by validating indicators against real-world threat data, enabling faster and more informed decision-making. Overall, the system shifts security operations from passive monitoring to proactive detection and automated response, improving resilience and reducing attack impact.

300+
Enterprise users supported

Across daily technical support and IT operations

50+
Vulnerability scans completed

Using Nessus and OWASP ZAP

40%
Faster ticket resolution

Improved through structured support workflows

95%
Patch and remediation operations

Supported endpoint compliance, patching workflows, and remediation follow-through.

90%
Reduced cable clutter

Improved rack organization, maintenance readiness, and cable discipline.

Improved
System visibility

Improved infrastructure visibility and easier troubleshooting across technical environments.

Stronger
Endpoint security policies

Configured malware detection, DLP, device control, application control, and patch management workflows.

Real-time
AI threat detection middleware

Built AI security middleware with prompt injection defense, rate limiting, PII masking, and logging.

Professional Summary

Cybersecurity Analyst with experience in security operations, infrastructure support, and enterprise systems. I build and implement security solutions that detect threats, protect sensitive data, and automate response across modern applications. My focus includes phishing detection, behavioral threat analysis, API security, and AI-driven security systems, combining practical operations experience with a strong detection engineering mindset.

Core Competencies

SOC Operations
Incident Response
Threat Intelligence
Vulnerability Management
API Security
Cloud Security
Endpoint Protection
SIEM Monitoring
Patch Management
Risk Assessment
Compliance
Application Security

Tools & Platforms

Technologies I’ve Worked With

Technologies used to monitor threats, assess vulnerabilities, secure endpoints, and support real-world cybersecurity operations across enterprise and cloud environments.

Security
QualysNessusOWASP ZAPWazuhSecurity OnionOPSWAT MetaDefenderWallarmSnykAikido
IT Operations
ManageEngine Endpoint CentralLansweeperAsset ManagementEndpoint TroubleshootingSystem Monitoring
Cloud
Google CloudSecurity Command CenterCloud Security Controls
Featured Security Engineering Work

AI Security Middleware with Phishing Defense

Built a FastAPI-based security middleware that detects prompt injection, masks PII, enforces rate limits, analyzes phishing emails, enriches suspicious URLs with VirusTotal threat intelligence, and blocks high-risk activity in real time.

Blocked prompt injection attempts
Detected phishing emails using SPF, DKIM & DMARC
Enriched suspicious URLs with VirusTotal
Masked PII across frontend and backend
Scored behavioral threats in real time
Blocked high-risk requests with HTTP 403
AI SecurityFastAPIPhishing DetectionVirusTotal APIPII MaskingPrompt InjectionSOC SimulationThreat Intelligence
AI security middleware with phishing detection and threat intelligence dashboard

Projects

Premium Project Portfolio

Real-world technical work across AI security, cybersecurity operations, structured cabling, infrastructure cleanup, connectivity, and physical security deployment.

Before and after comparison of organized network rack with improved cable management and equipment layout
Image Slider

Structured Rack Standardization

This image showcases before-and-after rack standardization work focused on cleaner cable routing, improved equipment arrangement, easier fault tracing, and better infrastructure visibility.

Cable RoutingRack StandardizationVisibility ImprovementMaintenance Readiness
Security

AI Security Middleware (SOC Simulation)

Built a FastAPI-based security middleware that detects prompt injection, enforces rate limits, masks PII, analyzes phishing emails using SPF, DKIM, and DMARC, and enriches suspicious URLs with VirusTotal threat intelligence for real-time automated response.

Blocked prompt injection attempts
Detected phishing emails
Enriched URLs with VirusTotal
Masked sensitive PII
Scored behavioral threats
Automated 403 blocking
AI SecurityFastAPIPhishing DetectionVirusTotal APIThreat IntelligencePrompt InjectionPII MaskingSOC Simulation
Infrastructure

Network Rack Optimization

Reorganized disordered network racks into clean, structured, and maintainable infrastructure, improving cable discipline, fault tracing, and operational visibility.

Up to 90% less cable clutter
Faster fault tracing
Improved airflow and visibility
Cable ManagementNetwork InfrastructurePhysical LayerTroubleshooting
Infrastructure

UPS & Rack Power Maintenance

Performed UPS battery replacement and supporting rack power maintenance to improve backup readiness and equipment continuity in technical environments.

Improved power backup readiness
Supported equipment continuity
Reduced maintenance risk
UPSPower BackupMaintenanceInfrastructure
Security

CCTV and Connectivity Expansion

Installed and expanded CCTV surveillance and connectivity systems to strengthen monitoring coverage, improve field visibility, and support more reliable communication infrastructure.

Expanded surveillance coverage
Improved site visibility
Enhanced connectivity reach
CCTVConnectivityField SupportSecurity Monitoring
Field Work

Inside the Plant Installations

Delivered plant-side installation, configuration, and equipment support in active industrial environments, improving deployment readiness and technical support continuity.

On-site technical execution
Equipment installation support
Improved deployment readiness
Plant OperationsField EngineeringInstallations
Field Work

Internet Connectivity Restoration

Restored connectivity through field troubleshooting, equipment handling, and infrastructure support work in operational environments.

Restored connectivity service
Reduced service interruption
Improved operational continuity
ConnectivityTroubleshootingRestoration
Security

Radio, RFID and Biometric Installation

Installed and supported radio, RFID, and biometric devices across field environments for access control, operations support, and security visibility.

Improved access technology rollout
Field installation support
Expanded security device footprint
RadioRFIDBiometricAccess Control
Office

Enterprise IT Operations

Provided enterprise support, active monitoring, and structured system oversight to support daily business operations and end-user continuity.

Enterprise support delivery
Operational monitoring
Daily systems coordination
IT SupportMonitoringOperations

Featured Case Study

AI Security Middleware with Phishing Detection & Automated Response

A SOC-style security system designed to detect prompt injection, protect sensitive data, analyze phishing emails, enrich suspicious URLs with VirusTotal threat intelligence, score behavioral risk, and automatically block high-risk activity in real time.

Challenge

Modern applications face multiple attack paths including prompt injection, phishing emails, credential harvesting, brute-force behavior, insider activity, and accidental PII exposure. The goal was to build a practical security layer that could detect and respond to these threats before they reach core application logic.

Action

Built a FastAPI-based middleware with layered controls: authentication, rate limiting, frontend and backend PII masking, prompt injection detection, behavioral threat scoring, phishing header analysis, phishing content inspection, and VirusTotal URL reputation enrichment.

Result

Produced a working SOC-style prototype that blocks malicious requests, masks sensitive data, detects phishing indicators, enriches URLs with threat intelligence, scores user behavior, logs events safely, and returns structured risk analysis for investigation.

SPF, DKIM & DMARC validation
From vs Return-Path spoofing checks
VirusTotal URL threat intelligence
Prompt injection detection
Frontend + backend PII masking
Behavioral threat scoring
Rate limiting and auth checks
Automated HTTP 403 blocking
FastAPIPythonPhishing DetectionVirusTotal APIThreat IntelligencePrompt Injection DefensePII MaskingBehavioral AnalyticsSOC SimulationAutomated Response

Technical Labs

Cybersecurity Labs

Lab projects showcasing real-world application of AI security, endpoint protection, SIEM deployment, detection engineering, phishing investigation, cloud security, and vulnerability assessment.

AI Security

AI Security Middleware (SOC Simulation: Detection & Response)

Built a FastAPI-based AI security middleware that detects prompt injection, enforces rate limits, masks PII, analyzes phishing emails using SPF, DKIM, and DMARC, enriches suspicious URLs with VirusTotal threat intelligence, and automatically blocks high-risk activity in real time.

Blocked prompt injection and malicious input requests
Detected phishing emails using header + content analysis
Enriched suspicious URLs with VirusTotal intelligence
FastAPIPythonPhishing DetectionVirusTotal APIThreat IntelligencePII MaskingSOC Simulation
View Security Project Case Study

Endpoint Security

OPSWAT MetaDefender Endpoint Security Lab

Configured endpoint security policies including malware detection, DLP, patch management, application control, and threat monitoring workflows.

Configured malware detection policies
Applied DLP and device control concepts
Documented security policy workflow
OPSWATEndpoint SecurityPolicy Configuration
View Security Project Case Study

SIEM / SOC

Wazuh SIEM Deployment Lab

Deployed and configured Wazuh SIEM with agent setup, file integrity monitoring, Windows Defender visibility, and endpoint threat detection workflows.

Deployed Wazuh environment
Configured agent monitoring
Enabled FIM and alert visibility
WazuhSIEMFIMSOC
View Security Project Case Study

Detection Engineering

Windows PowerShell Exploitation Detection with Slack Alerts

Extended the Wazuh lab with Windows PowerShell exploitation-detection techniques and Slack integration for alert delivery and monitoring visibility.

Monitored PowerShell exploitation behavior
Integrated Slack alert notifications
Improved detection and response visibility
WazuhPowerShellSlackAlerting
View Security Project Case Study

Cloud Security

Google Cloud Security Capstone

Investigated and remediated cloud security weaknesses using Google Cloud Security Command Center and related controls.

Identified cloud vulnerabilities
Restricted risky exposure
Validated remediation steps
Google CloudSecurity Command CenterCloud Security
View Security Project Case Study

Vulnerability Assessment

Web Application Assessment with Nessus and Qualys

Performed web application vulnerability assessment using Nessus and Qualys, reviewed findings, and documented remediation recommendations.

Ran Nessus-based web app scan
Reviewed findings and severity
Used Qualys for certificate visibility
NessusQualysWeb SecurityCertificate View
View Security Project Case Study

Email Security / SOC

Phishing Email Investigation & IOC Analysis

Investigated suspicious phishing emails, extracted useful metadata, identified IOCs such as malicious URLs, suspicious IP addresses, sender anomalies, and documented mitigation recommendations.

Analyzed suspicious email metadata
Identified phishing IOCs and sender anomalies
Documented mitigation recommendations
PhishToolVirusTotalurlscan.ioIOC Analysis
View Security Project Case Study

Career Journey

Experience Timeline

Progressive experience across enterprise IT support, security operations, vulnerability assessment, endpoint security, and cybersecurity engineering.

CURRENT ROLEMay 2024 – Present

IT Support Officer

Sterling Oil Exploration & Energy Production Company

300+ users supported
IT SupportAsset ManagementSystem HardeningTroubleshooting

Supported 300+ enterprise users across IT operations.

Managed troubleshooting, upgrades, asset lifecycle, and system hardening.

Improved ticket resolution time by 40% through structured workflows.

SECURITY ENGINEERINGJan 2025 – April 2026

Cybersecurity Engineer / Analyst

Hagital Consulting, Nigeria

Vulnerability assessment & API security
NessusOWASP ZAPSnyk & AikidoQualysRemediation

Conducted vulnerability scans using Nessus and OWASP ZAP.

Improved security posture through Qualys and API security reviews.

Worked across patching, SAST/DAST, remediation, and endpoint security operations.

SOC OPERATIONSNov 2023 – May 2024

SOC Analyst / Cybersecurity Analyst

Cyber & Forensics Security Solutions

SIEM monitoring & incident triage
SIEMLog AnalysisIncident EscalationThreat Hunting

Monitored and analyzed security alerts using SIEM tools.

Performed triage, log correlation, and incident escalation.

Supported threat hunting, malware analysis, and containment workflows.

HEALTHCARE ITJan 2021 – Nov 2023

Senior IT Support Officer

Capitol Hill Hospitals, Nigeria

95% first-contact resolution
EHR SupportTicketingWindows SupportWorkstation Deployment

Achieved 95% issue resolution and maintained 99.999% system uptime through proactive support and monitoring.

Reduced response time from 4 hours to 1 hour by implementing a more efficient ticketing workflow.

Deployed 150+ workstations and trained 50+ users monthly on EHR systems and IT processes.

Credentials

Certifications Showcase

Verified learning and professional credentials across cybersecurity, cloud security, IT support, and security operations.

15+
Total credentials displayed
Highlights
15+ cybersecurity and IT credentialsISC2 Certified in CybersecurityCisco CyberOps AssociateGoogle Cloud CybersecurityCompTIA SecAI+ learning pathISO/IEC 27001 security credential

Core Certifications

Supporting Certifications

Recognition

Awards & Recognition

Let’s Connect

Open to cybersecurity, SOC, cloud security, and IT operations opportunities

Recruiters, hiring managers, and collaborators can review my projects, AI security work, labs, certifications, experience, and downloadable resume from this portfolio.

Open to Work NigeriaResponse within 24–48 hours