Dennis K. Anaafi | Cybersecurity
Welcome, I'm Dennis Kojo
Anaafi,
Cyber Security & Automation Expert
Specializing in Professional Cybersecurity Operations, SOC Analysis, and Security Automation. I focus on building robust cyber defense systems and automated security workflows to protect operational environments.
00
Projects Completed
SOC homelab, automation workflows, and security platforms built from the ground up
00
Certifications
Verified professional credentials in cybersecurity and ongoing specializations.
00+
Lab Hours
Hands-on experience with SIEM, network segmentation, and security automation
About Me
Dennis Kojo Anaafi: Bridging
Cyber Security and Ops
I'm a cybersecurity enthusiast with a strong foundation in cyber security fundamentals, hands-on operational experience, and a growing focus on SOC analysis and automation. As Dennis Kojo Anaafi, I started my journey in physical security and transitioned into high-level cybersecurity engineering. My specialization in automation, detection, and cyber defense allows me to build resilient security infrastructures.
SOC Operations & SIEM
Python & Automation
Physical Security Systems
Network Security & pfSense
My Resume
Professional Experience
Graduate Trainee, Security Systems & Automation
Perseus Mining Ghana Limited (PMGL) | Security Department (Oct 2024 – Oct 2025)Worked across software development and security operations in a regulated mining environment. Designed and built internal Python (Django) applications backed by PostgreSQL to automate manual site access requests and documentation workflows, improving auditability, access control, and data integrity. Supported biometric enrollment, access provisioning, CCTV monitoring, and incident investigations using system logs and surveillance data. Contributed to digitizing security workflows, strengthening accountability, response time, and audit readiness through structured reporting and process improvement.
National Service Personnel, Security Operations & Technology
Perseus Mining Ghana Limited (PMGL) | Security Department (Oct 2023 – Oct 2024)Supported day-to-day security operations while contributing to technology-driven process improvements. Built a Python (Django) and PostgreSQL web application to digitize the auctioning of obsolete vehicles, replacing a manual process and improving transparency, fairness, and fraud prevention. Assisted with CCTV installation and configuration, including PTZ, thermal, and dome cameras, and supported incident monitoring and reporting. Contributed to network and fiber infrastructure work to ensure reliable connectivity for security systems and monitoring platforms.
E-ICT Instructor (Internship)
Assin North Senior Technical School (Nov 2022 – Apr 2023)Developed and maintained a web-based mock examination platform using PHP, HTML/CSS, and MySQL to digitize student assessments and automate result tracking. Supported computer lab operations, system troubleshooting, and basic network setup to improve system availability and reliability. Assisted with IT asset maintenance and provided technical support to ensure smooth daily academic activities.
My Skill
My Specializations
00%
SIEM & Alert Triage (Wazuh)
00%
Incident Handling & Investigation
00%
Security Automation (Python)
00%
Access Control & Identity Management
00%
Secure Application Development
00%
Risk, Audits & Compliance Support
PORTFOLIO
Featured Portfolio
Cybersecurity
Education & Professional Development
BSc. Information & Communications Technology
University of Education, Winneba (Ghana)Strong foundation in software development, computer networks, databases, and information systems. Gained hands-on experience building backend and web applications, working with Python, SQL, and modern development frameworks. Developed early interest in system security, secure design, and the intersection between software engineering and operational resilience.
Google Cybersecurity Professional Certificate
Security Fundamentals, SOC & Incident ResponseCovered core cybersecurity concepts including threat detection, incident handling, SIEM fundamentals, network security, and risk management. Built practical understanding of SOC workflows, alert triage, logging, and investigation processes, with an emphasis on real-world operational security.
Google IT Support Professional Certificate
Coursera | IT Operations & TroubleshootingCovered core IT support fundamentals including operating systems, networking, system administration, troubleshooting methodologies, and user support. Built a strong foundation in understanding how endpoints, networks, and services fail in real environments, supporting effective incident response, monitoring, and operational resilience.
SAL1 – Security Analyst Level 1
Foundational SOC & Security Operations TrainingEntry-level security analyst training focused on SOC workflows, alert triage, log analysis, incident handling, and foundational threat detection concepts. Emphasis on building practical analyst skills for real-world security monitoring and response environments.
Cybersecurity Job Simulation
Mastercard | ForageCompleted practical cybersecurity simulation tasks including designing a phishing email simulation and interpreting phishing simulation results. Focused on understanding user behavior, measuring exposure to social engineering attacks, and supporting risk reduction through awareness and analysis.
Shields Up: Cybersecurity Job Simulation
AIG | ForageCompleted hands-on cybersecurity simulation tasks including responding to a zero-day vulnerability and technically bypassing ransomware in a controlled environment. Focused on incident response, vulnerability remediation, and understanding attacker techniques from a defensive perspective.
Latest Insights
Featured Blog Posts
Explore cybersecurity tutorials, career insights, and technical deep-dives from my journey in security operations.
Typosquatting: The Invisible Trap You Click Without Noticing
Typosquatting is a common social engineering technique where attackers create fake domains that closely resemble legitimate ones. Learn the different …
Read MoreEmail Tracking Pixels Explained: How Emails Track You
Most emails don’t just deliver messages, they quietly track you. This post explains how tracking pixels work in emails and …
Read MoreUnderstanding MITRE Frameworks: ATT&CK, CAR, and D3FEND Explained
An introduction to MITRE’s cybersecurity frameworks, focusing on ATT&CK, the Cyber Analytics Repository (CAR), and D3FEND, and how they support …
Read More