OKWUDILI KEVIN
Pikesville
An enthusiastic Cyber Security Analyst with broad knowledge in design,monitoring and analysis of network
events.I am highly motivated individual able to work independently and in team.Have implemented and monitored
diverse security implementations.
7412 Kathydale Road,
SUMMARY
SKILLS
EXPERIENCE
05/2016 to Current
10/2014 to 11/2015
IKE, MD 21208 C: 443-***-**** ac4zpa@r.postjobfree.com
Tools:MBSA,Nmap,Zenmap,Nessus,Openvas,Wireshark,OSSIM-
Alienvault,DLP-CuSpider DLP,Snort,Security
Onion,Scanline,Emet,Splunk,Kali Linux.
Operating System:Windows (Desktop/Server OS),Unix,
Linux,Windows Active Directory.
Knowledge:DNS,DHCP,TCP/IP Models,Firewalls,ITSM ticket
monitoring systems,IDS(HIDS/NIDS)IPS
(HIPS/NIPS),Vulnerability Management and System
Development Life Cycle(SDLC),RMF/NIST Special Publications
Security Analyst
Visual Eyes Mitchellville, MD
Perform security monitoring/analysis of network to resolve generated events and
incidents
Design and perform routine/adhoc vulnerability scans/accessment of network resources
Work with internal teams on disaster recovery and business continuity planning
Review and analyze assessment reports for patch management prioritization
Monitor desktop computing environment for known security events
Collaborate with network administrators to troubleshoot and resolve security incidents
Audit application logs to establish security trends for incident review and root cause
analysis
Ensure all end users issues are properly handled,addressed and documented in a timely
fashion
Resolve security issues following the best company/industry practice
Act as the liaison between departmental groups on information security issues
Document results and present findings to technical/management staff alike
Help in developing mitigation/remediation strategies and implement controls to minimize
risks
Develop security tools and training programs for end users on all networked systems
Information Security Professional
Ministry of Local Govt/Rural Development Owerri, Nigeria
Reviewed the operational procedure of use of network assets-user management
Reviewed the network architecture of the Ministry to ascertain compliance and
EDUCATION AND TRAINING
1989
1995
REFERENCES
effectiveness
Reviewed and analyzed audit evidences and documented processes/procedures
Analyzed and documented physical access controls of network resources
Reviewed environmental security,conditions and available emergency procedures
Conducted review of segregation of duties to ensure privileges of roles/duties are
consistent with policy guidelines
Helped to establish annual internal audit prior to systems audit for compliance
Examined the audit trail to review access,user activites,failed login/logout attempts
Reviewed and evaluated business continuity plans of the organisation
Ensured audit tasks are completed accurately and timely
Utilized available tools to track,record and transfer request orders/incidents
Ensured constant monitoring of OS and applications for proper functioning and
configuration
Worked collaboratively with staff/vendors to ensure protection of assets
Fostered security consciousness amongst staff and ensured training programs
Bachelor of Arts: Government/Ed
University of Nigeria, Nsukka, Nsukka, EN, Nigeria
Master of Science: International Affairs/Diplomacy
Abia State University, Uturu, Abia, Nigeria
Available upon request