Post Job Free

Resume

Sign in

Information Technology Cyber Security

Location:
Windsor Mill, MD
Posted:
February 04, 2024

Contact this candidate

Resume:

Abiola Balogun

Owings Mills, MD

443-***-****

ad3dfd@r.postjobfree.com

INTRODUCTION

A Skilled information technology and cyber-Security specialist with over 5 years of experience managing, installing, maintaining, monitoring, and troubleshooting computer hardware and software related issues. Proven ability to multi-task, work independently and within teams in fast-paced, high-volume environments. Incident response, network monitoring and traffic analysis, malware reverse engineering and investigation, risk assessment and mitigation, vulnerability assessments, system hardening.

TECHNICAL SKILLS

Security Tools: RSA Archer, TAF, CSAM, JIRA, Share Point, Nessus, McAfee, Web Inspect, Retina, Nmap, Splunk, Arc Sight, Wireshark, CrowdStrike, Snort, e - policy, Qualys Operating Systems: Unix-Based Systems (Solaris, Linux); Windows (all), McAfee Software: MS Office 365 Suite, Teams, Zoom, WebEx, Networking: LANs, WANs, VPNs, Routers, Firewalls, TCP/IP, IDS/IP, Malware Analysis/Phishing email analysis, Incident Response/Cyber Threat Intelligence, Virus Total, Domain Tools, IP/URL void, IBM X-Force, Linux/Windows/ Active Directory, Palo Alto/Cisco IronPort,

Snort/Firepower/CrowdStrike/Carbon Black,

EDUCATION

Associate: Computer Information System

BSc: Computer Networks and Telecommunications

CERTIFICATIONS/PROFESSIONAL TRAINING

● Certified Ethical Hacker, CEH (August 2021)

● CompTIA Security + (February 2022)

● Certified Network Defender Architect, CNDA (August 2021)

● Microsoft SOC Analyst Associate (June 2022)

● Microsoft 365 Security Administrator Associate (June 2022)

● Certified Hacking Forensic Investigator, CHFI (January 2023) PROFESSIONAL EXPERIENCE

ALLAI TECHNOLOGIES

SOC Analyst October 2020 -

Present

• Analyzed and evaluated anomalous network and system activity.

• Performed continuous and constant monitoring of intrusion detection systems.

• Created technically detailed reports based on intrusions and events.

• Aided in computer incident investigations.

• Assisted in troubleshooting and solving a wide variety of client issues.

• Used network security analysis tools such as Snort, TCPDUMP and Wireshark for network intrusion detection and data-network packet analyzer.

• Performed system vulnerability scans and assessment using Qualys and Nessus.

• Performed security patch validation scans on Linux/UNIX and Windows OS.

• Gained familiarity with computer forensic tools FTK, EnCase or other network forensic applications.

• Configured Access Control Lists, Firewall and Router configuration.

• Collaborated well with members of the IAM team on daily policy issues.

• Recommend modifications to access control lists to prevent and mitigate intrusions.

• Communicated effectively with clients with the ability to explain and elaborate on technical details.

• Aided in analyzing threats and using knowledge in trends present in the Information Security and Technology field.

• Provided quality customer service with excellent communication skills.

• Used ServiceNow to create incident tickets and RFCs.

• Utilized Intrusion Detection & Prevention (IDS/IPS) to monitor malicious activities on the network. Analyze firewall logs, IPS and IDS logs to uncover malicious activity going on within the network.

• Monitored events, responded to incidents, and reported findings and escalate critical tickets.

• Provide Incident Response (IR) support when analysis confirms actionable incidents.

• Assist with the development of processes and procedures to improve incident response times, analysis of incidents, and overall, SOC functions.

• Prioritized and differentiate between potential intrusion attempts and false alarms.

• Developed follow-up action plans to resolve reportable issues and communicate with other IT teams to address security threats and incidents accordingly.

LUMI TECH LLC

Junior Cyber Security Engineer August 2018 – August 2020

● Incident response, network monitoring and traffic analysis, malware reverse engineering and investigation, risk assessment and mitigation, vulnerability assessments, system hardening and technical support.

● Triage and investigate incoming alerts generated from Splunk ES to determine the severity and impact of the event or incidents.

● Process reports, train end users on, policies, and procedures of increase security awareness

● Supporting Incident Response till resolution following Standard Operation Procedures

(SOP)

● Perform vulnerability scans on systems and analyze scan data to determine recommendations and remediation.

● Extensive troubleshooting of software and hardware.

● Perform vulnerability assessments, making sure risks are assessed and proper actions taken to mitigate them.

● Performed security patch validation scans on Linux/UNIX and Windows OS.

● Conduct IT control risks assessments including reviewing organizational policies, standards and procedures and providing advice on their adequacy, accuracy, and compliance with industry standards.

● Gained familiarity with computer forensic tools FTK, EnCase or another network forensic applications.

● Recommend modifications to access control lists to prevent and mitigate intrusions.

● Used network security analysis tools such as Snort, TCPDUMP and Wireshark for network intrusion detection and data-network packet analyzer.

● Proven proficiency to communicate at multiple levels of the organization being able to translate technical requirements for decisions makers.

● Perform desktop user data migrations with zero percent loss of information.

● Supported clients with POA&M evaluation as part of remediation process.

● Provide both Tier 1 and 2 deskside support to resolve user issues with custom applications, remote access, mobile device management, active directory, and user accounts management.

● Hands on experience with x86 architecture-based systems

● Experience with cloud solutions such as Microsoft Azure and Amazon web services.

● Complete understanding of the cyber kill chain life cycle and mitigation.

● Achieve high level security and performance of systems by initiating installation of new anti-virus software and critical operating system updates.

● Configured Access Control Lists, Firewall and Router configuration.

● Blocked malicious domains and IPs following company's Standard Operation Procedures

● Utilized Intrusion Detection & Prevention (IDS/IPS) to monitor malicious activities on the network.

● Used McAfee DLP Manager to protect intellectual property and ensure compliance.

● Experienced in research and solution implementation.

● Ensure that data migrations/conversions performed in the back end using SQL statements were implemented and that the converted data displays in the respective fields in the front-end of the application.



Contact this candidate