Post Job Free

Resume

Sign in

Information Technology Security

Location:
Baltimore, MD
Posted:
November 18, 2023

Contact this candidate

Resume:

Adeshina Bright Adebayo

*** ******** ****** *********, ** 21787 410-***-**** ad09vs@r.postjobfree.com

Information Technology & Security Specialist

Strategic Business Solutions Security Infrastructure Risk Assessment.

Versatile and resourceful information technology professional in technical of network, systems, and security with development of strategic business solutions to optimize information security. Proactive and creative problem solver with Security+, CEH, and CHFI Certification, and demonstrated success in implementation of protection procedures for system security, penetration tests, and vulnerability assessments to maintain and backup key security systems. Collaborative and client-focused with excellent communication and interpersonal skills to build rapport with clients, staff, and key stakeholders to ensure positive customer relations with excellent service.

Core Competencies

Information Security System Security Infrastructure: IPS, IDS, Log Management & Security Assessment Systems

Risk & Threat Assessments Enterprise Security Standards & Guidelines Business System Improvements

Security Audits, Penetration Tests, Vulnerability Assessments Security System Backup & Maintenance

Computer Security Incident Response Team Security Strategy Technical Advisor

Forensic Recovery Analysis Global Information Security Policy Hardware/Software Risk Evaluation

Professional Experience

Maryland Department of Public Safety – Baltimore, MD May 2018- Present

IT Specialist / Security Engineer.

Manage and maintain security of voice, data networks, and equipment; monitor physical and logical security and access to systems.

Experienced in Risk Management Framework to identify, eliminate and minimize risks, through risk identification, risk analysis, response planning, risk mitigation and risk monitoring.

Develop, implement and provide support for new and existing security procedures.

Provide leadership for risk assessment and presentation of options to management for improvement of DNS, firewall modernization, plus optimization of inbound e-mail security.

Provide support for maintenance of network infrastructure including switches and load balancers and migration of VPN concentrators for new project.

Ensure the timely response to cyber incidents through appropriate technical and operational channels in a way that promotes an accurate, meaningful, and comprehensive understanding of the cyber incident throughout its life cycle.

As an experienced certified ethical hacker, using pen testing tools to identify weak spots in an organization's security posture, either government or private company’s internal or external security posture as well as measure the compliance of its security policy, test the staff's awareness of security issues and determine whether, and how the organization would be subject to security disasters.

Experienced in actively working to close security gaps identified in pen tests

Experienced in continuous monitoring & mitigation by providing a consistent set of information security monitoring tools and services at a reduced cost that improves the government’s ability to identify and mitigate the impact of emerging cyber threat.

Versatile in testing a computer system, network or web application to find security vulnerabilities that an attacker could exploit, using automated software application or performed manually.

Experienced in SIEM/SOAR by aggregating security data from various sources and with SOAR by aggregating security threat data, and integrating a wider range of internal and external application.

Using Burp suite to send the request/response under monitoring to another relevant tool in Burp Suite, removing the burden of copy-paste

Experienced in using Burp suite finder tools to evaluate the security of web-based applications and do hands-on testing, also using Burp suite to modify the contents of the requests and responses while they are in transit.

Experienced in Nmap to scan the network that the computer is connected to and output a lists of ports, device name, operating systems, that help the user to understand the details behind their connection status.

Experienced in using Metasploit to probe systematic vulnerabilities on networks and servers.

Experienced in Wireshark to capture and analyze packet from a network connection.

Provide an effective and comprehensive response that includes the recovery of any affected systems and the return to a fully functioning, secure, operational state for all services and systems.

Solid understanding of Email Hygiene filtering, Email Sender Verification, email message flow.

Moving emails in the appropriate folders based on the tagged category and then whether legitimate, friendly spoofed or malicious spoofed.

Reviewing emails that have been quarantined for containing suspicious URL s within the message body.

Storage of Critical data on google cloud storage with multiple automatic redundancy options.

As a master degree holder in cybersecurity & information assurance and an IT security specialist, working with cloud Identity and Access Management solution to provide tools to manage resource permission with minimum fuss and high automation. Also with recommender to proactively discover and remediate potential issues like overly permissive access.

Extracting these URLs that were rated as suspicious and determine if the email and URLs are indeed legitimate or spam malicious.

Education

.

Western Governor University, Salt Lake City USA – M.Sc. – Cybersecurity & Information Assurance.

Obafemi Awolowo University, Ile-Ife Osun State Nigeria – B.Sc. – Demography and Social Statistics

Certifications

Security + Certification,

CEH ( Certified Ethical Hacker),

CHFI (Computer Hacking Forensic Investigator).



Contact this candidate