Olutayo (Tayo) Michael
Information Security Analyst
Motivated IT professional delivering expert knowledge and skills for complex, business critical Identity & Access Management, Governance and Security solutions/products by supporting customer's complete scope of a solution, from vendor-supplied products to customized applications with strong adherence to IT compliance in keeping data and network secured. Olutayo implements triad of security which is CIA in diverse ways to protect information and end users from every form of cyber & physical attacks. Also, has profound insight to layered security using reliable network devices at each layers in order to protect both data and the users, not excluding his ability with good security acumen. I have experience working with data from different category of industries e.g Entertainment, Finance, Law firm, Health Center, Schools, Aviation, Transportation etc.
**************@*****.*** 240-***-**** Williamsburg VA, United States linkedin.com/in/tayo-michael-itsec SKILLS/TOOLS
Firewall Configuration (Checkpoint, PaloAlto, FireEye), Forensic (TKT and Autopsy), AV Solution (Trend Micro and Sophos etc.), ZScaler and Malware Analysis
Operating System: Unix/Linux OS, Windows OS, Mac OS and Kali Linux Scripting Languages: Basic understanding of Python and Bash scripting for data analysis and visualization. Network Monitoring tools: IDS/IPS, Wireshark, Nessus, IDApro, OllyDbg, Nmap, Burp suite, Snort, Crowdstrike, PFsense, Metasploit, VMware, VPNs, Server Configuration, TCP/IP, DHCP, AD and DNS. Privilege Access Management (PAM): CyberArk and Thycotic Secret Server. SIEMS: Splunk, IBM QRadar, McAfee ESM, SumoLogic and RSA Web Application Development with WordPress, HTML, CSS, JavaScript, and Adobe Suite Experience with auditing, Policies for computing resources, backup systems, Risk assessment, and database management with program like MYSQL
WORK EXPERIENCE
05/2017 – Present
Security Analyst
Herjavec Group
Toronto, ON Canada
Developed a strategic plan for information security identifying security objectives, following industry best practices and regulatory requirements for companies and end users.
Deployed and maintained different SIEMs solutions including Splunk, RSA SA, IBM QRadar, SumoLogic and McAfee ESM. Resolved assigned tickets within an approved time-frame and updating tickets with notes on resolution. Followed an established process for the purposes of collecting relevant data and performing the necessary level of analysis/investigation on the collected data.
Trend, managed and tune security monitoring, policies and alerting solutions for standardized remediation against network or data attack.
Investigated IOCs and executed up-to-date knowledge of information technology related trends, external threats, current vulnerabilities, attacks, and countermeasures as they are published from organizations such as ICS-CERT. Provided security research, analysis and design for all client computing system and the network infrastructure. Conducted risk assessment of current computing environment and provides recommended actions in order to reduce the risk of loss to confidential data. Also engaged with best practices for Data Loss Prevention (DLP). Provided quick response during security incidence with timely disaster recovery and business continuity for business restoration. Managed and educated client about privileged access management tools like CyberArk etc. Achievements/Tasks
Page 2 of 3
WORK EXPERIENCE
08/2014 – 05/2017
Network Specialist
Fountium Inc
Toronto, ON Canada
Deployed IDS systems to protect global hosting facilities, along with the implementation of End point protection tools e.g Crowdstrike Falcon.
Monitored multiple security technologies to detect potential IT security events. Configured new computer systems for end users, and ensures that the Antivirus platform is properly maintained and that all enterprise computers and devices have proper protection, signatures, and revisions Developed, implemented, and operate access management technology and processes as part of an enterprise cyber security program. Managed and maintained a large number of network security appliances. Served as the major link between the end users and, IT engineering and security operations as a technical resource to implement resolution provided as a recommendation by ITSec.
Tested patches using virtualization platform, and installed tested patches as they are available for all required applications. Provided expert architecture advice and cyber security direction to the Enterprise Identity and Access Management System programs for organization/companies in the Greater Toronto area. Troubleshoot devices with connectivity issues. Examples are: routers, printers, computers etc. 01/2015 – 05/2015
Help Desk Specialist
Seneca College Newham Campus
Toronto, ON Canada
Developed new web platform on Wordpress and helped to install new applications. Provided technical assistance and support for incoming queries and issues related to computer systems, software, and hardware. Configured new system/computers for end users and install necessary applications/softwares with security in mind. Resolved technical problems with Local Area Networks (LAN), Wide Area Networks (WAN), and other systems. 04/2012 – 09/2013
Customer Service Representative
Rogers Communication
Toronto
Assisted in opening and maintaining customer accounts by recording account detail information on the company database. Ensured delivery of excellent customer service through fast and accurate processing of orders, communication, and coordinating with other departments to resolve inquiries.
Maintained financial accounts by processing customer adjustments. Handled complaints, provided appropriate solutions and alternatives within the time limits and follow up to ensure resolution. Responded to technical issues reported by the customer and helped to troubleshoot their device remotely. Managed large amounts of incoming calls.
Accepted payment information and other pertinent information such as addresses and phone numbers, and other sensitive information. Achievements/Tasks
Achievements/Tasks
Achievements/Tasks
Page 3 of 3
WORK EXPERIENCE
10/2009 – 01/2011
System Administrator/Web Developer
Xputer Technology
Setup and maintained users account for client staff. Also, installed and test computer-related equipments. Managed the configuration and operation of client-based computer operating systems. Monitored systems daily and respond immediately to security or usability concern that may arise. Updated system as soon as new version of OS and application software comes out onsite and remotely for our clients. Created and verified backups of data especially web-base database. Manage staff and user credentials and frameworks
Quickly arranged repair for hardware in occasion of hardware failure. Developed a brand new website for client with up-to-date applications been deployed as need be. EDUCATION
09/2013 – 04/2017
Informatics and Security (Bachelor of Technology)
Seneca College of Applied Arts and Technology
Toronto, ON Canada
PERSONAL PROJECTS
Comparison of Security Onions with Splunk (01/2016 – 04/2017) Configured two separate Systems with Security Onions and Splunk respectively to detect anomalies on both networks. In the case of Splunk-based system, splunk forwarder was deployed on each client machine with snort as IDS. Also, the universal forwarder was configured to send logs collected from IDS and system logs to the Indexer which was setup on another network. This project was carried out using different operating system (unix and Windows).
In the case of Security Onions, different IDS were configured to detect anomalies based on the set rules and policies. The collected data/logs were analyzed using Sguil and ELSA. Security Onion is a Linux distro for intrusion detection, network security monitoring, and log management. It contains Snort, Suricata, Bro, OSSEC, Sguil, ELSA and many other security tools. This project used pfsense as the firewall to control the traffic into and out each dedicated servers. The pfsense was also configured as the router. The aim of this project was in training security analyst on how to implement layered security and what to look for while collected data are being analyzed and investigated.
CERTIFICATES
CISSP - In progress
PROFESSIONAL MEMBERSHIP
ISSA - Information Systems Security Association ISACA - Information Systems Audit and Control Association
Achievements/Tasks