Skills Projects Lab Portfolio CTF Certifications Contact
Associate Member Candidate · ICDFA 2026

Dominique-Savio
Sakoi

Cybersecurity Engineer  ·  CTF Finalist  ·  Pentest Specialist_

I break systems professionally — then fix them better than they were. Third-year cybersecurity student and junior security engineer who finds elegance in a clean exploit chain and sleeps soundly knowing firewalls are watching. Currently defending networks at Miabé Innovation while studying full-time at IPNET. Introvert by nature, loud by exploit.

CTF Finalist · ANCy
5+
Certifications
25+
Lab Projects
3+
Years in Cybersecurity
CAPT
Certified Pentest Associate

What I Do

🔴
Penetration Testing
Methodical offensive security — from reconnaissance to post-exploitation. I find the holes before the adversaries do.
Kali Linux Metasploit Burp Suite Nmap OWASP ZAP
🔵
Network Defense
UTM deployment, firewall architecture, IDS/IPS configuration and VPN tunneling. Perimeter security that actually holds.
FortiGate OPNsense IDS/IPS VPN
🟢
SOC & Threat Monitoring
Proactive threat detection, SIEM workflows, log analysis. Because the best incident is the one you stopped before it started.
SIEM Wireshark Nessus OpenVAS
🪪
Identity & Access Mgmt
Active Directory hardening, GPO enforcement, privilege management. I've both attacked and defended AD forests — perspective matters.
Active Directory GPO IAM
🐧
Systems Administration
Linux/Windows server hardening, virtualization with VMware and Proxmox, scripting with Python for security automation.
Linux Windows Server VMware Python
📋
Governance & Reporting
Technical audit reports, security policy drafting, risk mitigation frameworks and team awareness training. Strategy meets execution.
Audit Reports Risk Management Security Policy

Work That Matters

PROJECT_01

Cyber-Système Nerveux Central

🧠 Autonomous Defense Platform

An immersive, autonomous cyber defense platform designed as a "central nervous system" for enterprise infrastructure — detecting, classifying and responding to threats in real time without constant human intervention.

  • Architected a multi-layer detection engine combining behavioral analysis and signature-based rules
  • Integrated automated incident response playbooks for common threat vectors
  • Built real-time threat visualization dashboard for SOC analyst workflow
  • Designed with scalability in mind: modular architecture for custom threat intel feeds
# Autonomous threat classification engine
def classify_threat(event_data):
  score = behavioral_analysis(event_data)
  if score > CRITICAL_THRESHOLD:
    return trigger_response("isolate")
PROJECT_02

Active Directory Fortress

🏛️ Full Infrastructure Hardening

End-to-end design, deployment and security testing of an enterprise Active Directory infrastructure — from initial forest architecture through attack simulation and remediation.

  • Designed complete AD forest with domain structure, OU hierarchy and trust relationships
  • Implemented 40+ Group Policy Objects covering workstation hardening and access controls
  • Conducted internal pentest: enumeration, Kerberoasting simulation, privilege escalation paths
  • Produced full audit report with remediation roadmap and priority risk matrix
# Internal recon — privilege escalation audit
Import-Module PowerView
Get-DomainUser -AdminCount 1 |
  Select-Object samaccountname, memberof
# Result: 3 misconfigured delegations found
PROJECT_03

UTM Deployment — JPOPE

🛡️ University Open Day Infrastructure

Designed and deployed a complete Unified Threat Management solution for IPNET's annual open day event, protecting live demonstrations and sensitive institutional infrastructure.

  • Deployed OPNsense + FortiGate in a layered defense architecture
  • Configured web filtering, SSL inspection and application-layer firewall rules
  • Ran live attack simulations to validate IDS/IPS detection accuracy
  • Documented full technical architecture and post-event security review
INITIATIVE

H1v3 Security

🐝 LinkedIn Cybersecurity Community

Founded H1v3 Security on LinkedIn as a platform for sharing practical cybersecurity knowledge, CTF writeups, threat intelligence insights and career guidance for emerging African security professionals.

  • Regular technical posts on offensive and defensive security techniques
  • CTF challenge writeups and methodology breakdowns
  • Community building across the West African security ecosystem
  • Focus on practical, hands-on learning over theoretical certification grinding

Lab Portfolio

25 hands-on cybersecurity projects spanning network defense, offensive operations, digital forensics, cloud security and AI-powered threat detection — each built and tested in an isolated environment.

// Showing all 25 projects
LAB_01
Network Security

Home Lab Setup

🏠 Virtualized Cyber Lab

Complete home cybersecurity lab with VLAN-segmented network, virtualized infrastructure (VMware/Proxmox) and isolated attack/defense environments for hands-on training.

VMwareProxmoxpfSenseKali LinuxVLANs
View Details →
LAB_02
Network Security

Firewall Configuration

🔥 Enterprise Perimeter Defense

Enterprise-grade firewall deployment with granular rule sets, QoS optimization, SSL inspection and compliance-ready audit logging for PCI-DSS and SOX environments.

pfSenseFortiGatePythonPCI-DSS
View Details →
LAB_03
Network Security

Wireshark Traffic Analysis

📡 Network Forensics Lab

Deep packet inspection and network traffic forensics with Wireshark, custom Python dissectors, automated anomaly detection and protocol analysis scripts.

WiresharkPythontcpdumpTshark
View Details →
LAB_04
Network Security

IDS/IPS Implementation

🛡️ Multilayer Intrusion Detection

Enterprise multi-layer IDS/IPS architecture with custom Snort/Suricata signatures, automated incident response playbooks and full SIEM integration.

SnortSuricataSIEMDocker
View Details →
LAB_05
Network Security

VPN Management System

🔐 Enterprise VPN Infrastructure

Comprehensive VPN management with automated PKI certificate lifecycle, OpenVPN/IPSec dual-stack support, Ansible-driven deployment and compliance monitoring.

OpenVPNIPSecAnsiblePKI
View Details →
LAB_06
Network Security

Secure Network Design

⬡ Zero Trust Architecture

Enterprise Zero Trust network with microsegmentation, Network Access Control (NAC), automated policy enforcement and full visibility via GNS3/Terraform IaC.

Zero TrustVLANNACTerraform
View Details →
LAB_07
Network Security

Wireless Security

📡 WPA3 Enterprise Deployment

Enterprise WiFi security with WPA3 implementation, 802.1X/RADIUS authentication, wireless intrusion detection and PCI-DSS-compliant guest network isolation.

WPA3802.1XRADIUSWIDS
View Details →
LAB_08
Identity & Access

Identity & Access Management

🪪 Zero Trust IAM Platform

Full enterprise IAM solution with Active Directory, SSO (SAML 2.0/OAuth 2.0), MFA, Privileged Access Management and automated Zero Trust compliance frameworks.

Active DirectorySAML 2.0OAuthMFAKeycloak
View Details →
LAB_09
Cloud Security

Cloud Security Governance

☁ Multi-Cloud CSPM

Multi-cloud security governance with policy-as-code, automated compliance scanning, Cloud Security Posture Management (CSPM) across AWS, Azure and GCP.

AWSAzureGCPTerraformCSPM
View Details →
LAB_10
Threat Intelligence

Threat Intelligence Platform

🎯 CTI Aggregation & Analysis

Enterprise CTI platform aggregating multiple threat feeds with STIX/TAXII standards, ML-powered classification and automated threat hunting capabilities.

STIX/TAXIIMISPPythonMLElasticsearch
View Details →
LAB_11
Forensics

Malware Analysis Sandbox

🦠 Behavioral Analysis Lab

Isolated sandbox for comprehensive malware analysis — static, dynamic and behavioral — with YARA rule authoring, automated sandboxing and threat intel correlation.

CuckooYARAIDA ProDocker
View Details →
LAB_12
Offensive Security

Penetration Testing Framework

⚔ OWASP/PTES Methodology

Structured penetration testing framework following OWASP, PTES and NIST standards — covering web, network, wireless and mobile with automated professional reporting.

MetasploitNmapBurp SuiteOWASP
View Details →
LAB_13
Web Security

Web Application Security

🌐 OWASP Top 10 Testing

Complete web app security testing framework covering OWASP Top 10 2021 and ASVS 4.0 with automated scanning, manual exploitation and professional reporting.

OWASP Top 10Burp SuiteSQLMapASVS
View Details →
LAB_14
Forensics & DFIR

Digital Forensics & IR

🔬 NIST/SANS DFIR Framework

End-to-end DFIR framework following NIST SP 800-86 and SANS methodology for evidence acquisition, timeline reconstruction and legally admissible incident reporting.

AutopsyVolatilityPythonNIST
View Details →
LAB_15
Offensive Security

Red Team Operations

🎭 APT Simulation Framework

Advanced red team framework simulating nation-state APT campaigns with C2 infrastructure, lateral movement techniques and comprehensive MITRE ATT&CK coverage.

C2 FrameworkMITRE ATT&CKOPSECPython
View Details →
LAB_16
Offensive Security

Exploit Development

💥 Binary Exploitation Lab

Custom exploit development covering stack-based buffer overflow, heap exploitation, ROP chain construction, ASLR/DEP bypass and weaponized payload creation from scratch.

GDB/PWNDBGPythonAssemblyROP Chains
View Details →
LAB_17
Offensive Security

Social Engineering Simulation

🎣 Human Vulnerability Testing

Comprehensive social engineering simulation with phishing campaigns, vishing scenarios, pretexting playbooks and measurable security awareness impact analysis.

GoPhishSETOSINTPython
View Details →
LAB_18
Offensive Security

Password Cracking & Analysis

🔑 Credential Security Audit

GPU-accelerated password security audit suite with Hashcat/JtR, custom wordlists, rule-based mask attacks, hash identification and policy compliance testing.

HashcatJohn the RipperGPUPython
View Details →
LAB_19
Forensics

Forensic Analysis Toolkit

🔍 Multi-Vector Investigation Suite

Modular forensic toolkit covering disk, memory, network and mobile forensics with timeline analysis, AI-powered artifact correlation and automated reporting.

PythonVolatilityNetworkMinerELK
View Details →
LAB_20
Threat Intelligence

Threat Hunting SOC

🎯 Proactive APT Detection

Advanced SOC platform with proactive threat hunting, ML-powered behavioral analytics, Sigma rule deployment and orchestrated SOAR incident response workflows.

ELK StackSigma RulesMLSOAR
View Details →
LAB_21
AI Security

AI-Powered Cybersecurity

🤖 ML Threat Detection Platform

AI/ML cybersecurity platform with deep learning anomaly detection, NLP-powered log analysis, automated threat intel extraction and predictive security analytics.

TensorFlowNLPPythonFastAPI
View Details →
LAB_22
Blockchain Security

Blockchain Security Forensics

🔗 Crypto Investigation Platform

Blockchain security and crypto forensics with transaction graph analysis, smart contract vulnerability auditing (Slither/Mythril) and DeFi threat monitoring.

Web3EthereumPythonSlither
View Details →
LAB_23
Web Security

Bug Bounty Platform

🐛 Automated Vuln Discovery

Automated vulnerability discovery platform combining intelligent recon, Nuclei-powered scanning and structured bug bounty program management workflows.

NucleiSubfinderOWASP ZAPDocker
View Details →
LAB_24
DevSecOps

DevSecOps Pipeline Security

🔄 Shift-Left Security CI/CD

Complete DevSecOps pipeline with integrated SAST/DAST analysis, container security scanning, dependency auditing and automated compliance enforcement across CI/CD.

JenkinsGitLab CISAST/DASTKubernetes
View Details →
LAB_25
AI Security

IoT / AI Security Platform

🏭 Industrial IoT Defense

Industrial IoT security platform with digital twin simulation, explainable AI (XAI) anomaly detection, global orchestration and immersive VR/AR security training interfaces.

XAIDigital TwinIoT SecurityVR/AR
View Details →

CTF Palmarès

🏆 National Finalist · 2024
ANCy CTF Championship
Reached the national finals of the Capture The Flag competition organized by Togo's Agence Nationale de la Cybersécurité — competing against the country's top security talents across offensive, defensive and forensics challenges.
🏆 National Finalist · 2025
ANCy CTF Championship
Back-to-back national finalist — demonstrating consistent elite-level performance. Led technical strategy within the team, specializing in binary exploitation, web vulnerabilities and network forensics challenges.
💬
"Reaching the national finals of the ANCy CTF — twice — is not a certification you can study for. It's proof that under pressure, against real adversaries, the skills hold. Every flag captured is a real-world vulnerability understood."
⚙️ Technical Lead
Team Security Strategy
Coordinated attack strategies across CTF categories — assigning challenges by team member strengths, maintaining time discipline under competition pressure, and leading post-round debrief sessions. Security is a team sport.

Certification Timeline

DEC 2023
FCF — Threat Landscape 2.0
Fortinet Training Institute
✓ Completed
JAN 2024
FCA — FortiGate 7.4 Operator
Fortinet Training Institute
✓ Completed
JAN 2024
Cybersecurity Essentials
Cisco Networking Academy
✓ Completed
FEB 2024
Networking Essentials
Cisco Networking Academy
✓ Completed
MAR 2024
NDG Linux Essentials
Cisco Networking Academy
✓ Completed
FEB 2026
CAPT — Certified Associate Penetration Tester
Hackviser · ID: HV-CAPT-EU6L19L7
✓ Completed
IN PROGRESS
CWSE — Certified Web Security Expert
Hackviser
⟳ In Progress
TARGET 2026
eJPT — eLearnSecurity Junior Penetration Tester
INE Security
◯ Planned
TARGET 2027
OSCP — Offensive Security Certified Professional
Offensive Security
◯ Planned

🎓 ICDFA Associate Member Candidacy

This portfolio was assembled in support of my application to the International Cybersecurity & Digital Forensics Academy at the Associate Member grade — recognizing early-career professionals with foundational knowledge and demonstrated industry impact.

My profile bridges the gap between academic training and real-world security operations: I've deployed live infrastructure, competed nationally, earned hands-on certifications and actively contribute to the security community through H1v3 Security.

Applying for grade: ASSOCIATE MEMBER (AM) — up to 3 years experience track

Let's Connect

Whether you're a recruiter, a fellow security researcher, or just curious about what goes on behind the firewall — I'm reachable. Preferably through secure channels, obviously.

🛡️ H1v3 Security

Follow along on LinkedIn for CTF writeups, threat analysis breakdowns, and practical security tips from the field — no fluff, no paywalls, just craft.

Follow H1v3 Security →