| 20,000+ Fresh Resumes Monthly | |
|
|
| | Click here or scroll down to respond to this candidateCandidate's Name
Street Address
Email: EMAIL AVAILABLE Phone: PHONE NUMBER AVAILABLE PROFESSIONAL PROFILEIT Cybersecurity Analyst and Solution Architect with over 5 years of experience performing research, analysis, and troubleshooting to identify, resolve, and remediate security issues and findings within the enterpriseCybersecurity, Incident Management, and IT compliance support across the Enterprise InfrastructureCybersecurity capabilities and risk management protect the network and IT systems against cyber-attacks and malicious intrusion.Security policy interpretation and implementation requirements ensure confidentiality, integrity, information, systems, and network availability.Highly motivated, organized, and results and detail-oriented with excellent interpersonal, communication, and presentation skillsAWS cloud security, orchestrations, design, and support, Cloud Virtual environment design and implementationStrong system analysis skills to be able to identify and quickly resolve issuesMaintained high availability clustered and standalone server environments and refined automation components with scripting and configuration managementIn-depth knowledge of AWS cloud services like Compute, Network, Storage, and Identity & Access Management.Possessed a unique combination of technical abilities, communication skills, and the ability to multitask that allow me to collaborate with end-users or business TECHNICAL SKILLSSecurity Technologies: Nessus Security Center, Nmap, Wireshark, IDS/IPS; Log Management, Anti-Virus Tools; (Norton, Symantec).Application: MS Office (Word, Excel, Outlook, PowerPoint, Access); Wireshark, NMAP, Nessus, ArcSight, SharePoint, STIGs, and SCAPOperating Systems: Unix-Based Systems (Linux); Windows.Software: MS Office (Word, Excel, Outlook, Access, PowerPoint)Ticket Systems: ServiceNow, RemedyEMPLOYMENT HISTORYInformation Security Analyst 08/2020 PresentAlpha Technology Group, MDResponsibilities:Provides high-level analysis of security data to identify significant activityPerforms vulnerability scanning with Nessus to detect potential risks on single or multiple assets across the enterprise networkArchitecting, building, and maintaining cost-efficient, scalable cloud environments for the organization.Migrate archaic systems into the cloud for more efficiency within the organization aka digital transformation.Keeping cloud environments secure and preventing downtime or security breaches.Determine the risk associated with third-party platforms or frameworks.Design, build, and maintain internal cloud applications for the organization.Transfer data and internal processes to cloud architecture.Keep up to date on best practices in cloud computing and making improvements to the cloud infrastructure of their company or organization.Communicating with internal teams, like Sales, Operations, and IT.Communicate with stakeholders and build applications to meet project needs.Makes hardware and software recommendations for the organization based on the needs of the project and organization.Develops, coordinates, implements, and maintains standards and procedures to protect information systems and data security and integrityObserve and analyze traffic to learn valuable lessons from known malicious actors and determine countermeasures against such threats.Provides detailed status updates on existing cybersecurity incidents daily to follow up with clients/customers to ensure satisfactory resolutionDevelops risk assessment reports, identifying threats and vulnerabilities applicable to the systemEvaluate the likelihood that vulnerabilities would be exploited and assess the impact of this threat and vulnerabilities.Conducts security control Assessment to assess the adequacy of Management, operational, privacy, and technical security controls implementedPerforms system risk management following the NIST risk management frameworkCreates Root Cause Analysis (RCA) when required and Performs mitigation required to protect critical resourcesPerforms incident response to investigate and resolve computer security incidentsDevelop follow-up action plans to resolve reportable issues and communicate with other Analysts to address security threats and incidents.Analyze, investigate, and process Malicious/Phishing Email alerts from IronPort and FireEye following standard operating procedures.Contributes to security strategy and security posture by identifying security gaps, evaluating and implementing enhancementsSupport Incident Response (IR) when analysis confirms actionable incidentManage the AWS infrastructure and strategic vendor relationships, including development firms.Collaborates with the security team to design and manage IAM roles for users, vendors, and other third-party vendorsPartner with the sales team, formulate and execute a sales strategy to exceed revenue objectives through the adoption of AWS.Built and oversaw network infrastructure comprised of various virtual products.Responsible for ensuring Systems & Network Security, maintaining performance, and setting up monitoring using Cloud WatchWork with business units, software developers, and security to design and build applications and services within AWS and other cloud providers.Provide daily monitoring, Management, troubleshooting, and issue resolution to systems and services hosted on cloud resources.Information/Cybersecurity Analyst 09/2017 07/2020 West4th Strategy Consulting, VAResponsibilities:Developed, coordinated, implemented, and maintained standards and procedures to protect information systems and data security and integrityLeveraged Nessus to identify systems compliance risk levels, identify non-compliance issues and security vulnerabilities, and manage remediation activities.Provided support and security overview on cloud-based solutions implementation, including private, community, hybrid, and public cloud deployment models.Managed the remediations of security issues and findings across the enterpriseCreates, evaluates, and interprets internal and external information security policies and standards and participates in information security decision-making.Managed the development and delivery of Information Security Education and AwarenessCoordinates with vendors and third parties to manage information security risksProvided daily status updates on existing cybersecurity incidents to follow up with clients/customers to ensure satisfactory resolution.Developed risk assessment reports, identifying threats and vulnerabilities applicable to the system.Conducts security control Assessments to assess the adequacy of implemented Management, operational, privacy, and technical security controls.Manages enterprise system security plan, Risk assessment, and Privacy policies developmentConduct incident response to investigate and resolve computer security incidents.Develops follow-up action plans to resolve reportable issues and communicate with other Analysts to address security threats and incidents.Managed, prioritized, and differentiate between potential intrusion attempts and false positive alertsAssisted in developing processes and procedures to improve incident response and analysisManages information security risk assessment and research and recommends remediation plans and strategies.Provides strategic consulting on security risk assessment, analysis, and compliance and recommends remediation plans and strategiesEDUCATION AND BACKGROUNDBachelor of Science: in Economics May 2006University of Ibadan, NigeriaMEMBERSHIP & CERTIFICATIONSAWS Solutions Architect - Associate 2023CompTIA Security+ 2023REFEREEUpon request |