Post Job Free
Sign in

Risk Management Technical Support

Location:
Arlington, TX
Posted:
January 07, 2025

Contact this candidate

Resume:

GBOLAHAN RAJI

***************@*****.*** · 214-***-****

Grand Prairie TX ·

I am a dynamic and detail-oriented Security professional with three years of experience in cybersecurity and risk management. I am seeking a challenging position that will allow me to leverage my skills in identifying, assessing, and mitigating IT risks to enhance organizational security and efficiency.

SKILLS

-Risk Assessment and Management

-Information Security

-Access Control

- Network Security

- Disaster Recovery Planning

- IT Auditing - Vulnerability Assessment

- Penetration Testing

- Technical Support

- Project Management

- Strong Analytical Skills

- Excellent Communication Skills

-Microsoft Office Suite

EDUCATION

DEC 2024

BACHELOR OF SCIENCE, University of Texas Arlington

AUG 2019

ASSOCIATES OF ART, Tarrant County College

EXPERIENCE

AUGUST 30TH 2021- PRESENT

RISK ANALYST, IPCONNECT SOLUTIONS

- Identify and assess IT risks, developing strategies to mitigate potential threats.

- Implement risk management frameworks and conduct regular audits to ensure compliance with industry standards.

- Coordinate with various departments to enhance risk awareness and foster a proactive risk management culture.

- Manage IT security projects, including deploying new security measures and technologies.

- Analyze security breaches and assist in the mitigation and reporting processes.

-Verify there is a documented incident response plan that will guide an organization in managing any event

- Develop and maintain disaster recovery plans to ensure business continuity.

-Review systems services to ensure all insecure protocols (FTP, Tel-net HTTP, etc.) are disabled per the organization’s Information Technology Security Policy.

-Interview system and application administrators to ensure that roles created in the system are based upon Role Base Access Control (RBAC)

-Conduct vulnerability assessments and penetration testing to identify security weaknesses.

- Monitor network traffic for suspicious activity and respond to security incidents.

- Implement and manage security policies, procedures, and controls.

- Collaborate with IT teams to ensure the secure configuration of systems and applications.

- Provide training and support to staff on cybersecurity best practices.

-Conduct Data integrity assessment by reviewing application GUI, field validation, completeness check, character length, etc.

- Design and enforce security protocols, procedures, and standards

Confirm that audit logs are enabled or that the system or application in review captures log data and sends it to a centralized log server. Also, ensure user events such as actions performed by the user, user ID, Time of activity, etc. are captured and sent to the centralized logging server.

Validate the adequacy of access control to the production environment by ensuring developers do not have access to it and that all access is strictly on a need-to-know basis.

- Verify mitigating controls and a risk acceptance letter are in place if a system cannot be patched/updated due to the risk of a compromise.

- Implement, manage, and maintain security controls across AWS environments.

CERTIFICATIONS

-CISA certification in waiting

-AWS certification in waiting

REFERENCES AVAILABLE UPON REQUEST



Contact this candidate