Skip to content
View TempleAnthony's full-sized avatar

Block or report TempleAnthony

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
TempleAnthony/README.md

Temple Nnanna Idam-Nkama | Cybersecurity Analyst

👋 Hi there! I’m Temple

A passionate Cybersecurity Analyst committed to securing digital spaces and helping organizations stay resilient against growing cyber threats.

Through a combination of certifications, hands-on simulations, technical training, and continuous personal development, I have built a strong cybersecurity foundation grounded in real-world applications.

I am focused on Governance, Risk and Compliance, Incident Response, Security Operations, Risk Management, Vulnerability Assessment, and Cyber Threat Intelligence.


Certifications and Technical Training

  • Certified in Cybersecurity (CC) - ISC2
  • Fortinet Certified Associate in Cybersecurity (FCA)
  • FortiGate 7.4 Operator Certification
  • IBM SkillsBuild - Technical Introduction to Cybersecurity
  • Fortinet - Cybersecurity Fundamentals Course
  • MITRE ATT&CK® - Top ATT&CK Techniques Completed
  • Microsoft Learn - Cryptography Concepts Badge
  • Microsoft Learn - Security and Compliance Badge

Projects and Practical Experience

  • Web Log Analysis for Malicious Requests - Deloitte Australia Job Simulation

    I analyzed web log activities to detect the source IP address of malicious requests targeting a company's internal corporate network. I provided a detailed advisory to the client on how to strengthen their cybersecurity posture, focusing on proactive threat detection and network protection strategies.

  • Phishing Awareness and Metrics Analysis - Mastercard Cybersecurity Job Simulation

    In this simulation, I led a phishing email test targeting employees within the organization. I tracked and analyzed key engagement metrics, including the Click-Through Rate (CTR) and Email Open Rate. From the findings, I identified departments that were most vulnerable to phishing attacks and provided recommendations for targeted cybersecurity awareness training to mitigate future risks.

  • Incident Response and Malware Containment - TryHackMe Incident Response Process

    As part of the Incident Response team, I investigated a cyber attack on an endpoint system infected with a malicious macro that downloaded a crypto miner malware. The malware slowed down system performance and created a persistence mechanism by modifying the system's run registry keys. I worked to isolate the compromised machine from the network, deleted the macro and related malware files, removed the system's download history to prevent reinfection, and flagged the malicious source IP address in the organization's SIEM. I also added the IP address to the network's firewall blocklist to prevent future compromises.

  • File Encryption with GPG and OpenSSL - TryHackMe Introduction to Cryptography

    In the TryHackMe Introduction to Cryptography room, I performed symmetric encryption on sensitive files using GNU Privacy Guard (GPG) and OpenSSL. This exercise demonstrated my understanding of symmetric key cryptography and secure file protection techniques, building a strong foundation for implementing encryption methods to maintain data confidentiality.

👉 Check out my repositories for a closer look at my projects!


Skills

Technical Skills:
Cybersecurity Fundamentals | Network Security | Risk Assessment | Threat Intelligence | Security Operations | Incident Response Basics | Vulnerability Management | Encryption Techniques

🛠Tools & Frameworks:

Fortinet   Wireshark   Linux   GPG   Tableau   Jupyter Notebook   Excel

Soft Skills:
Critical Thinking | Problem-Solving | Leadership | Team Collaboration | Public Speaking | Effective Communication


🔗 Connect With Me

GitHub     LinkedIn

  • Location: Nigeria | Remote and Onsite Opportunities Available

"Building secure digital futures, one layer at a time."

Pinned Loading

  1. Security-Advisory-on-Product-Development-Staging-Environment-Apache-Log4j-Vulnerability-for-AIG Security-Advisory-on-Product-Development-Staging-Environment-Apache-Log4j-Vulnerability-for-AIG Public

    AIG Shields Cybersecurity Job Simulation Project

    1

  2. Incident-Response-Project-on-TryHackMe Incident-Response-Project-on-TryHackMe Public

    TryHackMe Incident Response Process Room Project

    1

  3. Phishing-Email-Campaign-Mastercard-Job-Simulation Phishing-Email-Campaign-Mastercard-Job-Simulation Public

    • Completed a job simulation where I served as an analyst on Mastercard’s Security Awareness Team • Helped identify and report security threats such as phishing • Analyzed and identified which area…

  4. Deloitte-Australia-Cyber-Job-Simulation-On-Web-Log-Analysis Deloitte-Australia-Cyber-Job-Simulation-On-Web-Log-Analysis Public

    • Completed a job simulation involving reading web activity logs • Supported a client in a cyber security breach • Answered questions to identify suspicious user activity

  5. File-Encryption-using-GPG-and-OpenSSL-Based-on-TryHackMe-s-Introduction-to-Cryptography. File-Encryption-using-GPG-and-OpenSSL-Based-on-TryHackMe-s-Introduction-to-Cryptography. Public

    Symmetric File Encryption Project using GNU Privacy Guard (GPG) and OPENSSL Project in the TryHackMe Introduction to Cryptography Room Labs. I gained knowledge and skills on how to perform symmetri…

    Shell