SARAH OLUWAKEMI ALAO
SARAH IS MY NAME.
I HAVE A GREAT INTER PERSONAL AND OUTSTANDING COMMUNICATION SKILL, I AM MULTI-SKILLED AND HIGHLY TALENTED.
MONITORING AND SECURING SYSTEMS, TROUBLESHOOTING TECHNICAL ISSUES ARE PART OF MY TOP SKILLS.
MY MOTIVATION IS TO LEARN NEW SKILLS AND TECHNOLOGY AS I GROW AND BUILD MY PORTFOLIO WITH THE OPPORTUNITY I WILL ACQUIRE IN YOUR COMPANY. I AM EXPERIENCED IN INFORMATION TECHNOLOGY AND INFORMATION SECURITY WITH A DEMONSTRATED HISTORY OF WORKING IN THE INDUSTRY SINCE 2010 THE EXACT YEAR I TOOK A DIVE INTO THE FIELD AS AN APPRENTICE (Student).
I AM CURRENTLY SEEKING A TECHNICAL SUPPORT ENGINEER POSITION TO SHOWCASE MY PROVEN EXPERIENCES AS VALIDATED BY MY ACQUIRED CERTIFICATIONS. I HAVE STRONG ENGINEERING SKILLS IN NETWORKING (TCP/IP, DNS, DHCP, VPN), WINDOWS SERVERS, OPERATING SYSTEMS (LINUX), MACOS, MICROSOFT OFFICE 365 AND NETWORK SWITCHING. I HAVE SKILLS AND KNOWLEDGE OF SECURITY CONCEPTS : CIA, AUTHENTICATION, AUTHORIZATION, NON-REPUDIATION, INCIDENT RESPONSE, RISK MANAGEMENT, CLOUD OPERATIONS (AZURE, AWS, GCP) ENVIRONMENTS, IDS/IPS, SECURITY POLICIES, ANTIVIRUS/ANTIMALWARE, DATA SECURITY AND VALIDATION, NETWORK SECURITY, EDR, APPLICATION SECURITY. UNDERSTANDING OF HTML, XML, JSON. PROVISIONING AND DE-PROVISIONING IN ACTIVE DIRECTORY IDENTITY ACCESS MANAGEMENT.
PROFICIENT IN IMPLEMENTATION AND DEPLOYING HARDWARE SOFTWARE NETWORK DIAGNOSTIC TOOLS, PROJECT MANAGEMENT TOOLS, TICKETING SYSTEMS, REMOTE ACCESS SOFTWARE, SECURITY INFORMATION AND EVENT MANAGEMENT TOOLS.
FAMILIARITY WITH BASIC KNOWLEDGE OF SCRIPTING LANGUAGES AND BASIC UNDERSTANDING OF PROGRAMMING LANGUAGES IN CLI AND GUI INTERFACE ON OPERATING SYSTEMS OR MACHINES. CURRENTLY STUDING ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING TO ENHANCE MY EXPOSURE IN THE INDUSTRY.
THANK YOU FOR GETTING TO READ ABOUT MY CAREER.
64154 816-***-**** ****************@*****.*** http://linkedin.com/in/sarah-kemi-alao WORK EXPERIENCE
Charter Communications — Fraud Investigator
01/2022 — Present, Overland Park, KS.
• Rendering technical support by resolving tickets and troubleshooting security issues.
• Conducting investigations on existing fraud trends by Analyzing findings and documenting the transaction patterns.
• Providing Customer Access Controls By Ensuring Token Validation.
• Technical writing and documenting findings.
• Conducting Cyber Fraud Detection Analysis.
• Investigating identity theft cases utilizing the risk management systems.
• Monitoring internet abuse activities ensuring compliance and security measures.
• Keeping track of Real Time adherence of employee engagement and productivity metrics.
• Conducting Organizations internal employee verification routine checks.
• Investigating social engineering phishing, vishing, smishing attacks and Remediating after hacking attacks.
• Authenticating customers portal online access.
• Data gathering utilizing defined metrics for tracking and reporting.
• Auditing Log trails to mitigate ATO cyber fraud.
• Compliance review audit alongside company policy, utilizing Risk Assessment methodologies.
• Analyzing all required factors ensuring validation of data entries and troubleshooting using Datadog.
• Conducting User access permission authorization.
• Auditing, risk assessments and compliance procedures making sure it’s enforced.
• Monitoring network usage in Diagnostics systems with real time log events.
• Actively Observing And Analyzing Payment Systems Ensuring Adherence To Payment Card Industry Data Security Standard (PCI DSS).
• Conducting Credit abuse review on high-risk customers.
• Red Flagging of IP addresses enabling network access location validation.
• Password reset following all guidelines in CPNI and authorized user policies. LOWES — Technical Support Specialist
• Facilitating meetings with IT network teams.
• Providing Identity and mailbox management Maintaining Data Privacy Concepts And Integration Technologies.
• utilizing information security policies With Collaboration And Support To The SOC analyst Team.
• Conducting Identity verification proofings.
• Placing blocks on unverified locations to disabling access permissions.
• Review and research evidence/documents to analyze the overall fact pattern of claim and synthesize data into a professional report with recommendations.
• Monitoring adherence to SLAs.
• Providing customer-facing technical support functions when necessary.
• Conducting Root Cause Analysis in specific environments on projects. TOOLS/SOFTWARES/SYTEMS/TECHNOLGY :
SAILPOINT IDENTITYIQ, ZENDESK, BILLING SYSTEMS, FRAUDNET, SERVICENOW, SAAS B2B, SSRS, RISKOPTICS, SAP GRC, LEXIS-NEXIS, DATADOG, CATFISHAIR, WINDOWS SUITES 360, MACOS, LINUX, AWS, INFORMATICA, DYNATRACE, LOGICMONITOR, ACTIVE DIRECTORY, AUDITBOARD, PROJECT MANAGEMENT, JIRA .
03/2020 — 01/2022, North Kansas City
• I served as a point of contact ensuring smooth operations, identifying, diagnosing, testing and resolving technical issues using a systematic approach.
• Troubleshooting of Kubernetes and Docker containers, resolving hardware, software and network issues.
• I conducted technical support functions ensuring network connectivity and basic troubleshooting for LAN, WI-FI, and VPN.
• Managed user accounts and access permissions in Active Directory.
• I maintained IT asset inventory and technical documentations.
• Created and resolved issues in the Ticketing systems and remote support tools.
• Collaborated with the global IT team to implement best practices and security measures.
• I installed, configured, and update software applications and operating systems.
• Responsible for identifying and implementing effective solutions to ensure compliance and security protections.
• Provided End-user and manager applications customer support. Cowell James Forge Insurance Group — Active Directory Administrator
• Performed accessment analysis, utilizing helpdesk ticketing system to record and track daily support activities and investigations.
• Educating users on new systems and technologies. TOOLS/SYSTEM/SOFTWARE/TECHNOLOGY:
JIRA, FRESHDESK, ZENDESK, LIVE CHAT SOFTWARE, MDM, NETWORK ANALYZER TOOLS, KPI TOOLS, SALESFORCE SERVICE CLOUD, CONNECTWISE CONTROL, AZURE, SOLARWINDS, SYSAID, SUMOLOGIC, IBM, DATADOG, CABLE TESTER, IPCONFIG, PING, MICROSOFT NETWORK MONITOR. 03/2018 — 03/2020, Kansas City, MO
• Provided User Provisioning And De-provisioning.
• Designed and Maintained Workflows Around User Registration, Profiling,Federation, Sign-In Policies.
• Managed Application Access Policies And Authorization Server Policies.
• Maintained Authentication Mechanisms And Protocols Including OIDC/OAuthAnd SAML, With All Related Security Concepts Such As MFA.
• Utilized session replays to investigate unusual activities.
• Reported and documented security critical events, logins and logout events, access requests and changes to permissions and configurations.
• Identifyied list of authorized identities, password management and reports.
• Monitored and Tracked all activities including who accessed them from auditlog trail.
• Maintained work relationships with IAM stakeholders; Hr, Service Desk,Application Owners, Infrastructure, Information Security Team.
• Troubleshooting of IAM system Component failures And Provided Solutions.
• Reviewed, authorized and execute user access requests in conjunctions withcompany policies, standards and processes.
• Created, Reviewed & Maintained Custom OAuth and OIDC integrations With CloudCIAM products.
• Impacted the company’s Cybersecurity posture, Its operations and business processes seamlessly. .
• Established policies, standards and processes to support a secure compliantefficient identity and access management practices.
• Examined audit logs to identify any unusual identity.
• Ensured Secured User Provisioning Using OIM software Suite In IAMtechnologies.
• Actively Managed Role-based Access Control (RBAC). EDUCATION
UNIVERSITY OF BENIN — Bsc In Physics
PROFESSIONAL CERTIFICATIONS
TECHNICAL SKILLS
• Reviewed Access Requests And Approval Workflows.
• Did Compliance Reporting And Auditing Processes In Logs.
• Managing domains, user accounts implemented and maintained group policy. TOOLS/SOFTWARES/SYSTEMS/TECHNOLOGIES:
MICROSOFT ACTIVE DIRECTORY EXPLORER, SAILPOINT, OKTA, MICROSOFT AZURE ACTIVE DIRECTORY, ORACLE IDENTITY MANAGEMENT, PING IDENTITY, FORGEROCK, AUTH0. 2004 — 2009
CompTIA Cysa+ 12/13/2024 - 12/13/2027
CompTIA S+ 02/14/2025 - 02/14/2028
CompTIA N+ 12/05/2010 - 12/05/2013 (Expired)
CompTIA A+ 12/23/2010 - 12/23/2013 (Expired)
Missouri Real Estate License (2019)
Cisco CCNA - in View
ISC2 CISSP - in view
SPLUNK, NESSUS, GITHUB, TRACEROUTE, SAP GRC, SAASB2B, SSRS, DYNATRACE, ETL TOOLS, TECHNICAL WRITING, WIRESHARK/TCPDUMP, SERVICENOW, SAILPOINT IDENTIYIQ, AZURE, FIREWALLS, ENCRYPTION SOFTWARE, PACKET SNIFFERS, NMAP, MICROSOFT DEFENDER, DLP, GCP, AWS, LEXIS-NEXIS, FRAUDNET, OKTA, SHAREPOINT, ENTRA ID, TABLEAU, JIRA, CYBERARK, CATFISH AIR, FORENSIC ANALYSIS, BEYONDTRUST, ORACLE DATABASE, SQL, LINUX, DNS, TRACEROUTE, PING
, NETSTAT, NSLOOKUP, ONELOGIN, PAM/IAM, MICROSOFT SETINEL, SOAR AUTOMATION, SALESFORCE, SIEM, ZENDESK, INVGATE, WINDOWS, MAC OS, SOLARWINDS, ITSM, ALTERYX, DATADOG, EDR, GOCODES, INFORMATICA, AUDITBOARD, FLEXERA, EZOFFICEINVENTORY.