Oloyede James Bolarinwa
682-***-**** *****************@*****.***
SUMMARY
Dynamic and skilled Cybersecurity Professional with expertise in leading incident response efforts and threat analysis. Leveraging a comprehensive understanding of attack signatures and advanced threat tactics, I aim to contribute to a team dedicated to safeguarding organizational assets and mitigating security risks, with the overall objective to ensure confidentiality, integrity and availability of the systems. SKILLS
● Malware Analysis/Endpoint Security
● Incident Response
● Cyber Threat Intelligence
● Data Loss Prevention/Anti-Phishing
● Wireshark/IBM Big Fix
● Vulnerability Assessment & Management
● Network Security Protocols/ TCP/IP
● Cyber kill chain
● Threat Hunting
● Mitre Attack Framework
● Nessus
● Splunk ES/Splunk SOAR/Logz.io/UES
● Rapid7 InsightIDR, R7 InsightVM & R7 InsightConnect
● ServiceNow/Jira/Swimelane
● CrowdStrike/SentinelOne/Salt Security/Demisto XSOAR
● Palo alto/Cisco/Fortinet
● Linux/Windows/MacOS
● Active Directory/Microsoft Office (O365)
● VirusTotal, DomainTools, IP/URLvoid, IBM X-Force EDUCATION & CERTIFICATIONS/AWARDs
● Certified Ethical Hacker (CEH) - Certification
● Certified CompTIA CySA+ (Cyber Security Analyst). - Certification
● Certified AWS Cloud Practitioner (CLF – C01) - Certification
● Splunk Core Certified Power User (SPLK-1002) - Certification
● Cybersecurity essentials – Cisco Badge
● Networking Essentials – Cisco Badge
● NDG Linux Essentials – Cisco Certificate of completion.
● Packet Tracer – Cisco Certificate of completion
● Per Scholas – Cyber Security Analyst Certificate of Completion
● Bachelor of Agriculture - Obafemi Awolowo University, Ile-Ife. Nigeria. 2008 PROFESSIONAL EXPERIENCE
Page 1 of 3
Oloyede James Bolarinwa
682-***-**** *****************@*****.***
Celsius Network LLC. (Kforce Inc.)
SOC Analyst March 2023 – Present
● Monitoring systems, identifying, studying and resolving all instances/events reported by various users.
● Leading a team of Incident Handlers/Analysts, providing supervision, guidance, and mentorship to ensure efficient incident response analysis.
● Investigated, coordinated, resolved, and reported security incidents escalated or identified, ensuring timely and effective response to mitigate potential risks.
● Monitoring, analyzing and interpreting network traffic alert using Logz.io
● Experience researching emerging cyber threats to understand and present hacker methods and tactics system vulnerabilities, and indicators of compromise
● Completed complex analysis of artifacts collected during security incidents and forensic investigations, extracting actionable intelligence to enhance threat detection and response capabilities.
● Performing endpoint investigations using falcon Crowdstrike
● Responsible for detecting successful and unsuccessful intrusion attempts through analysis of relevant event logs and supporting data sources by utilizing SIEM tools such as Logz.io and Salt Security
● Continuously monitor the network, systems, and applications for any security incidents, suspicious activities, or vulnerabilities.
● Respond to security incidents promptly, investigate their nature and impact, and take appropriate actions to contain, mitigate, and resolve them.
● Stay updated on the latest security threats, vulnerabilities, and attack techniques to proactively identify potential risks and enhance the organization's security posture.
● Document and track security incidents, maintain incident response procedures, and provide reports on incident trends, root causes, and resolution status.
● Analyze security events and alerts generated by various security monitoring tools, identify patterns, trends, or anomalies that may indicate potential security breaches or attacks.
● Contribute to the development, implementation, and enforcement of security policies, standards, and procedures to ensure compliance with industry regulations and best practices.
● Prepare detailed incident reports, including incident analysis, impact assessment, and recommendations for improving the security infrastructure and incident response processes.
● Collaborate with other teams within the organization, such as network operations, system administrators, and application developers, to ensure a coordinated approach to security and effective incident response. Page 2 of 3
Oloyede James Bolarinwa
682-***-**** *****************@*****.***
Pitch Technologies Consulting
SOC Analyst February 2019 – March 2023
● Consistently monitoring and working on alerts generating on Splunk
● Assisting in creating Splunk dashboards to capture all customized logs generated by systems and applications
● Assisting in creating new use cases and performing SOC testing
● Creating and updating SOC run books as required
● Conducted proactive threat hunting operations within SIEM and other relevant tools, collaborating with partner organizations to identify and neutralize potential threats.
● Collaborated with server owners, system custodians, and IT contacts to pursue security incident response activities, including artifact collection, containment, and remediation actions.
● Giving client recommendations on how to securely resolve escalated issues
● Training new employees on how to handle investigations and safely deal with phishing emails
● Developing follow-up action plans to resolve reportable issues and communicating with other IT teams to address security threats and incidents accordingly
● Escalating incidents to incident response and forensic analysts for further analysis
● Supporting Incident Response till resolution following Standard Operation Procedures (SOP)
● Prioritizing and differentiating between potential intrusion attempts and false alarms
● Assisting with the development of processes and procedures to improve incident response times, analysis of incidents, and overall, SOC functions
● Responding to computer security incidents by collecting, analyzing, preserving digital evidence Delight Colors LTD, Lagos. Nigeria
IT Support Analyst April 2010 – July 2018
● Troubleshooting endpoints, monitored network performance to determine if Adjustments were required
● Planned and recommended network hardware, systems management software and architecture
● Recommended modifications of basic IT systems to improve and simplify business systems and reduce operating cost
● Responsibility for network planning, design, security, and optimization
● Installed/Reimaged, configured and maintained staff computers, file servers, ethernet networks and network cabling
● Established and developed procedures for proper utilization of IT technology
● Developed strategies and direction for network systems solutions
● Implemented and maintains security strategies for internal network
● Ensured maximum system uptime by performing
● routine/preventative maintenance tasks
● Tested new software for bugs before deployment/provisioning Page 3 of 3