Skip to content
View CodeBroKinty's full-sized avatar

Block or report CodeBroKinty

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
CodeBroKinty/README.md

Hi, I'm Kiante πŸ‘‹

I'm a cybersecurity professional and IT consultant transitioning into Cloud Security Engineering. I hold CompTIA Security+ and have spent the last several months building hands-on experience through homelab environments, security automation tools, and real-world client IT work across healthcare and transport industries.

Currently targeting Security Analyst and SOC Analyst roles while building toward Cloud Security Engineer and AI Security Specialist long term.


πŸ… Certifications

Certification Issuer Date Earned
CompTIA Security+ (SY0-701) CompTIA April 2026
Google AI Essentials Google April 2026
Google Prompting Essentials Google April 2026

πŸ”„ In progress: AWS Certified Cloud Practitioner (Target: July 2026)


πŸ” Featured Projects

18 production-ready security automation tools built across core cloud security domains πŸ“ [github.com/CodeBroKinty/python-automation-labs]

πŸ›‘οΈ AWS Security Suite

  • S3 Security Auditor β€” Detects misconfigurations (public access, encryption, versioning, logging) with risk scoring (CRITICAL / HIGH / MEDIUM / LOW) β€” targets class of vulnerability behind the Capital One breach ($190M settlement)
  • IAM Permission Analyzer β€” Flags missing MFA, excessive admin access, and unused credentials across AWS accounts
  • EC2 Inventory Tool β€” Asset discovery with automated security analysis flagging public IP exposure and default security groups
  • Cost Monitor β€” Service breakdown, trend analysis, and month-end forecasting to prevent unauthorized spend

🌐 Network Reconnaissance

  • Port Scanner β€” 100 concurrent threads, scans 1,000 ports in under 10 seconds (100x speedup vs sequential)
  • Service Detector β€” Banner grabbing with OS fingerprinting to identify vulnerable software versions
  • Ping Sweep β€” CIDR notation network discovery and asset mapping
  • Unified Scanner β€” Complete host discovery, port scanning, and service enumeration in a single workflow

🚨 Threat Detection & Automation

  • Brute-Force Detector β€” 3-layer detection: velocity attacks, distributed coordinated IPs, and account enumeration patterns
  • Authentication Log Parser β€” Regex-based threat correlation and attack pattern identification
  • File Integrity Monitor β€” Real-time SHA-256 cryptographic hashing to detect unauthorized file modifications
  • Security Reporter β€” Multi-format exports (CSV, Markdown, JSON) for stakeholder communication

πŸ› οΈ Homelab Projects


Deployed Splunk, ingested endpoint and authentication log data, and performed threat hunting using SPL queries. Identified simulated security incidents including failed login patterns, off-hours authentication, and privilege escalation attempts. Documented findings in incident report format.

Skills: Splunk, SIEM, SPL Queries, Log Analysis, Threat Hunting, Incident Documentation


Deployed Wazuh open-source EDR platform across a multi-OS homelab environment (Windows and Linux). Configured endpoint agents, triggered and analyzed security alerts including failed logins and file integrity changes, and documented findings using industry-standard incident reporting format.

Skills: EDR, Wazuh, Endpoint Monitoring, Alert Triage, Incident Reporting, Linux, Windows Server


Performed live packet capture, traffic baselining, and SOC-style forensic triage of a real-world NetSupport Manager RAT infection using Wireshark on Parrot OS. Identified all 5 IOCs from raw packet data including infected host IP, MAC, hostname, user account, and full name. Includes incident report, IOC documentation, and annotated screenshots.

Skills: Wireshark, Packet Analysis, Network Forensics, TCP/IP, DNS, Kerberos, NBNS, SAMR, Nmap, Parrot OS, Linux, Incident Response, IOC Extraction, C2 Traffic Detection, Display Filter Development, Threat Triage

Active Directory / IAM Lab

Designed and administered a Windows Server Active Directory environment simulating a multi-department organization. Implemented joiner/mover/leaver (JML) lifecycle management, role-based access control (RBAC) via security groups, Group Policy configuration, and access auditing. Identified and documented accounts with excessive permissions as mock audit findings.

Skills: Active Directory, IAM, RBAC, GPO, JML Lifecycle, Access Auditing, Windows Server


Virtualized Attack / Defense Lab

VirtualBox environment running Kali Linux (attacker), Ubuntu (analyst), and Parrot OS alongside a Windows victim machine for penetration testing, log analysis, and defensive security practice.

Skills: Kali Linux, Parrot OS, Ubuntu, Windows, VirtualBox, Network Scanning, Threat Analysis


πŸ’» Tech Stack

Languages: Python 3.10+, Bash, SQL (foundational), HTML, CSS

Cloud: AWS (EC2, S3, IAM, Cost Explorer), boto3 SDK

Security Tools: Splunk, Wazuh, Nessus, MITRE ATT&CK, Fail2Ban concepts, Tripwire concepts

IAM & Identity: Active Directory, RBAC, Group Policy, User Lifecycle Management (JML)

Networking: TCP/IP, DNS, DHCP, SSH, HTTP/HTTPS, MX Records, Port Scanning, Banner Grabbing, OS Fingerprinting, CIDR Notation

Operating Systems: Linux (Ubuntu, Kali, Parrot OS), Windows Server, Windows 10/11

Concepts: Threat Detection, Log Analysis, Incident Response, Vulnerability Management, NIST, HIPAA, Cloud Security, File Integrity Monitoring

Tools: Git, GitHub, VS Code, VirtualBox, Obsidian, Notion


πŸ“š Current Training

Platform Path Status
TryHackMe Pre-Security Path βœ… Completed
TryHackMe Cyber Security Path πŸ”„ 60% Complete
AWS Cloud Practitioner πŸ”„ In Progress (July 2026)

πŸ’Ό Professional Background

  • IT & Digital Systems Consultant β€” Infrastructure support, Google Workspace administration, and DNS/domain management for healthcare and transport clients in Arkansas and DFW
  • Pharmacy Automation Specialist β€” Operated and troubleshot the Omnicell M5000 automated dispensing system alongside Omnicell engineering staff in a high-stakes, zero fault-tolerance environment
  • 7 Years Trading Experience β€” SPY, IWM, QQQ including 0DTE options strategies with structured risk management

πŸ“ˆ Current Focus

  • ☁️ AWS Cloud Practitioner β€” in progress (Target: July 2026)
  • πŸ”¬ Expanding homelab with cloud-integrated security monitoring
  • πŸ“‹ CompTIA SecAI+ (CY0-001) β€” roadmap target
  • ☁️ AWS Security Specialty β€” roadmap target
  • πŸ—οΈ AWS Solutions Architect β€” roadmap target
  • πŸ€– AWS Machine Learning Specialty β€” roadmap target
  • 🎯 Open to: Security Analyst Β· SOC Analyst Β· IT Support Β· Cloud Security Engineer

πŸ“« Connect With Me

Twitter Substack

πŸ“ DFW Area β€” Remote & Hybrid Open


πŸ’‘ Building in public. Documenting the journey from trader to cloud security engineer.

Pinned Loading

  1. python-automation-labs python-automation-labs Public

    πŸ” 18 production-ready security automation tools | AWS Cloud Security (S3, EC2, IAM) | Network Scanning | Threat Detection | Python + boto3

    Python 1

  2. wazuh-edr-homelab wazuh-edr-homelab Public

    Open-source EDR homelab using Wazuh v4.7.5 β€” brute force detection, SCA compliance scanning, and incident response documentation