OLAWALE LAWAL
Yorkville, IL +1-312-***-**** ********@*****.*** LinkedIn
Cybersecurity Analyst SIEM Engineer Splunk Specialist
PROFESSIONAL SUMMARY
Results-driven Cybersecurity Analyst with 6+ years of experience enhancing enterprise security through advanced SIEM engineering, threat detection, and incident response. Demonstrated success in implementing and managing Splunk Enterprise Security, conducting real-time vulnerability assessments, and automating response with XSOAR. Adept at designing and executing data onboarding strategies, optimizing dashboard visualizations, and mitigating security risks across cloud and hybrid infrastructures. Strong collaborator with a proven ability to reduce threat response time and improve visibility across environments through well-architected observability solutions.
CORE COMPETENCIES
Security Information & Event Management (SIEM)
Splunk Enterprise & ES Apps UBA SOAR CIM
Incident Detection & Response (IDR)
Data Onboarding & Normalization
Threat Intelligence & Log Analysis
Vulnerability Management & Hardening
Dashboards, Alerts & Reports (SPL, Cribl, XSOAR)
AWS Security Controls IAM Cloud Logging
Linux/Windows Administration Syslog HEC
NIST 800-53 MITRE ATT&CK FedRAMP Awareness
CERTIFICATIONS
Splunk Cybersecurity Defence Analyst – Splunk
Splunk Enterprise Security Certified
Splunk Admin Power User UBA
CompTIA CySA+ Security+
Cribl Certified Observability Engineer (CCOE)
CyberArk Privileged Access Management (PAM)
PROFESSIONAL EXPERIENCE
Cybersecurity Analyst Juniper Networks
Calgary, AB July 2024 – Present
Manage enterprise-wide Splunk ES deployment for log ingestion, correlation searches, and automated incident detection.
Implemented risk-based alerting (RBA) and customized threat intelligence integrations to enhance detection accuracy.
Utilized XSOAR playbooks to reduce mean time to response (MTTR) by 35% for phishing and malware events.
Collaborate with SOC and threat intel teams to develop use cases aligned with MITRE ATT&CK tactics and techniques.
Enforce CIM compliance across ingested data sources using Splunk TAs, props.conf, and transforms.conf.
Conduct daily threat hunting operations to uncover unauthorized access, anomalous behavior, and misconfigurations.
Monitor license usage, optimize indexing volume via SmartStore, and enhance search performance.
Created Splunk dashboards for executive-level visibility into critical security KPIs and regulatory compliance.
Train analysts on search query optimization, security event triage, and detection rule tuning.
Cybersecurity Engineer Seagate Technology
Calgary, AB Jan 2022 – June 2024
Led integration of Cribl LogStream for efficient log routing, field extraction, and enrichment before ingest into Splunk.
Architected multi-tiered Splunk SmartStore deployment, reducing storage costs by 30% and increasing scalability.
Integrated AWS logs (CloudTrail, VPC Flow, GuardDuty) with Splunk for real-time monitoring and compliance auditing.
Created advanced correlation searches that identified insider threat activities and unauthorized privilege escalations.
Automated AWS IAM user audits and S3 bucket policy evaluations using Splunk and Python scripting.
Supported log ingestion from multiple cloud and on-prem services using HEC, syslog, REST API, and universal forwarders.
Hardened Linux servers and monitored with Splunk for authentication anomalies, lateral movement, and brute-force attacks.
Provided mentorship and documentation for new analysts on incident handling and threat analysis workflows.
Fine-tuned search head clustering and indexing strategies to improve system reliability and data ingestion throughput.
Security Operations Analyst Grant Thornton
Calgary, AB Jan 2019 – Dec 2021
Managed Splunk Enterprise as the primary SIEM tool to collect, normalize, and analyze logs from 50+ sources.
Developed alerting rules and anomaly detection queries using SPL, reducing false positives by over 40%.
Conducted end-to-end log pipeline development from source onboarding to dashboards aligned with compliance needs.
Implemented RBAC policies and monitored audit logs to track user access, ensuring alignment with internal controls.
Supported security incident investigations, prepared reports, and collaborated with stakeholders to contain threats.
Maintained compliance with organizational policies (NIST, ISO 27001) and assisted with audit preparations.
Designed role-based dashboards for infrastructure, app dev, and management teams to monitor system health.
Delivered weekly SIEM health reports and KPIs for visibility into detection effectiveness and response readiness.
Worked closely with infrastructure teams to ensure proper logging of servers, network devices, and SaaS tools.
EDUCATION
B.Sc., Petroleum Engineering
Delta State University, Nigeria 2012