| 20,000+ Fresh Resumes Monthly | |
|
|
| | Click here or scroll down to respond to this candidateCandidate's Name
Street Address PHONE NUMBER AVAILABLEEMAIL AVAILABLE LINKEDIN LINK AVAILABLE www.forumine.com/blogCYBER SECURITY ENGINEERCertified security specialist with experience and expertise in designing, implementing, and troubleshooting network infrastructure and security. Proven record of evaluating system vulnerability to recommend security improvements, redundancy and efficiency within a security conscious environment.Able to work independently or within a group on large-scale projects and thrive under pressure in fast-pace environment. Possess excellent track record of accomplishments in Information Technology, Cyber security, Business optimization, network security, Technical operations and ability to learn and adapt to any programming language, security analysis software or hardware platform easily and efficiently.EXPERIENCEJuly 2017 PresentSECURITY OPERATIONS SPECIALIST, JPMORGAN CHASE & CO.Monitor system information security architecture, design, installation, operational planning and risk remediation by routinely performing active/passive cyber red teaming and blue teaming assessments, creating an active layered security environmentTriage network incidents, proper analysis, audits and documentation, conduct a vulnerability assessment and analysis using commercial-off-the-shelf tools or customized assessment products and Government Furnished Equipment reducing attack surface and digital footprintsProvides in-depth analysis of vulnerabilities, threats, designs, procedures and architectural design with focus on recommendations for enhancements or remediation with skill in using common open-source penetration testing tools including Kali Linux tool suite and scriptsFebruary 2015 October 2017CUSTOMER SECURITY ENGINEER, NCR CORPORATIONEnforce latest security management practices for Routers, Firewalls switches, servers, load balancers, WAFs, Surveillance systems, and host/client network devices for financial, retail and government agencies across AmericaPerform upgrades, Patch management, and remote imaging using various network protocols: TCP/IP, SMB, RDP, SSH for reducing attack surface of web facing interfacesSecurity awareness training and presentation for clients including troubleshooting of network devices, services/protocols, applications and methodologies while prioritizing securityMay 2013 January 2015JUNIOR SECURITY ANALYST, PETROLAGE GROUPLeverage security infrastructure technology to develop, adjust and redesign technology solutionsExperience using network/host intrusion detection/prevention tools and risk mitigation strategiesEnsure high confidentiality, Integrity and availability, optimized network uptime using load balancing technique, ticketing and monitoring system as well as SIEM tools.EDUCATIONAugust 2018Associate of Science (A.S) - Network Security, Columbus State Community CollegeCourse work - Cisco Routing &Switching, Network security, Linux, Programming, Agile, ForensicsDeans List, all semesters.September 2014Bachelor of Science (B.Sc.) Physics & Mathematics, Olabisi Onabanjo UniversityCourse work Computer programming, Data structure/Algorithm, Statistics, System AnalysisVice President, National Association of Physics StudentsSKILLSUsage of troubleshooting toolsScripting and code executionIDS/IPS methodsData gathering and interpretationLog analysisExperience with Monitoring systems, SIEM products, RDBMS, cloud providers and APIsConfiguration and patch managementDocumentation and reportNetwork/cyber security policy enforcementCERTIFICATIONS & ACCOMPLISHMENTSCompTIA Security+ CertificationSecurity awareness JP Morgan & ChaseProject Management Rise GroupCyber security for Technicians NCRTECHNICAL SKILLSOperating System: Microsoft Suite & Microsoft Server Administration, Windows, Linux, Mac and mobileTools: Shell scripts, Burp Suite, Perl, Python, Splunk, Nessus, Qradar, Nmap, Ticketing systemsTechniques: Defense, Detection, threat/vulnerability assessment, forensics, management, reportCompliance framework: NIST, ISO27001, HIPAA, OWASP, COBIT, GDPR, PCI DSS, SOXFamiliar terminologies: Redundancy, RCA, LDAP, cryptography, WAF, VPN, RSA, SQL, SSH Firewall, SSO, Cloud computing, risk mitigation, Layered security, UTM, ports, access control, Active Directory, Cisco Routing and Switching, Network Mapping & Vulnerability scans, Protocol analysis, Agile methodologies, AWS, SIEM, and Virtualization |