Available · Remote · Full-time & Contract

> security engineer + software developer

Olayinka Ojo

I build systems that hold.

And find the ones that don't.

terminal
scroll

Building at the edge of
engineering and adversarial thinking.

I design and ship software at the intersection of engineering and adversarial thinking. Over 15 years building secure digital infrastructure — from authentication systems and CI/CD pipelines to SIEM-backed threat detection platforms. Currently architecting a cloud-based threat intelligence platform to make real-time security data accessible to African enterprises.

B.Sc. Information TechnologyNational Open University of Nigeria
15+years in tech
35%faster incident response
30+client accounts secured
85%CTF success rate

Where I've worked

2023 — 2025Security AnalystLit Creative Designs Ltd

Reduced critical incident response times by 35% across 30+ client accounts

  • Implemented log analysis using Splunk across client platforms, identifying security threats and optimizing uptime over 18 months
  • Engineered custom authentication modules with real-time permission controls integrated into client web applications
  • Devised automated CI/CD pipelines that accelerated release cycles and reinforced code stability across multiple client projects
  • Streamlined digital workflows while measurably improving security posture for diverse corporate clients
2022 — 2023IT / Systems EngineerJOPAG Logistics Ltd

60% reduction in threat resolution time, 100% P1 incident containment within SLA

  • Designed and implemented secure IT infrastructure, cutting system downtime by 40%
  • Built logistics management platform that increased delivery efficiency by 35%
  • Led incident response operations using SIEM platforms, reducing average threat resolution time by 60%
  • Spearheaded enterprise-wide threat detection initiatives — 55% year-over-year decrease in undetected security events

What people say

Olayinka has an unusual ability to think like an attacker while building like an engineer. He caught three authentication flaws in our system that two previous audits missed — then fixed them himself the same week.

— Engineering Lead, Lit Creative Designs Ltd

The CI/CD security pipeline he built for us became the gold standard across all our client deployments. Shipping faster and more securely at the same time isn't something you see often.

— Technical DirectorLit Creative Designs Ltd

Reduced our incident response time dramatically and documented everything cleanly. Rare to find someone equally comfortable writing code and investigating a live threat.

— Operations Manager, JOPAG Logistics Ltd

Full recommendations available on LinkedIn →

What I work with

Languages
GoJavaScriptPythonRubyHTMLCSSBash
Security
Burp SuiteMetasploitNmapWiresharkKali LinuxNessusSplunkHydraJohn the RipperSemgrep
Infrastructure
LinuxWindows ServerDockerCI/CDRedisSIEMRBAC
Web & Tools
ReactNode.jsRESTJWTWordPressJiraAsana

Featured projects

01
Go

GoLogWatch

Concurrent log ingestion engine in Go. Parses multi-format streams (syslog, JSON, CEF) using goroutine worker pools, evaluates each event against a configurable rule engine, and fires alerts in under 50ms. Handles 50k+ events/sec on a single core — built as a lightweight alternative to heavyweight SIEM agents for resource-constrained environments.

#go#concurrency#security#cli#siem
02
wipPython

Visual Threat Intelligence Hub

Cloud-native platform processing real-time threat feeds via async Python pipelines. Normalises IOC data from multiple sources, correlates with internal telemetry, and surfaces plain-language summaries using LLM integration. Designed for non-technical SME operators — zero security training required to act on the dashboard.

#python#react#ai#cloud#security
03
Python

RBAC Security Engine

Hierarchical role-based access control with cross-platform consistency across Linux and Windows servers. Built an abstraction layer that translates policy rules to platform-native ACL formats. Audit log captures every permission change with actor, timestamp, and delta — queryable and exportable for compliance reviews.

#python#linux#windows#infra#security
04
JavaScript

Secure Auth Module

Stateless JWT authentication over a Redis-backed session store — clients can invalidate tokens without waiting for expiry. Integrated into multi-tenant web apps with per-tenant permission scoping, ensuring no token from tenant A can be replayed against tenant B. Deployed across 8 production client environments.

#javascript#node#jwt#redis#multi-tenant
05
Python

CI/CD Security Pipeline

Embedded SAST (Semgrep), dependency auditing, and policy-as-code checks directly into the deployment pipeline. Hard-gates on critical findings — build fails, no exceptions. Eliminated 80% of low-hanging-fruit findings before human review, cutting manual security audit time in half across multiple client projects.

#python#docker#ci/cd#semgrep#devsecops

Credentials & track record

CTF / Platforms

2024HackTheBox85%+ completion rate
2024TryHackMeMultiple room completions
2023CTF ChallengesPen testing & vuln assessments

[TOOLS]

Burp Suite · Metasploit · Nmap · Wireshark · Hydra · John the Ripper · Kali Linux · Nessus

Certifications

Certified in Cybersecurity (CC)ISC2
2025
Leadership SchoolAfrica Centre for Leadership, Strategy & Development
2025
Cybersecurity CertificationYouthrive
2024
Career Essentials in CybersecurityMicrosoft & LinkedIn
2024
Career Essentials in Generative AIMicrosoft & LinkedIn
2024
Read all →

Let's talk.

Available for security consulting, contract engineering, and interesting problems. I work across time zones.

StatusOpen to opportunities
TypeFull-time & Contract
LocationRemote (any timezone)
NoticeAvailable immediately