Skip to main content
Available for internships & collaborations

Koffi Jean-Marie
Amedjonekou

Security Researcher

Dedicated cybersecurity professional with hands-on expertise across penetration testing, vulnerability management, cloud security, and governance frameworks. Committed to the principle of ‘secure-by-default’ in every technical decision.

Professional Philosophy

Security is not a feature; it is a foundation. Every technical decision, from architecture design to code implementation, is guided by the principle of ‘secure-by-default.’ This means proactively identifying and mitigating risks, maintaining defense-in-depth strategies, and ensuring that security is embedded at every layer rather than bolted on as an afterthought.

As the cybersecurity landscape evolves with emerging threats and technologies, continuous learning and hands-on experience are essential to staying effective.

Skill Matrix

Capabilities organized by security domain — from offensive operations to governance and tooling.

Offensive Security

Penetration Testing & Exploitation

  • Penetration Testing
  • Vulnerability Assessment
  • Exploit Development
  • Social Engineering
  • Metasploit & Burp Suite

Defensive Security

Detection, Response & Hardening

  • Incident Response
  • Threat Detection & Analysis
  • SIEM Configuration
  • Endpoint Protection
  • Network Monitoring

GRC & Compliance

Governance, Risk & Regulatory

  • Risk Management
  • Compliance Frameworks
  • Security Auditing
  • Regulatory Requirements

Tools & Platforms

Infrastructure & Automation

  • Rapid7 InsightVM
  • Cloud (AWS, Azure, GCP)
  • Linux & Windows Admin
  • Scripting & Automation

Lab Write-ups

Hands-on projects with documented methodology — from initial recon through exploitation and remediation.

Active Directory Attack Lab

Red Team

Enumerated domain controllers via BloodHound, escalated privileges through Kerberoasting, and demonstrated Golden Ticket persistence. Documented full kill-chain with mitigations.

ADKerberosBloodHoundMimikatz
View Repository

SIEM Detection Rules

Blue Team

Built custom Sigma rules for detecting lateral movement and credential dumping. Tested against MITRE ATT&CK T1003 and T1021 techniques in an ELK Stack environment.

SigmaELKMITRE ATT&CK
View Repository

Web App Pentest Report

Red Team

Performed OWASP Top 10 assessment against a custom DVWA instance. Identified SQLi, XSS, and IDOR vulnerabilities with proof-of-concept exploits and remediation guidance.

OWASPSQLiXSSBurp Suite
View Repository

Malware Analysis Sandbox

Blue Team

Configured isolated FlareVM environment with automated YARA rule scanning. Performed static and dynamic analysis on ransomware samples documenting IOCs and C2 communication patterns.

YARAFlareVMWiresharkIOC
View Repository

Network Segmentation Lab

Infrastructure

Designed and implemented VLAN-based segmentation with pfSense. Applied zero-trust policies and validated isolation through cross-segment penetration testing.

pfSenseVLANsZero Trust
View Repository

Compliance Gap Analysis

GRC

Mapped organizational controls against NIST CSF and CIS Benchmarks. Produced risk-scored findings report with prioritized remediation roadmap for stakeholders.

NIST CSFCISRisk Assessment
View Repository

Security Roadmap

Certifications earned, in progress, and on the horizon.

CompTIA Certifications

Completed

Full CompTIA security track — from networking fundamentals through offensive testing and threat analysis.

Security+Network+CySA+PenTest+
Completed

Rapid7 Certifications

Completed

Certified across the Rapid7 Insight platform — vulnerability management, endpoint detection, and application security.

InsightVMInsightIDRInsightAppSec
Completed

Microsoft Fundamentals

Completed

Azure cloud, security/compliance, and AI fundamentals — demonstrating breadth across the Microsoft ecosystem.

AZ-900SC-900AI-900
Completed

Cloud & IT Foundations

Completed

Industry-recognized cloud and IT baseline certifications covering infrastructure, networking, and security principles.

AWS Cloud PractitionerGoogle IT SupportISC2 CC
Completed

RHCSA (Red Hat Certified System Administrator)

In Progress

Linux system administration — managing users, storage, networking, and security on RHEL environments.

2026

OSCP (OffSec PEN-200)

Planned

Hands-on penetration testing certification with a 24-hour practical exam. The gold standard for offensive security.

2026

Get in Touch

Committed to contributing meaningfully to cybersecurity teams where technical expertise and a security-first mindset drive organizational resilience. Open to opportunities in penetration testing, vulnerability management, threat analysis, and security research.

PGP Public Key

-----BEGIN PGP PUBLIC KEY BLOCK-----

mQINBGXXXXXBEACzxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
=XXXX
-----END PGP PUBLIC KEY BLOCK-----

Use this key to send me encrypted messages. Fingerprint verification available on request.