Post Job Free

Resume

Sign in

Cyber Security Network

Location:
Montreal, QC, Canada
Posted:
September 17, 2023

Contact this candidate

Resume:

Kingsley R. Okeke

Cyber Security Analyst

adzras@r.postjobfree.com

613-***-****

With 5 years of experience, I excel in identifying and mitigating information security risks using cutting-edge technologies and cybersecurity frameworks. I'm adept at adapting to challenges and possess strong problem-solving skills, bolstered by technical and analytical proficiency. My track record includes enhancing organizational security by safeguarding sensitive data and critical assets from cyber threats. I'm well-versed in securing information, networks, applications, and business data, along with skills in IT project management, GRC, business continuity, disaster recovery planning, systems integration, and data analytics.

Areas Of Expertise

• Security Architecture Planning

• Incident Response Management

(DFIR)

• IT & Virtualization

Infrastructure

• Cloud Security Engineering

Azure, GCP, and AWS

• Firewall/WAF, VPN, ID/PS, DLP,

Cluster Mgmt

• CRM Software: Salesforce,

ServiceNow, Jira,

• Security Automation/Configuration

• Identity & Access Management

• Data & Information Management

• Governance, Risk, and Compliance

• Vulnerability and Risk

Management

• Multilayer Security Solutions

• Security Auditing & Documentation

• Security Policy/Framework Execution

• Security Awareness Training

Programs (SOPs)

• AD, AAD, Microsoft Conditional Access

Technical Proficiencies

Security Tools/Frameworks: SIEM: Azure Sentinel, Splunk, Simplify SOAR EDR/XDR/MDR/EPP: Crowdstrike, Microsoft Defender, Harmony Endpoint and Cortex XR OpenSSL Wireshark

Networking Systems Protocols: TCP/IP Routing Protocols: RIP, OSPF, EIGRP, IGRP, BGP DNS/DHCP SNMP Operating Systems/DBMS: Windows Linux server SQL Virtualization Technologies: VMware VirtualBox Hypervisor Resources Management Tools: IAM PIM PAM DLP CASB SASE Azure Resource Manager Threat Hunting & Modeling: Microsoft STRIDE PASTA Framework Cybersecurity/ATTACK

Frameworks and Laws:

MITIR DIAMOND MODEL Lockheed Martin Cyber Chain Unified Key Chain NIST ISO 27001/27002 COBIT COBIT 5 CSF SOX PCI DSS GDPR SOC2 CIS Controls PIPEDA CASL CISA CSA

Professional Experience

WCG Services Feb 2022 – Present

Cyber Security Analyst

Identify and respond to potential threats by proactively monitoring security events and alerts. Analyze network traffic, investigate and document security incidents, and provide expert recommendations to stakeholders regarding IT-related issues. Maintain compliance with security policies and standards by collaborating with cross-functional teams, including IT, legal, compliance, and business units. Remain abreast of the latest trends, threats, and vulnerabilities in cybersecurity. Notable Contributions/Accomplishments:

● Monitor security alerts and incidents, investigate and analyze potential threats to identify patterns and trends, and initiate timely response actions to mitigate risks.

● Analyze identified malicious activity to determine Tactics, Techniques, and Procedures (TTPs), gather indicators of compromise (IOC), and any relevant information.

● Conduct thorough vulnerability assessments and penetration testing, presenting actionable recommendations to fortify the organization's security framework.

● Collaborate with cross-functional teams to develop and implement effective security measures, policies, and incident response plans, enhancing overall cyber resilience.

● Enforced access governance and compliance by defining access policies, conducting regular access reviews, and maintaining adherence to security standards and industry regulations.

● Actively participate in, and potentially take the lead in, conducting gap assessments, ensuring compliance readiness, and overseeing compliance monitoring activities.

● Perform regular security audits and assessments, ensuring compliance with industry standards and regulations, and driving continuous improvement in the security posture. Check Point Software Technologies Sep 2020 – Feb 2022 Network Security Analyst

Coordinated and led response to security incidents, ensuring containment, eradication, and recovery procedures. Implemented strategic network solutions to address security gaps identified through vulnerability scanning tools and techniques, including penetration testing, port scanning, network analyzer, and Nessus.

Notable Contributions/Accomplishments:

● Ensured network security by analyzing firewall, email, web, and DNS logs, identifying and mitigating intrusion attempts, and maintaining network security posture.

● Architected, engineered, and executed network security infrastructure by leveraging expertise in firewalls, web application firewalls (WAF), and intrusion prevention systems (IPS).

● Developed and deployed secure network architectures, configured VPNs for secure remote access, and ensured data confidentiality, integrity, and access.

● Protected Active Directory infrastructure by implementing stringent access controls, executing multi-factor authentication (MFA), and regularly reviewing/updating security policies.

● Drove continuous improvement and network security optimization by conducting post-incident analysis.

● Enabled employees to identify and address security threats by planning and conducting comprehensive security awareness programs and training sessions. Sophos Cyber Security Dec 2018 – Sep 2020

SOC Analyst

Analyzed security events, logs, and alerts from multiple sources, such as intrusion detection systems

(IDS), security information and event management (SIEM) tools, and threat intelligence feeds. Evaluated security event logs and data from the network, including IDS, IPS, and SIEM. Conducted traffic analysis using vulnerability assessment tools, such as Nessus, Aircrack Acunetix, and Qualys. Implemented firewall-related changes to client service requests, while following security approvals and relevant change management processes.

Notable Contributions/Accomplishments:

● Identified and mitigated intrusion attempts by searching firewall, email, web, and DNS logs.

● Investigated malicious phishing emails, domains, and IPs through Open-Source tools; provided recommendations for effective blocking based on analysis.

● Detected indicators of compromise and performed investigations to assess and mitigate advanced threats.

● Received recognition for outstanding performance in analyzing and mitigating significant security incidents, leading to enhanced confidence in the organization's security capabilities.

● Conducted regular vulnerability assessments and scans across systems and applications, identifying potential security weaknesses and recommending mitigation strategies. Education

Advanced Diploma Networking and Cyber Security, Dec 2018 Willis College Ottawa, ON, Canada

Business Management Pgd, Apr 2016

Algonquin College Ottawa, ON, Canada

BSc Management Sciences, Apr 2014

University of Port-Harcourt

Certifications

● CISSP (in-view) by November

● CCNA Cisco Certified Network Associate

● CCSA Certified Check Point Security Associate



Contact this candidate