Anthony Odii
*******@*****.***, *******@*****.***
Los Angeles ca 90002
Summary
A highly motivated employee with a desire to take on new challenges. Strong work ethic, adaptability, and exceptional interpersonal skills. Adept at working effectively unsupervised and quickly mastering new skills.
Education
Herzing University
Rapids Wisconsin
Master’s degree (In view)
May 2025
University of California (UCLA Extension)
Los Angeles California
SIEM/Cybersecurity
October 2023
Imo State University Owerri Nigeria
Bachelor’s in economics
November 2004
SKILLS
Container Tools: Docker, Kubernetes.
Data Analysis/Monitoring tools: Splunk, CloudWatch, CloudTrail, VPC Flow Logs, Azure WAF Logs, SNS, SolarWinds, Wireshark
Operating System (EC2): Ubuntu, Kali Linux, Red Hat, Debian, Windows, Windows server, Apache, Centos, Azure Linux
IAC Tools: Docker, Kubernetes
Forensic: Autopsy
Data Analysis and Security
Languages: YAML, JSON, HCL, HTML, PHP, JAVASCRIPT, BASH
Version control: Git, Gitlab
CI/CD Tools: GitHub, GitLab, Jenkins, Maven, SonarQube, Nessus, Ansible, Apache
Encryption: cryptographic methods and tools, John the Reaper.
Vulnerability Scanning Tools: Burp suite, Qualys, Nessus, Shodan io, Metasploit, Nmap, Nuclei, Wireshark.
Azure Cloud: Infrastructure as a service (IAAS)
Azure VMs, AKS
GCP VMs, IAM, GKE
Databases: RDS, MySQL, Microsoft SQL servers.
Networking: LAN, WAN, Internet, Proxy/Filtering, Firewall, VPN, DMZ, SNORT
Networking Protocols: TCP/IP, SNMP, SMTP, NTP, DNS, LDAP
Presentations
Risk Management
Critical Thinking
Analytica Skills
Data Analysis
CRM Systems
Forecasting and Planning
Extra-Curricular & Certifications
CompTIA Security+
Splunk core certified user
SIEM/Cybersecurity (UCLA).
Microsoft Certified:(Azure)
Datacom Cybersecurity Job Simulation on Forage - November 2023.
Completed a simulation focused on how Datacom's cybersecurity team helps.
protect its clients.
Investigated a cyberattack and produced a comprehensive report documenting findings and outlining key recommendations to improve a client's cybersecurity posture.
Conducted a comprehensive risk assessment.
Information Technology Security Analyst
Prime healthcare services (Centinela Hospital Medical Center) Inglewood Ca
October 2020 - Current
Developed and implemented security policies and procedures.
Monitored network traffic to detect suspicious activities or policy violations.
Analyzed system logs and identified potential threats or risks.
Implemented access control measures to protect information assets.
Performed vulnerability scans on systems, networks, applications and databases.
Conducted regular risk assessments to identify vulnerabilities in systems, networks, applications and databases.
Maintained up-to-date knowledge of emerging cyber threats, attack vectors, malware trends.
Configured firewalls according to best practices standards for secure data transmission.
Managed user authentication and authorization of data access.
Analyzed system risk to identify and implement appropriate security countermeasures.
Built firewalls and encrypted data to secure confidential information.
Researched, planned and implemented small- and large-scale improvements to address changing conditions and needs.
Application Security Analyst (SME)
Alliance Protective services
March 2018 – September 2020
Performed regular vulnerability scans on the network to identify any potential weaknesses or risks.
Monitored network traffic for suspicious activity using intrusion detection systems and firewalls.
Maintained up-to-date knowledge of security trends, threats, and vulnerabilities.
Developed and implemented security policies, standards, and procedures to ensure information systems security.
Conducted periodic risk assessments to identify areas of improvement in the organization's security posture.
Managed user authentication and authorization of data access.
Monitored server event logs to identify and resolve performance and security issues.
Built firewalls and encrypted data to secure confidential information.
Supported users with in-person and remote technical assistance.
Duplicated and backed-up data to preserve availability and security in the event of a data breach.
IT Security Specialist
Star Alliance Security LLC
February 2016-March 2018
Monitored network activity to identify potential security issues or breaches.
Analyzed system logs and identified possible security concerns.
Provided technical guidance in responding to computer security incidents.
Conducted vulnerability assessments of systems, networks, and applications.
Installed anti-virus software, firewalls, and other related systems to protect data integrity.
Investigated suspicious activities or events on the network to determine their impact on security posture.
Assisted with system design reviews to ensure compliance with established security requirements.
Developed strategies for mitigating risk associated with various threats such as malware or phishing attacks.
Evaluated existing software applications for potential vulnerabilities before deployment.
Maintained up-to-date knowledge of current industry trends in the information technology security field.
Protected secure data files and regulated access.
Built firewalls and encrypted data to secure confidential information.
Infosec Analyst (Cement Sales Department)
Sunrise Investment Limited Abuja FCT Nigeria
September 2012- October 2015
Ensured compliance with industry regulations such as HIPAA or PCI DSS.
Developed strategies for responding to various types of attacks such as phishing emails or malicious websites.
Conducted penetration testing exercises to assess the effectiveness of existing controls against real-world threats.
Managed user authentication and authorization of data access.
Monitored server event logs to identify and resolve performance and security issues.
Analyzed system risk to identify and implement appropriate security countermeasures.
IT Operations Analyst (Risk Management group)
First City Monument Bank Plc Abuja FCT Nigeria
June 2009- August 2012
Prepared detailed reports on the financial status of clients' investments.
Analyzed trends in financial performance to identify areas for improvement.
Reviewed financial documents and records to assess accuracy and compliance with applicable laws, regulations, and standards.
Provided advice on insurance coverage, estate planning, and tax strategies.
Analyzed financial data and projections to develop comprehensive financial plans for clients.
Developed retirement strategies tailored to each client's needs and objectives.
Researched potential investments such as stocks, bonds, mutual funds, annuities, and other securities.
Conducted regular reviews of clients' financial plans to ensure that their goals were being met or adjusted accordingly.
Leveraged knowledge of retirement modeling, investments, and risk management to serve as an SME.
Gathered and distilled financial data, preparing reports and presentations for periodic leadership reviews.
Followed up with clients regularly and implemented consultative techniques to stay on top of financial means and objectives.