Adebisi Ojiwusi
**** **** ****, ******, ** *****
Email: ****************@*****.*** Phone: 202-***-**** PROFESSIONAL PROFILE
IT Cybersecurity Analyst and Solution Architect with over 5 years of experience performing research, analysis, and troubleshooting to identify, resolve, and remediate security issues and findings within the enterprise
Cybersecurity, Incident Management, and IT compliance support across the Enterprise Infrastructure
Cybersecurity capabilities and risk management protect the network and IT systems against cyber-attacks and malicious intrusion.
Security policy interpretation and implementation requirements ensure confidentiality, integrity, information, systems, and network availability.
Highly motivated, organized, and results and detail-oriented with excellent interpersonal, communication, and presentation skills
AWS cloud security, orchestrations, design, and support, Cloud Virtual environment design and implementation
Strong system analysis skills to be able to identify and quickly resolve issues
Maintained high availability clustered and standalone server environments and refined automation components with scripting and configuration management
In-depth knowledge of AWS cloud services like Compute, Network, Storage, and Identity & Access Management.
Possessed a unique combination of technical abilities, communication skills, and the ability to multitask that allow me to collaborate with end-users or business TECHNICAL SKILLS
Security Technologies: Nessus Security Center, Nmap, Wireshark, IDS/IPS; Log Management, Anti-Virus Tools; (Norton, Symantec).
Application: MS Office (Word, Excel, Outlook, PowerPoint, Access); Wireshark, NMAP, Nessus, ArcSight, SharePoint, STIGs, and SCAP
Operating Systems: Unix-Based Systems (Linux); Windows.
Software: MS Office (Word, Excel, Outlook, Access, PowerPoint)
Ticket Systems: ServiceNow, Remedy
EMPLOYMENT HISTORY
Information Security Analyst 08/2020 – Present
Alpha Technology Group, MD
Responsibilities:
Provides high-level analysis of security data to identify significant activity
Performs vulnerability scanning with Nessus to detect potential risks on single or multiple assets across the enterprise network
Architecting, building, and maintaining cost-efficient, scalable cloud environments for the organization.
Migrate archaic systems into the cloud for more efficiency within the organization – aka digital transformation.
Keeping cloud environments secure and preventing downtime or security breaches.
Determine the risk associated with third-party platforms or frameworks.
Design, build, and maintain internal cloud applications for the organization.
Transfer data and internal processes to cloud architecture.
Keep up to date on best practices in cloud computing and making improvements to the cloud infrastructure of their company or organization.
Communicating with internal teams, like Sales, Operations, and IT.
Communicate with stakeholders and build applications to meet project needs.
Makes hardware and software recommendations for the organization based on the needs of the project and organization.
Develops, coordinates, implements, and maintains standards and procedures to protect information systems and data security and integrity
Observe and analyze traffic to learn valuable lessons from known malicious actors and determine countermeasures against such threats.
Provides detailed status updates on existing cybersecurity incidents daily to follow up with clients/customers to ensure satisfactory resolution
Develops risk assessment reports, identifying threats and vulnerabilities applicable to the system
Evaluate the likelihood that vulnerabilities would be exploited and assess the impact of this threat and vulnerabilities.
Conducts security control Assessment to assess the adequacy of Management, operational, privacy, and technical security controls implemented
Performs system risk management following the NIST risk management framework
Creates Root Cause Analysis (RCA) when required and Performs mitigation required to protect critical resources
Performs incident response to investigate and resolve computer security incidents
Develop follow-up action plans to resolve reportable issues and communicate with other Analysts to address security threats and incidents.
Analyze, investigate, and process Malicious/Phishing Email alerts from IronPort and FireEye following standard operating procedures.
Contributes to security strategy and security posture by identifying security gaps, evaluating and implementing enhancements
Support Incident Response (IR) when analysis confirms actionable incident
Manage the AWS infrastructure and strategic vendor relationships, including development firms.
Collaborates with the security team to design and manage IAM roles for users, vendors, and other third-party vendors
Partner with the sales team, formulate and execute a sales strategy to exceed revenue objectives through the adoption of AWS.
Built and oversaw network infrastructure comprised of various virtual products.
Responsible for ensuring Systems & Network Security, maintaining performance, and setting up monitoring using Cloud Watch
Work with business units, software developers, and security to design and build applications and services within AWS and other cloud providers.
Provide daily monitoring, Management, troubleshooting, and issue resolution to systems and services hosted on cloud resources.
Information/Cybersecurity Analyst 09/2017– 07/2020 West4th Strategy Consulting, VA
Responsibilities:
Developed, coordinated, implemented, and maintained standards and procedures to protect information systems and data security and integrity
Leveraged Nessus to identify systems compliance risk levels, identify non-compliance issues and security vulnerabilities, and manage remediation activities.
Provided support and security overview on cloud-based solutions implementation, including private, community, hybrid, and public cloud deployment models.
Managed the remediations of security issues and findings across the enterprise
Creates, evaluates, and interprets internal and external information security policies and standards and participates in information security decision-making.
Managed the development and delivery of Information Security Education and Awareness
Coordinates with vendors and third parties to manage information security risks
Provided daily status updates on existing cybersecurity incidents to follow up with clients/customers to ensure satisfactory resolution.
Developed risk assessment reports, identifying threats and vulnerabilities applicable to the system.
Conducts security control Assessments to assess the adequacy of implemented Management, operational, privacy, and technical security controls.
Manages enterprise system security plan, Risk assessment, and Privacy policies development
Conduct incident response to investigate and resolve computer security incidents.
Develops follow-up action plans to resolve reportable issues and communicate with other Analysts to address security threats and incidents.
Managed, prioritized, and differentiate between potential intrusion attempts and false positive alerts
Assisted in developing processes and procedures to improve incident response and analysis
Manages information security risk assessment and research and recommends remediation plans and strategies.
Provides strategic consulting on security risk assessment, analysis, and compliance and recommends remediation plans and strategies
EDUCATION AND BACKGROUND
Bachelor of Science: in Economics May 2006
University of Ibadan, Nigeria
MEMBERSHIP & CERTIFICATIONS
AWS Solutions Architect - Associate 2023
CompTIA Security+ 2023
REFEREE
Upon request