Abiola Balogun
Owings Mills, MD
****************@*****.***
INTRODUCTION
A Skilled information technology and cyber-Security specialist with over 5 years of experience managing, installing, maintaining, monitoring, and troubleshooting computer hardware and software related issues. Proven ability to multi-task, work independently and within teams in fast-paced, high-volume environments. Incident response, network monitoring and traffic analysis, malware reverse engineering and investigation, risk assessment and mitigation, vulnerability assessments, system hardening.
TECHNICAL SKILLS
Security Tools: RSA Archer, TAF, CSAM, JIRA, Share Point, Nessus, McAfee, Web Inspect, Retina, Nmap, Splunk, Arc Sight, Wireshark, CrowdStrike, Snort, e - policy, Qualys Operating Systems: Unix-Based Systems (Solaris, Linux); Windows (all), McAfee Software: MS Office 365 Suite, Teams, Zoom, WebEx, Networking: LANs, WANs, VPNs, Routers, Firewalls, TCP/IP, IDS/IP, Malware Analysis/Phishing email analysis, Incident Response/Cyber Threat Intelligence, Virus Total, Domain Tools, IP/URL void, IBM X-Force, Linux/Windows/ Active Directory, Palo Alto/Cisco IronPort,
Snort/Firepower/CrowdStrike/Carbon Black,
EDUCATION
Associate: Computer Information System
BSc: Computer Networks and Telecommunications
CERTIFICATIONS/PROFESSIONAL TRAINING
● Certified Ethical Hacker, CEH (August 2021)
● CompTIA Security + (February 2022)
● Certified Network Defender Architect, CNDA (August 2021)
● Microsoft SOC Analyst Associate (June 2022)
● Microsoft 365 Security Administrator Associate (June 2022)
● Certified Hacking Forensic Investigator, CHFI (January 2023) PROFESSIONAL EXPERIENCE
ALLAI TECHNOLOGIES
SOC Analyst October 2020 -
Present
• Analyzed and evaluated anomalous network and system activity.
• Performed continuous and constant monitoring of intrusion detection systems.
• Created technically detailed reports based on intrusions and events.
• Aided in computer incident investigations.
• Assisted in troubleshooting and solving a wide variety of client issues.
• Used network security analysis tools such as Snort, TCPDUMP and Wireshark for network intrusion detection and data-network packet analyzer.
• Performed system vulnerability scans and assessment using Qualys and Nessus.
• Performed security patch validation scans on Linux/UNIX and Windows OS.
• Gained familiarity with computer forensic tools FTK, EnCase or other network forensic applications.
• Configured Access Control Lists, Firewall and Router configuration.
• Collaborated well with members of the IAM team on daily policy issues.
• Recommend modifications to access control lists to prevent and mitigate intrusions.
• Communicated effectively with clients with the ability to explain and elaborate on technical details.
• Aided in analyzing threats and using knowledge in trends present in the Information Security and Technology field.
• Provided quality customer service with excellent communication skills.
• Used ServiceNow to create incident tickets and RFCs.
• Utilized Intrusion Detection & Prevention (IDS/IPS) to monitor malicious activities on the network. Analyze firewall logs, IPS and IDS logs to uncover malicious activity going on within the network.
• Monitored events, responded to incidents, and reported findings and escalate critical tickets.
• Provide Incident Response (IR) support when analysis confirms actionable incidents.
• Assist with the development of processes and procedures to improve incident response times, analysis of incidents, and overall, SOC functions.
• Prioritized and differentiate between potential intrusion attempts and false alarms.
• Developed follow-up action plans to resolve reportable issues and communicate with other IT teams to address security threats and incidents accordingly.
LUMI TECH LLC
Junior Cyber Security Engineer August 2018 – August 2020
● Incident response, network monitoring and traffic analysis, malware reverse engineering and investigation, risk assessment and mitigation, vulnerability assessments, system hardening and technical support.
● Triage and investigate incoming alerts generated from Splunk ES to determine the severity and impact of the event or incidents.
● Process reports, train end users on, policies, and procedures of increase security awareness
● Supporting Incident Response till resolution following Standard Operation Procedures
(SOP)
● Perform vulnerability scans on systems and analyze scan data to determine recommendations and remediation.
● Extensive troubleshooting of software and hardware.
● Perform vulnerability assessments, making sure risks are assessed and proper actions taken to mitigate them.
● Performed security patch validation scans on Linux/UNIX and Windows OS.
● Conduct IT control risks assessments including reviewing organizational policies, standards and procedures and providing advice on their adequacy, accuracy, and compliance with industry standards.
● Gained familiarity with computer forensic tools FTK, EnCase or another network forensic applications.
● Recommend modifications to access control lists to prevent and mitigate intrusions.
● Used network security analysis tools such as Snort, TCPDUMP and Wireshark for network intrusion detection and data-network packet analyzer.
● Proven proficiency to communicate at multiple levels of the organization being able to translate technical requirements for decisions makers.
● Perform desktop user data migrations with zero percent loss of information.
● Supported clients with POA&M evaluation as part of remediation process.
● Provide both Tier 1 and 2 deskside support to resolve user issues with custom applications, remote access, mobile device management, active directory, and user accounts management.
● Hands on experience with x86 architecture-based systems
● Experience with cloud solutions such as Microsoft Azure and Amazon web services.
● Complete understanding of the cyber kill chain life cycle and mitigation.
● Achieve high level security and performance of systems by initiating installation of new anti-virus software and critical operating system updates.
● Configured Access Control Lists, Firewall and Router configuration.
● Blocked malicious domains and IPs following company's Standard Operation Procedures
● Utilized Intrusion Detection & Prevention (IDS/IPS) to monitor malicious activities on the network.
● Used McAfee DLP Manager to protect intellectual property and ensure compliance.
● Experienced in research and solution implementation.
● Ensure that data migrations/conversions performed in the back end using SQL statements were implemented and that the converted data displays in the respective fields in the front-end of the application.