TX, IRVING, US, ***** • *************@*****.*** • 848-***-****
AZIZ ADENIRAN
CyberSecurity
PROFESSIONAL SUMMARY
SOC Analyst with five+ years of experience specializing in data encryption and unified threat management. Expert in incident response and wireless network security, consistently aligning security architecture with industry standards to enhance organizational protection. Known for strong interpersonal skills and a meticulous approach to data security, eager to leverage expertise in compliance and data loss prevention to drive continuous improvement and innovation in cybersecurity strategies. EMPLOYMENT HISTORY
CYBERSECURITY SPECIALIST Mar 2022 - Mar 2024
Spotify Brooklyn, NY
• Providing 24 x 7 watch supporting continuous monitoring and incident response for hybrid cloud/ on-prem customer networks
• Providing support in the detection, response, mitigation, and reporting of cyber threats affecting customer networks
• Producing reports and briefs to provide an accurate depiction of the current threat landscape and associated risk based on customer, community, and open-source reporting
• Facilitating the customer's posturing to aggressively investigate cyber activity targeting customer information and its information infrastructure
• Analyzing and reporting cyber threats as well as assisting in deterring, identifying, monitoring, investigating, and analyzing computer network intrusions
• Providing support during assigned shifts, including nights/weekends, with hybrid work on-site
• Developing and implementing training standards and procedures, including Work Instructions, Joint Qualification Requirements, and Standard Operating Procedures
• Monitored confidential company data and mitigated hacking through network systems updates
• Performed risk analyses to identify appropriate security countermeasures
• Built relationships and foster effective communication with legal personnel to conduct practical investigations SOC ANALYST Feb 2018 - Jan 2022
Lyft Newark, NJ
• Developed customized security policies and procedures in alignment with industry best practices
• Developed, tested, and implemented security policies, plans, and procedures for organizational protection
• Enhanced network security by monitoring systems for potential threats and vulnerabilities
• Supported compliance initiatives by conducting regular audits of security controls and providing recommendations for devices
• Assist senior members of the SOC with analyzing and responding to potential security incidents
• Maintain situational awareness of emerging cyber trends by reviewing open-source reports for recent vulnerabilities, malware, and other threats that have the potential to impact our client organizations
• Document threat campaign(s) techniques, lateral movements and extract indicators of compromise (IOCs)
• Manage the Security monitoring tools, and set up dashboards and alerts
• Created strong encryption protocols for data protection, safeguarding sensitive information from potential breachesDrive continuous improvement in cybersecurity protocols, developing training standards, and mentoring new analysts to enhance team capabilities.
Pioneer advanced encryption protocols, fortifying data protection strategies to shield sensitive information from evolving cyber threats.
Spearheaded 24/7 incident response for hybrid cloud networks, analyzing threats and implementing robust security measures to safeguard critical infrastructure.
Develop cutting-edge encryption protocols and training standards, enhancing team capabilities and fortifying data protection against evolving cyber threats.
Conduct thorough risk analyses, identifying and implementing effective security countermeasures to significantly reduce vulnerabilities in customer networks.
Foster strong relationships with legal teams, facilitating efficient investigations and ensuring compliance with cybersecurity regulations.
• Develop and maintain technical documentation and Standard Operating Procedures (SOP)
• Conduct security research and intelligence gathering on emerging threats and exploits
• Participate in shift transition calls to ensure all open cases and tasks are properly managed and addressed
• Periodic reporting of metrics and corresponding analysis for client review and strategic information security program adjustments and planning
HELP DESK ASSISTANT Jan 2017 - Feb 2018
FanDuel Woodbridge, NJ
• Maintained updated contact lists across various platforms ensuring easy access to essential information during crucial moments
• Offered technical support and troubleshooting issues to enhance office productivity
• Opened and properly distributed incoming mail to promote quicker response to client inquiries
• Answered multi-line phone system, routed calls, delivered messages to staff, and greeted visitors
• Increased profitability and productivity by minimizing downtime and streamlining quality control procedures
• Contributed to successful project completion by providing research assistance when needed
• Generated reports using established templates that provided valuable insights into department performance metrics
• Maintained inventory of office supplies by monitoring usage patterns and submitting timely orders for replenishments
• Worked closely with management to provide effective assistance for specific aspects of business operations
• Organized resources, records, and personnel to accomplish aggressive targets
• Reviewed and edited documents for accuracy, grammar, and clarity EDUCATION
CYBERSECURITY SPECIALISTS & LINUX ESSENTIALS
Kernelios Brooklyn, New York
COMPTIA A+ & SECURITY+ & CLOUD+ & CISSP & CLOUD+
Alison Empower Newark, New Jersey
COURSES
CYBERSECURITY SPECIALISTS & LINUX ESSENTIALS
Kernelios
COMPTIA A+ & SECURITY+ & CLOUD+ & CISSP & CLOUD+
Alison Empower
SKILLS
Time Management, Problem-Solving, Wireshark, Data Security, Data Encryption, Security Information and Event Management, Unified Threat Management, Wireless Network Security, Symantec Endpoint Protection, Data Loss Prevention, Risk Analysis, Network Security, Compliance, Incident Response, Threat Intelligence, Incident Investigation, Threat Hunting, Security Auditing, Vulnerability Assessment, Malware Analysis. Monitor security alerts and notifications from various security platforms and log sources, including SIEM, IDS/IPS, firewalls, and endpoint protection tools to identify suspicious activity Triage potential security incidents to identify false positives, determine scope and impact, and work with stakeholders across the organization to respond to incidents promptly. Escalate incidents to senior analysts as necessary Work with customers to investigate potential phishing emails and take corrective actions. Contribute to the development and optimization of SIEM use cases, correlation rules, and incident response playbooks Assist with the integration of threat intelligence into the SOC’s detection and response processes Document security incidents, findings, and remediation actions in incident tracking systems Contribute to the creation of daily, weekly, and monthly security reports for management and stakeholders Communicate security events and incidents clearly and concisely to both technical and non-technical audiences Executed regular security audits, providing actionable recommendations that significantly strengthened organizational defenses.
Spearheaded the development of robust security policies, enhancing organizational protection through rigorous testing and implementation.
Security Architecture, Network Forensics, Incident Coordination, Cloud Security, Threat Modeling, Phishing Investigation, Cyber Threat Analysis, Security Policy Development, Threat Intelligence Integration, Security Research.