Post Job Free
Sign in

Risks Analyst

Location:
Irving, TX, 75062
Posted:
December 18, 2024

Contact this candidate

Resume:

Davies OZIEGBE

Davies Oziegbe Cell 469-***-**** E MAIL ******.********@*****.***

PROFESSIONAL SUMMARY

.

●Cyber Resilience

●IT Compliance and Risk Management

●Soc 1 and Soc 2 Compliance

●Security and Privacy Control

●Agile

●Security Awareness Training and Program management.

●Third Party Risk Management

●Vulnerability Management and Scanning

●OWASP Top Ten Risks and Security Best practices

●IT Risk Assessments and Audits

●Authentication Protocols and Availability management.

Applications & Tools: MAS360, AD Manager, AD Audit, SolarWinds, MS Azure, SCCM, vSphere Hypervisor, ESET NOD32, McAfee, Kaspersky, Trend-Micro, and Viper Anti- Virus, ServiceNow.

Symantec Intruder Alert, Symantec Endpoint, Symantec Enterprise Security Management, Active Directory/ GPO Policies, Symantec Ghost, EFS Encryption, PKI, PGP Software, Net IQ, Wireshark, Splunk

Operating Systems: UNIX/Linux, Windows

Regulations: SOX, GLBA, PCI-DSS, HIPAA, HITRUST,GDPR,FFIEC and FISMA

Security Tools: CyberArk, Qualys, Imperva, QRadar, Nipper, Nessus,Nmap, Jira

Standards: ISO 27001, ISO 27000,ISO 27005, ISO 8583, COBIT 5,COSO, NIST 800-30,800-53,800-37,800-18,800-171, 800-137 and FedRAMP

GRC Tools: RSA Archer eGRC, MetricStream, Openpages, ServiceNow

GW TECH, TX

Nov 2021 till Present Senior Professional Information Security

Conduct comprehensive risk assessments to identify and classify risks, prioritizing management strategies to address business needs and ensure effective mitigation.

Develop and maintain System Security Plans (SSPs), updating them annually to reflect current security measures and compliance requirements.

Design and implement a global security awareness program, covering critical topics across information security and risk management, with performance metrics to assess success.

Review and analyze vendor service profiles, ensuring that standardized information gathering (SIG) questionnaires are completed during onboarding and periodic assessments.

Lead the deployment of RSA Archer GRC and Agile suites to streamline risk management, security, IT risk management, third-party governance, and regulatory compliance.

Integrate widely recognized frameworks such as NIST 800-53, ISO 27001, COBIT, and others to recommend and implement mitigating controls to meet regulatory compliance requirements (e.g., SOX, GLBA, HIPAA, PCI-DSS).

Coordinate with legal, vendor management, and information security teams to ensure compliance with regulations and laws regarding data protection and security.

Oversee privacy impact assessments for cloud solutions containing Personally Identifiable Information (PII), ensuring alignment with GDPR and other privacy regulations.

Conduct risk assessments on third-party service providers (cloud and on-premise) to evaluate and mitigate risks related to data security, including Business Associate Agreement (BAA) and Workforce Optimization (WO) reviews.

Perform network and application security assessments to ensure compliance with HIPAA, PCI-DSS, and SOX standards, identifying vulnerabilities and recommending remediation.

Facilitate ongoing threat and vulnerability identification, ensuring timely and effective mitigation across the IT infrastructure.

Assist management in the evaluation of new technology service providers and third-party service providers

Develop, Implements, Monitor and report performance measures that demonstrate value and ensure vendor performance

Conduct privacy impact analysis to determine privacy compliance status for cloud solutions with PII based on compliance with General Data Protection Regulation.

Tested for the Operating Effectiveness of IT security controls in cloud and on premise vendor environment.

Performed risk assessment on third party cloud service provider and on –premise to ensure data safety and security. Also conduct a BAA and WO review.

Performs Network and application Security Assessment where reviews are made in compliance with HIPAA,PCI-DSS and SOX standards while defining the scope as required

Threat/vulnerability identification and mitigation where necessary.

SWANSTON CONSULTING TX

March 2018– November 2021 IT Security & Compliance Analyst

Developed incident, preventative incident, preventative incident tickets and reports.

Conducted live migration drills with sustain teams and advisor call centers to test response time of teams.

Documented and tracked the timeline of events that occurred in the process to resolution for each of the incidents managed in support of post mortem/root cause analysis.

Involved with architectural and network team to install and tune intrusion detection systems to match organizations security posture.

Institute Information Security awareness training.

Conduct risk assessments and business impact analysis to mitigate the risk of information loss and determine gaps in Information security processes and procedures.

Involved in risk assessments on PCI DSS,HIPAA,SOX 302,404 and GLBA standards

Establish and maintain working relationship with business to provide guidance on security measures around business processes.

Design and ensure implementation of approved access control measures to the different application support teams, third party vendors on and offshore.

Liaise with business operations to proactively assess security policy compliance and monitor risks.

Coordinate and perform compliance audits in accordance with information protection, data asset and threat provision under the Gramm-Leach-Billey and Sarbanes Oxley Acts

Coordinate external/3rd party audits, including PCI DSS,Incident Response Planning, and Business Process Improvement reviews.

Manage internal IT audit engagements including system platform audits, PCI and HIPAA Compliance Readiness reviews, IT Risk Assessments, change management, and business process control assurance.

CHECKPOINT SOFTWARES TX November 2017-February 2018 Technical Advisor

Independently identify, troubleshoot, document, replicate customer’s network security and vpn in an enterprise environment R77.30 and R80.10 checkpoint firewall using Siebel ticketing system

Managing and monitoring firewall management server in an enterprise environment

Log monitoring in R77.30 and R80.10 checkpoint firewall

Troubleshoot TCP/IP network using relevant protocols in linux and window environments

Responsible for providing support in Checkpoint R77.30 and R80.10 software environment

Assessed and analysed the risks and exposures for several types of network architecture system designs (WAN/LAN),management server, internet, vpn and wireless(802.11)telephony, ensuring data is sent through secure protocols to protect critical company assets and resources

Troubleshoot and resolve network connection issues focusing on network diagnostic

Escalate complex network problems in accordance with internal processes

COLINK LLC TX

January 2015 –November 2017 Senior IT Risk Analyst

Updates System Security Plans (SSP) Using NIST 800-18 as a guide to develop SSP, Risk Assessments and Incident Response Plans

Provide services as security control assessor (SCA), an integral part of the Assessment & Authorization process that includes A&A scanning, documentation, reporting and requirements analysis

Monitor Security Controls leveraging NIST 800-137 in order to perform periodic vulnerability scanning and test portions of applicable security controls annually

Review and document contingency plans (CP), privacy impact assessments (PIA) and risk assessment (RA) documents per NIST 800 guidelines for various agencies

Perform Continuous Monitoring (CONMON)NIST 800-137 tasks for the purpose of identifying & reporting new findings to clients via vulnerability assessment reports.

Applied Risk Management Framework (RMF) Using NIST 800-37 as guide to System Life Cycle Approach for Security and Privacy.

Applying NIST 800-53 for Security and Privacy Controls. Also applying NIST 800-50 for Security Awareness and Training Program

Ensured security controls were implemented correctly, executed per design and provided appropriate results

Experienced with CSAM for assessments and uploading artifacts in security documents

Supported DEV OPS efforts as point of contact for all clients and user requests

Performed testing, QA, and reported defects via JIRA

Review firewall systems, cyber security controls, authentication mechanisms, remote access, protocols, applications, networks, operating systems, servers and all other relevant aspects of securing IT operations for corporate and client data

Assist with Security and IS management, the Legal department, Fraud department, Human Resources and law enforcement agencies to manage security vulnerabilities or inquiries.

OMNIGREAT TRAINING AND CONSULTING MN

July 2013-January 2015 Security Analyst

Performed vulnerability assessments using client provided security compliance scans and POA&M

Leveraged analysis results to identify and resolve anomalies with validation script, facilitating close out of findings to meet ATO due dates

Reviewed and processed manual security artifacts provided by system engineers via IV&V efforts

Developed dashboard tracker to manage received artifacts using approved Open Source Tools

Utilized Splunk machine learning capabilities to analyze logs, research incidents, and provide feedback to management (Non-Prod)

Assist Information Security Engineer with complex risk decisions and provide advice and guidance where required.

Conduct meetings, interview control owners, generate documentation request lists, evaluate documentation and prepare recommendations for improvement.

Demonstrates advance understanding of organization's Information Security, Cyber Security and Business Continuity Management to clients during onsite visit, speaking on conference calls, email responses and completing client’s questionnaire

Develop and manage the Information Security delivery of the Vendor Risk Assessment program.

Develop infrastructure and IT Process assessments for use across the organization's computing environment.

Document risk issues in the designated risk register

Engage with technical process owners to understand technical process steps, identify risk, and drive toward a completed documentation that aligns with the IT Governance and Risk Management programs

AMATIMBA RESOURCES INC SA

JULY 2011-JULY 2013 IT Business Analyst

Assisted in writing Test Plans, Test Cases and participated in User Acceptance Testing.

Compliance attestation testing of financially significant applications for Change Control and Logical Access processes.

Conducted security assessments to determine the effectives of planned and implemented security controls.

Developed maps, workflow diagrams and flowcharts of current and future business processes.

Ensured preventative and predictive maintenance programs are developed /established and functioning efficiently to support operation requirements.

Evaluated client’s key IT processes such as change management, systems development, computer / data Centre operations and managing security at database, network and application layers.

Facilitated Change management Process from Request for Change (RFC) to implementation and review.

Identified areas for business improvements.

Organized meetings with system owners prior to assessment schedules.

Performed all aspect of verification including feature testing, functional testing, unit testing, regression, load and performance testing.

Performed systems security evaluations, audits, and server logging reviews to verify secure operations.

Reviewing internal policies and procedures and existing laws, rules and regulations to determine applicable compliance and the adequacy of underlying internal controls.

Mahatma Gandhi University, INDIA

Bachelor of Science (Honours), Information Technology

University of South Africa,RSA

Certificate, Project Management

Cisco Certified Network Associate CCNA

Cisco Certified Network Professional CCNP SECURITY

CompTIA A+

CompTIA Network+

ITIL

CISA

CISM

Pending Certifications

CRISC

CISSP

CORE COMPETENCIES

SKILLS & TOOLS

PROFESSIONAL EXPERIENCE

EDUCATION

PROFESSIONAL CERTIFICATIONS



Contact this candidate