Post Job Free
Sign in

Cyber Security Business Development

Location:
Rockville, MD
Posted:
November 25, 2024

Contact this candidate

Resume:

Page * of *

ALBERT A. ADEBAYO

Silver Spring, MD Phone: 301-***-****

Email: ********@*****.***

LinkedIn: http://www.linkedin.com/in/albert-adebayo-824b828/ PROFESSIONAL PROFILE

• Subject matter expert with a 17-year record of success leading complex, large-scale federal and commercial IT and cybersecurity programs to deliver results with an eye toward protecting high value assets and driving cyber security investments

• Highly skilled at creative problem solving, motivating employees, and relationship building for the successful achievement of business goals AREAS OF EXPERTISE

• IT Governance

• IT Strategic Planning

• IT Compliance

• Leadership

• Business Process Improvement

• Risk Management

• Change Management

• Contract Management

PROFESSIONAL ACCOMPLISHMENTS

US Business Development and Government Relations Director 5/2020 – Present World Health Access (WHA)

• Develop network of key decision makers, industry stakeholders, strategic partners, political, and government agency contacts; and manage pipeline of enterprise opportunities

• Evaluate strategic priorities and participate in strategy planning with Vice President of Strategy & Development

• Create and implement horizontal market solutions for WHA VaxPass® technology

• Monitor federal and state hearings and briefings for new developments in political and regulatory environments; and analyze impact to business strategy and operational plans

• Provide strategic direction to communications and marketing teams for effective messaging Project Manager 9/2018 – 4/2020

Dragonfli Group/Accenture Federal Services

Client: United States Department of Labor (DOL)

• Facilitated cybersecurity strategic planning meetings with Department of Homeland Security

(DHS) and DOL executive leadership to establish cybersecurity priorities, and to formulate and execute DOL’s IT strategic plan

• Managed a team of senior Splunk engineers, cybersecurity analysts, and Security Operations Center (SOC) staff to develop and implement a four-phased Continuous Monitoring as a Service

(CMAAS) Framework as a part of the government-wide continuous monitoring and diagnostic

(CDM) program

• Created a CDM Dashboard integrated with the Agency-Wide Adaptive Risk Enumeration

(AWARE) score algorithm to provide federal executives with real-time metrics reporting on the discrete security posture for all DOL systems

• Conducted quarterly and annual reviews to ensure DOL’s Office of the Chief Information Officer

(OCIO) compliance with the Federal Information Security Management Act of 2002 (FISMA) Page 2 of 3

using NIST SP 800-53 Security and Privacy Controls for Federal Information Systems and Organizations guidance

• Managed testing of over 170 IT security controls to assess system vulnerabilities enterprise-wide

• Resolved 40 percent of identified critical operational deficiencies within one year

• Created and tracked 54 IT POAMs through closure using the Department of Justice proprietary Cyber Security Assessment and Management (CSAM) system

• Enhanced security and reporting capabilities for all agencies within DOL using CDM tools like Big Fix, Tenable, Forescout with Splunk Heavy Forwarder layer to update and aggregate agency- level dashboards into DOL’s enterprise-wide IT dashboard

• Oversaw the operations, maintenance, and upgrades of monitoring equipment, diagnostic sensors, tools, and dashboards

Lead Cyber Security and Vulnerability Specialist 2/2014 – 8/2018 Cybersoft Technologies

Client: United States Department of Agriculture

• Managed a team of 12 IT security consultants to conduct threat and vulnerability assessments for over 40 USDA systems

• Documented findings via security Assessment Reports (SARs) and tracked POAMs to remediate over 120 IT security deficiencies across the Department

• Reviewed vulnerability scans and endpoints protection logs to identify and mitigate system vulnerabilities weekly

• Implemented System Development Lifecycle (SDLC) best practices to document system requirements and manage the change request process

• Conducted gap analyses to identify additional controls needed for assessment in continuous monitoring phase

• Deployed security patches using IBM Big Fix and Microsoft SCCM for Remediation

• Monitored controls post authorization to ensure continuous compliance with the security requirements

• Managed vulnerability tools to include Retina, Nexpose, Nessus Security Center and Microsoft Baseline

Vulnerability Analyst

Bonview Consulting Group 10/2008 – 2/2014

• Conducted network vulnerability assessments, using Nessus vulnerability scan to identify system vulnerabilities and reported findings to management

• Developed POAMs and new security procedures

• Conducted continuous monitoring of systems security and overall data integrity across all the organization’s network systems

• Develop new and updated existing security policies, procedures and technical standards including corporate compliance

AGN Inc. 10/2003 – 10/2008

Consultant

• Created the Real Estate Security Assessment Plan (RESAP) for Remax, Inc. and updated the RESAP annually

• Conducted cybersecurity assessments for systems across Remax’s commercial and residential real estate portfolio, including Remax’s extended enterprise of third-party vendors

• Conducted bi-weekly system security awareness training; and implemented security fundamental procedures for data protection in real estate lending

• Directed borrower seminars on credit privacy for ten non-profit and for-profit organizations Page 3 of 3

Cyborg Systems Inc. 11/2001 – 10/2003

Senior Consultant/Account Executive

• Developed and implemented Payroll and Human resources systems applications for several commercial clients

• Integrated Cyborg system application Interface with Oracle v.7.3 for client system platforms

• Wrote backend Procedural SQL (PLSQL) to provide business logic in a non-index environment

• Managed software installation, data migration, and system upgrades for Year 2000 (Y2K) compliance

• Performed application tuning and performance monitoring to eliminate SQL bottlenecks

• Ran data conversion programs to convert data to Year 2000 (Y2K) format Applying program temporary fixes

EDUCATION

M.S., Joint Military Operations 2020

United States Naval War College – Newport, Rhode Island B.S., Civil Engineering 1992

University of Maryland University College – Adelphi, MD CERTIFICATIONS

ISC Certified Authorization Professional (CAP) Active MILITARY AFFILIATION

United States Navy Reserve 1994 – 2002



Contact this candidate