Joy Nkeiruka Ohaka
Summary:
Cybersecurity Specialist with 9 years of experience, qualified, respected, dedicated and results-driven professional with a consistent record of success in improving aspects of information security through Patching, Third Party Risk Management, Risk Assessment, Incident Response, Compliance and Policy procedures. Vulnerabilities notification from Microsoft: Investigate within security-microsoft.com and remediate. Maintained, tuned, and analyzed alerts from network security devices including IDS/IPS, NAC, SIEM, Firewalls, and other network devices.
Skills And Training
●Strong communication skills, analytical ability, good judgment, and the ability to work effectively with clients/ users and management.
●Monitors security logs, updates security baselines, and troubleshooting.
●Flexibility and adaptability to work in a growing, dynamic, international team with a strong customer-oriented attitude.
●ServiceNow & Remedy.
●Imaging Medical Devices using AppOS & Patching servers/ devices.
●Knowledgeable in assessing aspects of CyberArk Security System, Active Directory, Ad hocs – DLM, Asset Track
Education:
●Master in Cybersecurity Management and Policy, University of Maryland Global Campus, Baltimore, MD June 2020
●Bachelor of Science Degree in Biology, Bowie State University, Bowie MD Dec. 2010
Certification:
●CompTIA Security+
●Certified Advanced Security Practitioner
●Certified Information Security Manager
●Project Management Professional
Professional Experience
IT Specialist/ Systems Analyst July 2024 - September 2024
DC OCFO
Agency: GoIntellects INC.
●Imaging Cart: Ensure the imaging cart is always full and the slots are stocked.
●Backups: Complete any necessary backups promptly.
●Zendesk Tickets: Keep tech tickets updated, assigned, and follow up on any outstanding issues.
●Absolute Dark Devices: Identify any dark devices, send emails to users, and initiate any necessary investigations.
●Oomnitza Records: Update, archive, and maintain accurate status records.
●Zendesk Tickets: Keep tickets updated
●Software Versions: Remove multiple versions of software identified on computers.
●Kaseya efficiency
●Compliance/ Compliance or compatibility issues.
●Determines enterprise information assurance and security standards.
●Develops and implements information assurance/security standards and procedures.
●Coordinates, develops, and evaluates security programs for an organization. Recommends information assurance/security solutions to support customers’ requirements.
●Identifies, reports, and resolves security violations.
●Establishes and satisfies information assurance and security requirements based upon the analysis of user, policy, regulatory, and resource demands.
●Supports customers at the highest levels in the development and implementation of doctrine and policies.
●Applies know-how to government and commercial common user systems, as well as to dedicated special purpose systems requiring specialized security features and procedures.
●Performs analysis, design, and development of security features for system architectures.
●Analyzes and defines security requirements for computer systems which may include mainframes, workstations, and personal computers.
●Designs, develops, engineers, and implements solutions that meet security requirements.
●Provides integration and implementation of the computer system security solution.
●Analyzes general information assurance-related technical problems and provides basic engineering and technical support in solving these problems.
●Performs vulnerability/risk analyses of computer systems and applications during all phases of the system development life cycle.
●Ensures that all information systems are functional and secure.
Information Security Specialist April 2022 – March 2024
NASA Federal Credit Union
●Protect the integrity and security of the Credit Union network, data, and infrastructure.
●Identifies, investigates, and resolves security incidents detected by the different systems.
●SecureWorks: verify incident is blocked, if not, investigate and remediate
●CarbonBlack: Review and research file integrity. Proceed to whitelist, block or request management approval if needed. Sometimes must contact the requestor if additional action is needed to complete the approval process.
●CounterAct (NAC): identifies network endpoints the minute they connect to the network.
●Rapid7: Review and remediate. Open case with vendor if additional action is needed.
●Umbrella: Review request and if needed for job functions. Proceed to whitelist within the policy assigned to the requestor. (Sometimes, we must request approval from the manager if necessary.)
●Vulnerabilities notification from Microsoft: Investigate within security-microsoft.com and remediate.
●Microsoft Defender for Cloud Apps: Investigate and remediate.
●Mimecast & Outlook: proficient in using these tools.
●Azure AD: identity and access management solution for multicloud environment
●Demonstrates the ability to identify organizational risk and escalate appropriately.
●Assists with coordination of penetration testing to identify system vulnerabilities.
●Use Wireshark to look at logs when I’m trying to check the traffic across our network. It helps to drill down into the everyday TCP/IP connection issues. Also, it allows me to see the real-time analysis of hundreds of protocols.
●Respond to unauthorized access incidents.
●Maintains, tunes, and analyzes alerts from network security devices including IDS/IPS, NAC, SIEM, Firewalls, and other network devices.
●Manages security patches, fixes, and overall support of security tools consistent with change management practices.
●Provides regular security reporting to management.
●Manages connection security for local area networks, the company website, the company intranet, and e-mail communications.
●Manage and ensure the security of databases and data transferred both internally and externally.
●Research and recommend additional security solutions or enhancements to existing security solutions to improve overall enterprise security.
IT Specialist June 2021 – April 2022
Exelon – Washington D.C
Agency: TEKSYSTEMS
●Installed new hardware, systems, and software for user workstations and thin clients.
●Troubleshoot end user computer and phone problems. Resolves issues or refers problems to vendor support as appropriate. Assists offsite vendors as needed.
●Managed Symantec Endpoint Management for endpoint malware/anti-virus security.
●Reviewed vulnerabilities using security tools and helping security tools and helping with security documentation.
●Repaired on-site hardware as appropriate.
●Enable peripherals within the bios such as the camera and microphone.
●Uninstalled and installed approved software utilizing Window’s PowerShell ISE
●Operated and troubleshoot Microsoft products such as Teams and Outlook.
●Removed and added devices to the network domain.
●Inventory devices issued out to end users and returned.
●Installed and troubleshoot VPN connection issues.
●Utilized trouble-ticketing software for opening/updating/closing tickets in a timely and appropriate manner.
●Installed, tested, maintained, and upgrade network operating systems software and hardware to comply with IA requirements.
●Worked with System Administrators to ensure secure configurations are used on all systems.
●Quickly adapted and responded in a fast pace changing work environment.
●Worked independently and in a team environment as needed.
●Provided troubleshooting assistance and support for systems/software.
IT Specialist September 2020 – 2/2021
Exelon – Washington D.C
Agency: TEKSYSTEMS
●Installed new hardware, systems, and software for user workstations and thin clients.
●Troubleshoot end user computer and phone problems. Resolves issues or refers problems to vendor support as appropriate. Assists offsite vendors as needed.
●Managed Symantec Endpoint Management for endpoint malware/anti-virus security.
●Reviewed vulnerabilities using security tools and helping security tools and helping with security documentation.
●Repaired on-site hardware as appropriate.
●Enable peripherals within the bios such as the camera and microphone.
●Uninstalled and installed approved software utilizing Window’s PowerShell ISE
●Operated and troubleshoot Microsoft products such as Teams and Outlook.
●Removed and added devices to the network domain.
●Inventory devices issued out to end users and returned.
●Installed and troubleshoot VPN connection issues.
●Utilized trouble-ticketing software for opening/updating/closing tickets in a timely and appropriate manner.
●Installed, tested, maintain, and upgrade network operating systems software and hardware to comply with IA requirements.
IT Specialist Sept 2017 – Sept 2019
Kaiser Permanente, Hyattsville, MD
Agency: Mastech Digital
●Implemented system diagnostic and maintenance tools to ensure the availability and functionality of the system.
●Managed the installation of software and hardware, system fixes, updates, and enhancements.
●Installed and configured commercial off-the-shelf (cots) applications and software/hardware enhancements.
●Ensured application of information security/information assurance policies, principles, and practices while developing procedures responding to new threats to systems to ensure confidentiality, integrity, and availability.
●Served as a technical analyst and primary customer liaison with responsibility for resolving difficult customer problems.
●Ensured delivery of information technology services responsive to customer needs while maintaining installation mission and programs.
●Maintained and monitored security access management accounts for each server and server environments.
●Referred problems requiring highly specialized expertise to the senior technical analyst.
●Assisted in planning and coordinating new systems design, acquisition, testing, installation, and support.
●Evaluated and reports on new tools and trends in the customer support field.
Help Desk 2007 - 2010
Bowie State University
●Maintained computer hardware and software applications inventory for ensuring availability of equipment and instructional material in computer lab.
●Performed routine/ preventative maintenance of computer lab and classroom equipment (e.g. dusting, cleaning, virus scanning, and defragmenting)
●Provided troubleshooting malfunctions of hardware/or software applications to determine appropriate actions to maintain steady computer lab operations.
●Instructed students/ staff in the use of computer lab technology and software applications.
●Documented all issues & generated report detailing common problems.
●Responsible for organizing, modifying, and supporting computer systems in a dynamic Windows environment.
●Identify user needs, and maintain integrity of network, server deployment, and security in the University system.
●Experience in the installation, configuration, tuning, maintenance, administration, upgrade, backup, and recovery of systems.
●Script new user roll-on in batch and computer setup for better efficiency.
●Thoroughly troubleshoot hardware and software issues on various types of hardware such as laptops, desktops, and monitors.
●Assist clients with profile builds and remote connection.