Name: Alex Abazie
Email: ********@*****.***
Cell: 908-***-****
LinkedIn.com/in/alex-abazie-3252a227a6-0006 Elizabeth, NJ 07202
Professional Profile ( CYBER SECURITY )
IT Cybersecurity Analyst with over 5 years of experience performing research, analysis, and troubleshooting to identify, resolve, and remediate security issues. I performed risk and Incident Management, and IT compliance support across the Enterprise Infrastructure. I am highly motivated, organized, result and detail-oriented with excellent interpersonal, communication, and presentation skills. I possess a unique combination of technical abilities, communication skills, and the ability to multitask that allows me to collaborate with end-users or stakeholders with the main focus on maintaining a high quality security system.
EDUCATION
●MSc (Masters of Science in International Relations & Diplomacy)-Ahmadu Bello University, Nigeria
●BSc (Bachelor of Science in Government & Public Administration)-Abia State University,Nigeria
MEMBERSHIP & CERTIFICATIONS
●CompTIA Security+- Certified March 2023
●CISSP (Candidate)
●CompTIA -Member
TECHNICAL SKILLS
Security Technologies: Nessus Security Center, Nmap, Wireshark, IDS/IPS; Log Management, Anti-Virus Tools; (Norton, Symantec).
Application: MS Office (Word, Excel, Outlook, PowerPoint, Access); Wireshark, NMAP, Nessus, ArcSight, SharePoint, Google Docs
Operating Systems: Unix-Based Systems (Linux); Windows.
Software: MS Office (Word, Excel, Outlook, Access, PowerPoint)
Ticket Systems: ServiceNow, Remedy
Professional Experience
Alpha Technology Group, MD; Cybersecurity Analyst Oct 2022 – Present
●Daily review of logs and alerts from IDS/IPS devices, DLP system.
●Supports the development and delivery of Information security education and awareness.
●Coordinates with vendors and third parties to manage information security risks
●Develops risk assessment reports, identifying threats and vulnerabilities in systems.
●Conducts security control Assessments to assess the adequacy of implemented management, operational, privacy, and technical security controls.
●Performs system risk management following the NIST risk management framework
●Perform incident response to investigate and resolve computer security incidents.
●Assists with developing processes and procedures to improve incident response times, analysis of the incident, and overall, SOC functions.
AbiaHealth Inc Nig ; Health Information security Analyst- Dec. 2020- Oct. 2021
●Conducted Network Security Monitoring on services including firewall, Web Application Firewall, Data Loss Prevention, and IDS/IPS.
●Analyzed information security systems and applications and recommended and developed security measures to protect information against unauthorized modification or loss.
●Prepared security assessment report (SAR) High-lighting gaps or areas of vulnerability and recommended mitigations
●Supported in Network Assessment and monitoring of control devices for performance and security compliance
●Observed and analyze traffic to learn valuable lessons from known malicious actors and determine countermeasures against such threats
Technol Oil & Gas (Nig); IT Security Compliance Analyst - May 2020- April 2021
●Provided daily status updates on existing cybersecurity incidents to follow up with clients/customers to ensure satisfactory resolution.
●Managed information security risk assessment and research, and recommends remediation plans and strategies.
●Monitored and planned response to security incidents and events across the organisation.
●I was in Charge of education and cyber security awareness which facilitated a significant drop in successful phishing attacks up to 15% within the first year.
●Partnered with business departments to identify gaps in policies, procedures, and processes.
●Evaluated operational processes and suggested improvements.
OBZ Web systems Consulting & Securities (NIG).
IT Security Specialist April 2019 - Sept 2019
●Investigated and responded to network activities relating to unauthorized modification, destruction, and disclosure affecting business operations.
●Identified and analyzed business violations of security policy and standards.
●Analyzed information security systems and applications and recommended security measures to protect information against unauthorized modification or loss.
●Prepared risk analysis documentation, reports, and recommendations
●Conducted follow-up meetings to assist information system owners in remediating outstanding security findings
●Provided detailed reports on security findings and worked with development teams to remediate.