Post Job Free

Resume

Sign in

Security Customer Service

Location:
Williamsburg, VA
Posted:
April 05, 2019

Contact this candidate

Resume:

Page * of *

Olutayo (Tayo) Michael

Information Security Analyst

Motivated IT professional delivering expert knowledge and skills for complex, business critical Identity & Access Management, Governance and Security solutions/products by supporting customer's complete scope of a solution, from vendor-supplied products to customized applications with strong adherence to IT compliance in keeping data and network secured. Olutayo implements triad of security which is CIA in diverse ways to protect information and end users from every form of cyber & physical attacks. Also, has profound insight to layered security using reliable network devices at each layers in order to protect both data and the users, not excluding his ability with good security acumen. I have experience working with data from different category of industries e.g Entertainment, Finance, Law firm, Health Center, Schools, Aviation, Transportation etc.

ac80lx@r.postjobfree.com 240-***-**** Williamsburg VA, United States linkedin.com/in/tayo-michael-itsec SKILLS/TOOLS

Firewall Configuration (Checkpoint, PaloAlto, FireEye), Forensic (TKT and Autopsy), AV Solution (Trend Micro and Sophos etc.), ZScaler and Malware Analysis

Operating System: Unix/Linux OS, Windows OS, Mac OS and Kali Linux Scripting Languages: Basic understanding of Python and Bash scripting for data analysis and visualization. Network Monitoring tools: IDS/IPS, Wireshark, Nessus, IDApro, OllyDbg, Nmap, Burp suite, Snort, Crowdstrike, PFsense, Metasploit, VMware, VPNs, Server Configuration, TCP/IP, DHCP, AD and DNS. Privilege Access Management (PAM): CyberArk and Thycotic Secret Server. SIEMS: Splunk, IBM QRadar, McAfee ESM, SumoLogic and RSA Web Application Development with WordPress, HTML, CSS, JavaScript, and Adobe Suite Experience with auditing, Policies for computing resources, backup systems, Risk assessment, and database management with program like MYSQL

WORK EXPERIENCE

05/2017 – Present

Security Analyst

Herjavec Group

Toronto, ON Canada

Developed a strategic plan for information security identifying security objectives, following industry best practices and regulatory requirements for companies and end users.

Deployed and maintained different SIEMs solutions including Splunk, RSA SA, IBM QRadar, SumoLogic and McAfee ESM. Resolved assigned tickets within an approved time-frame and updating tickets with notes on resolution. Followed an established process for the purposes of collecting relevant data and performing the necessary level of analysis/investigation on the collected data.

Trend, managed and tune security monitoring, policies and alerting solutions for standardized remediation against network or data attack.

Investigated IOCs and executed up-to-date knowledge of information technology related trends, external threats, current vulnerabilities, attacks, and countermeasures as they are published from organizations such as ICS-CERT. Provided security research, analysis and design for all client computing system and the network infrastructure. Conducted risk assessment of current computing environment and provides recommended actions in order to reduce the risk of loss to confidential data. Also engaged with best practices for Data Loss Prevention (DLP). Provided quick response during security incidence with timely disaster recovery and business continuity for business restoration. Managed and educated client about privileged access management tools like CyberArk etc. Achievements/Tasks

Page 2 of 3

WORK EXPERIENCE

08/2014 – 05/2017

Network Specialist

Fountium Inc

Toronto, ON Canada

Deployed IDS systems to protect global hosting facilities, along with the implementation of End point protection tools e.g Crowdstrike Falcon.

Monitored multiple security technologies to detect potential IT security events. Configured new computer systems for end users, and ensures that the Antivirus platform is properly maintained and that all enterprise computers and devices have proper protection, signatures, and revisions Developed, implemented, and operate access management technology and processes as part of an enterprise cyber security program. Managed and maintained a large number of network security appliances. Served as the major link between the end users and, IT engineering and security operations as a technical resource to implement resolution provided as a recommendation by ITSec.

Tested patches using virtualization platform, and installed tested patches as they are available for all required applications. Provided expert architecture advice and cyber security direction to the Enterprise Identity and Access Management System programs for organization/companies in the Greater Toronto area. Troubleshoot devices with connectivity issues. Examples are: routers, printers, computers etc. 01/2015 – 05/2015

Help Desk Specialist

Seneca College Newham Campus

Toronto, ON Canada

Developed new web platform on Wordpress and helped to install new applications. Provided technical assistance and support for incoming queries and issues related to computer systems, software, and hardware. Configured new system/computers for end users and install necessary applications/softwares with security in mind. Resolved technical problems with Local Area Networks (LAN), Wide Area Networks (WAN), and other systems. 04/2012 – 09/2013

Customer Service Representative

Rogers Communication

Toronto

Assisted in opening and maintaining customer accounts by recording account detail information on the company database. Ensured delivery of excellent customer service through fast and accurate processing of orders, communication, and coordinating with other departments to resolve inquiries.

Maintained financial accounts by processing customer adjustments. Handled complaints, provided appropriate solutions and alternatives within the time limits and follow up to ensure resolution. Responded to technical issues reported by the customer and helped to troubleshoot their device remotely. Managed large amounts of incoming calls.

Accepted payment information and other pertinent information such as addresses and phone numbers, and other sensitive information. Achievements/Tasks

Achievements/Tasks

Achievements/Tasks

Page 3 of 3

WORK EXPERIENCE

10/2009 – 01/2011

System Administrator/Web Developer

Xputer Technology

Setup and maintained users account for client staff. Also, installed and test computer-related equipments. Managed the configuration and operation of client-based computer operating systems. Monitored systems daily and respond immediately to security or usability concern that may arise. Updated system as soon as new version of OS and application software comes out onsite and remotely for our clients. Created and verified backups of data especially web-base database. Manage staff and user credentials and frameworks

Quickly arranged repair for hardware in occasion of hardware failure. Developed a brand new website for client with up-to-date applications been deployed as need be. EDUCATION

09/2013 – 04/2017

Informatics and Security (Bachelor of Technology)

Seneca College of Applied Arts and Technology

Toronto, ON Canada

PERSONAL PROJECTS

Comparison of Security Onions with Splunk (01/2016 – 04/2017) Configured two separate Systems with Security Onions and Splunk respectively to detect anomalies on both networks. In the case of Splunk-based system, splunk forwarder was deployed on each client machine with snort as IDS. Also, the universal forwarder was configured to send logs collected from IDS and system logs to the Indexer which was setup on another network. This project was carried out using different operating system (unix and Windows).

In the case of Security Onions, different IDS were configured to detect anomalies based on the set rules and policies. The collected data/logs were analyzed using Sguil and ELSA. Security Onion is a Linux distro for intrusion detection, network security monitoring, and log management. It contains Snort, Suricata, Bro, OSSEC, Sguil, ELSA and many other security tools. This project used pfsense as the firewall to control the traffic into and out each dedicated servers. The pfsense was also configured as the router. The aim of this project was in training security analyst on how to implement layered security and what to look for while collected data are being analyzed and investigated.

CERTIFICATES

CISSP - In progress

PROFESSIONAL MEMBERSHIP

ISSA - Information Systems Security Association ISACA - Information Systems Audit and Control Association

Achievements/Tasks



Contact this candidate