Kingsley R. Okeke
Cyber Security Analyst
adzras@r.postjobfree.com
With 5 years of experience, I excel in identifying and mitigating information security risks using cutting-edge technologies and cybersecurity frameworks. I'm adept at adapting to challenges and possess strong problem-solving skills, bolstered by technical and analytical proficiency. My track record includes enhancing organizational security by safeguarding sensitive data and critical assets from cyber threats. I'm well-versed in securing information, networks, applications, and business data, along with skills in IT project management, GRC, business continuity, disaster recovery planning, systems integration, and data analytics.
Areas Of Expertise
• Security Architecture Planning
• Incident Response Management
(DFIR)
• IT & Virtualization
Infrastructure
• Cloud Security Engineering
Azure, GCP, and AWS
• Firewall/WAF, VPN, ID/PS, DLP,
Cluster Mgmt
• CRM Software: Salesforce,
ServiceNow, Jira,
• Security Automation/Configuration
• Identity & Access Management
• Data & Information Management
• Governance, Risk, and Compliance
• Vulnerability and Risk
Management
• Multilayer Security Solutions
• Security Auditing & Documentation
• Security Policy/Framework Execution
• Security Awareness Training
Programs (SOPs)
• AD, AAD, Microsoft Conditional Access
Technical Proficiencies
Security Tools/Frameworks: SIEM: Azure Sentinel, Splunk, Simplify SOAR EDR/XDR/MDR/EPP: Crowdstrike, Microsoft Defender, Harmony Endpoint and Cortex XR OpenSSL Wireshark
Networking Systems Protocols: TCP/IP Routing Protocols: RIP, OSPF, EIGRP, IGRP, BGP DNS/DHCP SNMP Operating Systems/DBMS: Windows Linux server SQL Virtualization Technologies: VMware VirtualBox Hypervisor Resources Management Tools: IAM PIM PAM DLP CASB SASE Azure Resource Manager Threat Hunting & Modeling: Microsoft STRIDE PASTA Framework Cybersecurity/ATTACK
Frameworks and Laws:
MITIR DIAMOND MODEL Lockheed Martin Cyber Chain Unified Key Chain NIST ISO 27001/27002 COBIT COBIT 5 CSF SOX PCI DSS GDPR SOC2 CIS Controls PIPEDA CASL CISA CSA
Professional Experience
WCG Services Feb 2022 – Present
Cyber Security Analyst
Identify and respond to potential threats by proactively monitoring security events and alerts. Analyze network traffic, investigate and document security incidents, and provide expert recommendations to stakeholders regarding IT-related issues. Maintain compliance with security policies and standards by collaborating with cross-functional teams, including IT, legal, compliance, and business units. Remain abreast of the latest trends, threats, and vulnerabilities in cybersecurity. Notable Contributions/Accomplishments:
● Monitor security alerts and incidents, investigate and analyze potential threats to identify patterns and trends, and initiate timely response actions to mitigate risks.
● Analyze identified malicious activity to determine Tactics, Techniques, and Procedures (TTPs), gather indicators of compromise (IOC), and any relevant information.
● Conduct thorough vulnerability assessments and penetration testing, presenting actionable recommendations to fortify the organization's security framework.
● Collaborate with cross-functional teams to develop and implement effective security measures, policies, and incident response plans, enhancing overall cyber resilience.
● Enforced access governance and compliance by defining access policies, conducting regular access reviews, and maintaining adherence to security standards and industry regulations.
● Actively participate in, and potentially take the lead in, conducting gap assessments, ensuring compliance readiness, and overseeing compliance monitoring activities.
● Perform regular security audits and assessments, ensuring compliance with industry standards and regulations, and driving continuous improvement in the security posture. Check Point Software Technologies Sep 2020 – Feb 2022 Network Security Analyst
Coordinated and led response to security incidents, ensuring containment, eradication, and recovery procedures. Implemented strategic network solutions to address security gaps identified through vulnerability scanning tools and techniques, including penetration testing, port scanning, network analyzer, and Nessus.
Notable Contributions/Accomplishments:
● Ensured network security by analyzing firewall, email, web, and DNS logs, identifying and mitigating intrusion attempts, and maintaining network security posture.
● Architected, engineered, and executed network security infrastructure by leveraging expertise in firewalls, web application firewalls (WAF), and intrusion prevention systems (IPS).
● Developed and deployed secure network architectures, configured VPNs for secure remote access, and ensured data confidentiality, integrity, and access.
● Protected Active Directory infrastructure by implementing stringent access controls, executing multi-factor authentication (MFA), and regularly reviewing/updating security policies.
● Drove continuous improvement and network security optimization by conducting post-incident analysis.
● Enabled employees to identify and address security threats by planning and conducting comprehensive security awareness programs and training sessions. Sophos Cyber Security Dec 2018 – Sep 2020
SOC Analyst
Analyzed security events, logs, and alerts from multiple sources, such as intrusion detection systems
(IDS), security information and event management (SIEM) tools, and threat intelligence feeds. Evaluated security event logs and data from the network, including IDS, IPS, and SIEM. Conducted traffic analysis using vulnerability assessment tools, such as Nessus, Aircrack Acunetix, and Qualys. Implemented firewall-related changes to client service requests, while following security approvals and relevant change management processes.
Notable Contributions/Accomplishments:
● Identified and mitigated intrusion attempts by searching firewall, email, web, and DNS logs.
● Investigated malicious phishing emails, domains, and IPs through Open-Source tools; provided recommendations for effective blocking based on analysis.
● Detected indicators of compromise and performed investigations to assess and mitigate advanced threats.
● Received recognition for outstanding performance in analyzing and mitigating significant security incidents, leading to enhanced confidence in the organization's security capabilities.
● Conducted regular vulnerability assessments and scans across systems and applications, identifying potential security weaknesses and recommending mitigation strategies. Education
Advanced Diploma Networking and Cyber Security, Dec 2018 Willis College Ottawa, ON, Canada
Business Management Pgd, Apr 2016
Algonquin College Ottawa, ON, Canada
BSc Management Sciences, Apr 2014
University of Port-Harcourt
Certifications
● CISSP (in-view) by November
● CCNA Cisco Certified Network Associate
● CCSA Certified Check Point Security Associate