Skip to main content
Open to Full-Time Security Engineering & SOC Analyst Roles

Koffi Jean-Marie
Amedjonekou

Cybersecurity Engineer

Dedicated cybersecurity professional with hands-on expertise across penetration testing, vulnerability management, cloud security, and governance frameworks. Committed to the principle of ‘secure-by-default’ in every technical decision.

Security Philosophy

Core principles that guide my approach to cybersecurity.

Secure by Default

Building systems with security as the foundation, not an afterthought. Every layer is hardened from day one.

Defense in Depth

Implementing multiple overlapping security controls so no single point of failure compromises the system.

Continuous Learning

Staying ahead of evolving threats through ongoing research, certifications, and hands-on lab work.

0+
Security Projects
0
Security Domains
0+
Certifications Pursued
0+
Days in Cybersecurity

Skill Matrix

Capabilities organized by security domain — from offensive operations to governance and tooling.

Offensive Security

Penetration Testing & Exploitation

  • Penetration Testing82%
  • Vulnerability Assessment88%
  • Exploit Development72%
  • Social Engineering75%
  • Metasploit & Burp Suite80%

Defensive Security

Detection, Response & Hardening

  • Incident Response85%
  • Threat Detection & Analysis90%
  • SIEM Configuration83%
  • Endpoint Protection80%
  • Network Monitoring87%

GRC & Compliance

Governance, Risk & Regulatory

  • Risk Management88%
  • Compliance Frameworks92%
  • Security Auditing85%
  • Regulatory Requirements90%

Tools & Platforms

Rapid7 Ecosystem & Infrastructure

  • Rapid7 InsightVM93%
  • Rapid7 InsightIDR90%
  • Rapid7 InsightAppSec88%
  • Cloud (AWS, Azure, GCP)82%
  • Linux & Windows Admin85%
  • Scripting & Automation78%

My Projects

Applied cybersecurity projects showcasing hands-on security engineering, analysis, and governance.

Secure Network Design

Network Security

Designed a secure merged network for a financial-medical company acquisition. Conducted vulnerability assessments, replaced end-of-life infrastructure, migrated servers to Microsoft Azure, and implemented zero-trust architecture with defense-in-depth controls. Ensured compliance with PCI-DSS, HIPAA, and GLBA within a $50K budget.

Zero TrustAzureFortinetPCI-DSSHIPAADefense-in-Depth
View Repository

Cloud Security Implementation

Cloud Security

Migrated a shipping company's on-premises infrastructure to Azure IaaS. Implemented department-specific RBAC, Key Vault access policies with soft delete and purge protection, encryption for data at rest and in transit, and automated backup configurations. Addressed insider threat risks and ensured compliance with FISMA, PCI-DSS, and NIST SP 800-53.

Azure IaaSRBACKey VaultFISMAPCI-DSSNIST 800-53
View Repository

Security Audit & Compliance

GRC

Assessed a healthcare IT company's security posture against NIST SP 800-53 controls. Identified critical gaps in access control, continuous monitoring, and risk management. Developed remediation plans for least-privilege enforcement, SIEM deployment, and structured risk response. Designed PCI-DSS compliance strategy for payment card processing with role-based responsibilities.

NIST 800-53PCI-DSSFISMARisk AssessmentSIEMRBAC
View Repository

Zero Trust IAM for 40,000 Identities

Capstone

Designed and validated a centralized Identity and Access Management solution using Microsoft Entra ID for a university with 40,000+ students. Deployed 25 simulated identities, configured four Conditional Access policies enforcing MFA, and built a PowerShell bulk provisioning template for full-scale rollout. Achieved 100% policy enforcement with zero failures. Aligned with NIST CSF 2.0, ISO/IEC 27001:2022, and NIST SP 800-207 Zero Trust Architecture.

Zero TrustMicrosoft Entra IDMFAConditional AccessNIST CSF 2.0ISO 27001PowerShell
View Repository

Learning Log

Documenting the journey — certifications, labs, and continuous skill development in cybersecurity.

OSCP Lab Progress: Active Directory Attacks

Completed AD attack chains including Kerberoasting, AS-REP roasting, and Pass-the-Hash. Documented enumeration methodology using BloodHound and PowerView for lateral movement in lab environments.

OSCPActive DirectoryKerberoasting

Zero Trust IAM Capstone Completed

Designed and validated a centralized IAM solution for 40,000 identities. Achieved 100% Conditional Access policy enforcement across all test scenarios. Published full documentation to GitHub.

Zero TrustMicrosoft Entra IDMFA

Rapid7 InsightIDR: Detection Rule Tuning

Configured custom detection rules in InsightIDR for identifying suspicious PowerShell execution and lateral movement patterns. Reduced false positive rate by tuning alert thresholds.

Rapid7SIEMDetection Engineering

NIST CSF 2.0 Deep Dive

Studied the updated NIST Cybersecurity Framework 2.0 including the new Govern function. Applied framework mapping to real-world scenarios in capstone preparation.

NISTGRCCompliance

Security Roadmap

Certifications earned, in progress, and on the horizon.

CompTIA Certifications

Completed

Full CompTIA security track — from networking fundamentals through offensive testing and threat analysis.

Security+Network+CySA+PenTest+
Completed

Rapid7 Certifications

Completed

Certified across the Rapid7 Insight platform — vulnerability management, endpoint detection, and application security.

InsightVMInsightIDRInsightAppSec
Completed

Microsoft Fundamentals

Completed

Azure cloud, security/compliance, and AI fundamentals — demonstrating breadth across the Microsoft ecosystem.

AZ-900SC-900AI-900
Completed

Cloud & IT Foundations

Completed

Industry-recognized cloud and IT baseline certifications covering infrastructure, networking, and security principles.

AWS Cloud PractitionerGoogle IT SupportISC2 CC
Completed

RHCSA (Red Hat Certified System Administrator)

In Progress

Linux system administration — managing users, storage, networking, and security on RHEL environments.

2026

OSCP (OffSec PEN-200)

Planned

Hands-on penetration testing certification with a 24-hour practical exam. The gold standard for offensive security.

2026

Get in Touch

Committed to contributing meaningfully to cybersecurity teams where technical expertise and a security-first mindset drive organizational resilience. Open to opportunities in penetration testing, vulnerability management, threat analysis, and security research.

Let's Connect

Whether you have an opportunity, a question, or just want to talk security — I'd love to hear from you.

Email

jm18306@gmail.com

Location

United States — Open to Remote

Availability

Open to full-time security roles