About Me

About Me

I’m James Ebiloma, an aspiring cybersecurity professional with a specific focus on OT/ICS security and SCADA systems. I’m passionate about protecting the industrial control systems that underpin critical infrastructure — from energy and water to manufacturing and transportation.

This website documents my journey into this specialised field: the projects I build, the research I conduct, and the knowledge I develop along the way.

Focus Area: OT/ICS & SCADA Security

My work centres on the unique cybersecurity challenges that arise when defending industrial control systems and operational technology environments. Unlike traditional IT security, OT security requires understanding both cyber threats and physical processes — and navigating the tension between security controls and operational availability.

Specific areas I’m developing expertise in include network security monitoring for industrial protocols (Modbus, DNP3, OPC UA, EtherNet/IP), threat modelling and risk assessment for industrial environments using IEC 62443 and MITRE ATT&CK for ICS, intrusion detection approaches designed for OT network traffic and process telemetry, IT/OT convergence security and the challenges of securing legacy industrial systems, and safety system integrity — ensuring Safety Instrumented Systems remain trustworthy.

Academic Goals

I am preparing to pursue an MSc in Cybersecurity with a research focus on OT/ICS security. My primary research interest is in developing more effective intrusion detection methods for industrial control systems — particularly approaches that combine network traffic analysis with awareness of the underlying physical process.

The projects and research documented on this site represent my self-directed preparation for graduate study and demonstrate my commitment to this specialisation.

Skills & Competencies

Industrial Protocols & Systems: Modbus/TCP, DNP3, OPC UA, EtherNet/IP, PLC programming concepts (Ladder Logic, IEC 61131-3), SCADA/HMI architecture, Purdue Model

Security Tools & Platforms: Wireshark, Zeek, Suricata, Security Onion, Nmap, Wazuh, Splunk, ELK Stack, Metasploit, Burp Suite

OT Security Frameworks: IEC 62443, NIST SP 800-82, MITRE ATT&CK for ICS, NERC CIP awareness, ISA/IEC standards

Lab & Simulation: GRFICSv2, OpenPLC, ScadaBR, ModRSSim2, VirtualBox/VMware virtualisation

Programming & Scripting: Python (including pymodbus, scapy), Bash, PowerShell, SQL

Operating Systems: Kali Linux, Ubuntu, Windows Server, Parrot OS

Networking: TCP/IP, network segmentation, firewall configuration, VPN, packet analysis, DNS, DHCP

Certifications

Update this table with your actual certifications and progress:

Certification Status
CompTIA Security+ ✅ Completed
CompTIA Network+ ✅ Completed
Google Cybersecurity Certificate ✅ Completed
CompTIA CySA+ 🔄 In Progress
ICS/SCADA Security (SANS ICS410 or equivalent) 📋 Planned
GICSP (Global Industrial Cyber Security Professional) 📋 Planned

What You’ll Find on This Site

Projects — Hands-on OT/ICS security work including home lab builds, vulnerability assessments of industrial protocols, threat modelling exercises, and network monitoring deployments for industrial environments.

Blog — Articles covering OT/ICS security concepts, tool tutorials, analysis of real-world ICS incidents, and reflections on my learning journey.

Research — Literature reviews, framework analyses, and exploratory research in areas I plan to pursue at the graduate level — building toward a strong foundation for MSc research.

For Admissions Teams & Internship Coordinators

This portfolio demonstrates my self-directed initiative in preparing for graduate study and professional practice in OT/ICS cybersecurity. Each project is documented with the methodology, tools, findings, and reflections that show not just what I did but how I think about security problems.

I’m eager to contribute to academic research environments and industry teams working on critical infrastructure protection. If you’d like to discuss my background or potential fit for your programme or organisation, please don’t hesitate to reach out.

Contact

I welcome conversations with researchers, practitioners, and fellow students working in OT/ICS security.