Post Job Free

Resume

Sign in

Cyber Security Active Directory

Location:
Wheeling, IL
Salary:
150,000
Posted:
December 12, 2023

Contact this candidate

Resume:

OLUWAROTIMI SAMUEL AFUWAPE

**** ******** **** ********, ** APT. 1B 60090

PHONE: 312-***-****

E-MAIL: ad1wrp@r.postjobfree.com

PROFESSIONAL SUMMARY

Oluwarotimi Samuel Afuwape is a dynamic, results-driven Cyber Security Engineer/Cloud Professional with vast knowledge in Security Information and Event Management (SIEM) · EDR · XDR · Creativity and Innovation · Problem Solving · Analytical Skills · Communication · Microsoft in tune · Threat & Vulnerability Management · Vulnerability Assessment · Networking · Cyber security · Microsoft Azure · Azure Active Directory · Azure Sentinel · Microsoft Defender · Cloud Security Cyber Security Cloud Security CyberArk Powerbroker Information Security IAM PIM PAM Azure Active Directory Microsoft In tune Microsoft Sentinel Microsoft 365 Defender Nessus EDR CASB Networking Kubernetes CI/CD.

PROFESSIONAL EXPERIENCE

NETEFFECT, IT BUILT FOR BUSINESS

LAS VEGAS, USA.

SENIOR CLOUD SECURITY ENGINEER MAY 2019 – PRESENT (REMOTE).

DUTIES

Cyber Security Cloud Security Information Security Azure Active Directory Microsoft Intune Microsoft Sentinel Microsoft 365 Defender Nessus EDR CASB Networking

Onboarding Azure Sentinel to receive logs from data sources, detect previously undetected threats, investigating threats with artificial intelligence and responding to incidents rapidly using playbooks and KQL queries.

Implementing Data Loss Protection (DLP), encryption, identity and access management, multifactor authentication, endpoint protection, Engineering test using tools like SQL Map, Tenable Nessus, Cisco Talos, Sandbox, John the Ripper etc. and deploying security administration in Microsoft 365/ Azure cloud environment

Designing and deploying Azure Active Directory as well as performing offline AD Security assessments, prepare and deliver remediations plans.

Configuring and Monitoring sign-ins, audit logs, enforce MFA and Privileged Identity Management (PIM) making use of tools like Azure Sentinel, CyberArk for endpoint management and Enterprise password, and Powerbroker to enforce multifactor authentication to avoid data breach.

Participating in development of workflows, system configuration, documentation, optimization and support related access with an IAM framework in place and using the firm knowledge of analytical and troubleshooting skills to communicate with vendor’s technical support.

Participating in identifying, collecting, analyzing, interpreting, and assisting in in the reporting of security metrics using various tools in the Microsoft Azure Active Directory, OKTA, CyberArk, AWS, to identify the right people and job roles in my organization can access the tools they need to their various jobs.

Responsible for creating users roles, assigning roles, for sign-ins, sign-Ons, enabling MFA for both users accounts using Just-in-Time (JIT), RBAC, conditional access management tools in AWS, Microsoft 365, CyberArk, OKTA in identity access management platforms in order to allow identity, including saving critical applications, data and systems from unauthorized access while managing the identities and access rights of people both inside and outside of the organization’s IAM platforms.

Ensuring that customer requests for security access is completed in a timely manner, providing second level technical support to the project team, end-users and OIT (Office of Information Technology) functional groups.

Ensuring ticket management, managing identity access, customers portals (EEM), Active Directory and other IAM platforms.

VIKING GLOBAL INVESTORS (REMOTE)

CONNECTICUT, USA.

CLOUD ENGINEER/SOC ANALSYT FEBRUARY 2017 – APRIL 2019

DUTIES

Configured multiple firewalls rules in Palo-Alto to further enhance the secure incoming and outgoing traffic into the environment.

Conducted multiple analysis of malicious files, phishing email analysis and Wiresharks PCAPs analysis.

Assessed vulnerabilities in the organization’s infrastructure through security assessments and vulnerability scans with Tenable Nessus and proposing remediation strategies.

Collaborated closely with developers to configure and register applications with Entra-ID enterprise app, assigning required permission leveraging Graph API and configuring security token and managed identities.

Configured and integrated Windows servers, Windows clients, devices on in tune and Azure-VMs to Microsoft Defender for Endpoint (EDR/XDR) for detection, investigation and response to advance threats.

Configured seamless on boarding of devices to Microsoft Intune (MDM) which dynamically adds to device groups to conform with different security policies and compliances.

Configured Microsoft Sentinel (SIEM) to collect, analyze and respond to security events from different Microsoft Azure solutions such as M365Defender, Azure active directory, improving the ability to detect and mitigate threats in real-time.

Configured various MDE policies using Microsoft in tune (MDM) which includes Antivirus, Attack Surface Reduction, Firewall policies, Tamper Protection, and Windows Security Baseline to further enhance security on endpoints.

Configured advanced Email Security Policies to protect Exchange Online mailboxes (EOP). This includes Anti-Malware, Anti-Phishing, Safe Links, Safe Attachments, and Impersonation Protection policies.

Conducted multiple analysis of malicious files, phishing email and working with tools like Wireshark, Armitage, Sandbox, Tor, Cisco Talos for PCAPs analysis.

Proper understanding and utilization of Kill Chain, MITRE ATTACK, Malware analysis, phishing, and Email headers analysis, OWASP, network protocols, threat intelligent platforms where needed for security analysis and threat investigation.

Participated in various simulation attacks to further enhance security in environment leveraging Kali Linux with tools like Metasploit, Nmap, Zenmap, Armitage etc.

Participated in development of workflows, system configuration, documentation, optimization and support related access with an IAM framework in place and using the firm knowledge of analytical and troubleshooting skills to communicate with vendor’s technical support.

Participated in identifying, collecting, analyzing, interpreting, and assisting in in the reporting of security metrics using various tools in the Microsoft Azure Active Directory, OKTA, Cyberark, AWS, to identify the right people and job roles in my organization can access the tools they need to their various jobs.

ROYAL CARRIBEAN GROUP

FLORIDA, USA

SECURITY OPERATION CENTRE ANALYST MAY 2015- FEB 2017 (REMOTE)

DUTIES

Configured multiple firewall rules in Palo-Alto to further enhance the and secure incoming and outgoing traffic into the environment.

Scanned end-user machines with tools like Nessus, Nmap, Zenmap, Wireshark to remediate vulnerabilities.

Assessed vulnerabilities in the organization's infrastructure through security assessments and vulnerability scans with Nessus and proposing remediation strategies.

Reviewed IDS and Firewall logs in SIEM using tools like Splunk, Azure sentinel, SQL Maps (SQL servers logs and analytics) and report suspicious activities.

Responsible for continuous analysis and investigation of Windows Security events alerts to avoid attacks and data breaches.

Participated with red team to perform some simulated attacks and to further enhance security in our environment leveraging Kali Linux with tools like Metasploit, Nmap, Zenmap, Splunk cloud and enterprise.

I had proper understanding and utilization of Kill Chain, MITRE ATTACK, Malware analysis, Phishing & Email headers analysis, OWASP, network protocols, threat intelligence tools were used for security analysis and threat investigation.

EDUCATION

FEDERAL UNIVERSITY OF TECHNOLOGY, AKURE, ONDO – STATE.

B. TECH (BIOCHEMISTRY)

PROFESSIONAL CERTIFICATION

1. MICROSOFT AZURE 500 Certified Nov. 2023

2. COMPTIA SECURITY + Certified Nov. 2023

SKILLS ACQUISITIONS

Azure Active Directory • Azure Sentinel • Microsoft Defender • Information Security • Cloud Security. As a cloud security I have been able to enhance security with Azure AD, MFA, Azure Identity Governance, Conditional Access, Microsoft 365 Defender (EDR & EOP), Microsoft Intune (MDM), Microsoft Sentinel (SIEM), Nessus Vulnerability Scanner, CISCO Network configurations and overall understanding of Information Security to protect confidentiality, integrity, and availability.



Contact this candidate