Cybersecurity Analyst

Detect. Respond.
Reduce Risk.

I build and improve security monitoring, investigate incidents, and turn noisy alerts into clear, actionable decisions.

🥇 1st
Security BlueTeam
Frostbyte CTF 2025
Top 0.3%
HTB Holmes CTF
24 / 11,342 teams
Instructor
CompTIA Security+
U.S. Air Base, Germany
Kennedy Aikohi — Cybersecurity Analyst
Available for hire
SOC Operations Threat Detection Malware Analysis Threat Hunting SIEM Engineering Incident Response DFIR MITRE ATT&CK Detection Engineering Purple Team

About Me

Kennedy Aikohi — Cybersecurity Analyst based in Essen, Germany
Location Essen, Germany
Role Cybersecurity Analyst
Certs Security+, CySA+, IBM SOC
Languages English (C2) · German (B1) · Russian
Status Open to opportunities

Cybersecurity Analyst focused on blue team operations, detection engineering, and incident response.

I help teams improve visibility and response by building practical detections, investigating suspicious activity, and hardening systems against common attack paths. Whether it's tuning SIEM correlation rules in Splunk or Elastic Stack, conducting malware static analysis, or mapping adversary behaviour to MITRE ATT&CK — I translate raw telemetry into actionable intelligence that defenders can act on.

My work blends hands-on lab environments with real-world operational thinking: alert triage, root-cause analysis, containment, and clear documentation that supports continuous improvement. I've competed at the top levels of Capture the Flag (CTF) competitions — placing 1st globally at Security BlueTeam Frostbyte 2025 and in the top 0.3% at Hack The Box Holmes 2025 (24th out of 11,342 teams).

I studied Chemistry (3 years) at Ambrose Alli University and Computer Science at Kharkiv National University of Radio-Electronics — an analytical foundation that directly strengthens how I approach threat hunting, digital forensics, and incident response (DFIR). I also served as an instructor for CompTIA Security+ at a U.S. Air Force Base in Germany, making complex security concepts accessible and practical for non-technical personnel.

My toolset spans Splunk, Elastic Stack, IBM QRadar, Velociraptor, Caldera, Volatility, Wireshark, Zeek, and beyond. I actively build and operate self-hosted cybersecurity lab environments — including a full purple team platform and a containerised SOC appliance — to stay sharp on detection engineering, adversary emulation, and reverse engineering.

CyberDefenders CTF Player · BlueYard Labs Security Blue Team Frostbyte 2025 · 1st Global · ClickFix Lab MalOps.io Malware RE · MaskGram Challenge Hack The Box Holmes CTF · Top 0.3% LinkedIn Lab writeups · Insights

Let's build something secure.

Available for SOC roles, DFIR engagements, security architecture reviews, and blue team consulting.

Contact Me View Projects