CHIDI DIOGU
Cybersecurity Analyst Security Operations Specialist
*******@****.*** 972-***-****
LinkedIn: www.linkedin.com/in/sectresevensecurity
PROFESSIONAL SUMMARY
Entry-level Cybersecurity Specialist with 2+ years of progressive experience in security operations, threat detection, and incident response and management. Certifications include CompTIA Security+, ISC2 CC, Teramind Insider Threat Detection and specialized vulnerability management platforms. Demonstrated expertise in endpoint protection, network security, and risk mitigation across enterprise environments. Proven track record in customer-facing technical support with strong focus on security awareness and education. TECHNICAL EXPERTISE
• Vulnerability Management: Qualys Guard VMDR, Nessus Professional, Patch Management Systems.
• Endpoint Security: Antivirus deployment, Mobile Device Management (MDM), Microsoft Defender for Endpoint Detection and Response (EDR).
• Network Security: VPN configuration, Firewall management, Network monitoring tools.
• Identity Management: IAM configuration, Access control implementation, User provisioning automation.
Security Operations & Analysis
• Incident Response: Threat hunting, Digital forensics, Breach investigation, Evidence collection.
• Risk Assessment: Vulnerability scanning, Security auditing, Compliance reporting.
• Threat Intelligence: OSINT collection, IOC analysis, Threat landscape monitoring, Attack pattern recognition.
• Security Monitoring: SIEM tools, Log analysis, Anomaly detection, Security event correlation.
Compliance & Frameworks
• Standards: NIST Cybersecurity Framework, ISO 27001, GDPR, HIPAA compliance
• Threat Modeling: MITRE ATT&CK framework, Cyber Kill Chain methodology, STRIDE analysis
• Web Security: OWASP Top 10, Application security testing, API security assessment
• AI/ML Security: Large Language Model security, Prompt injection testing, AI model vulnerabilities
INDUSTRY CERTIFICATIONS
Security+ CompTIA May 2024 – May 2027
Certified in Cybersecurity (CC) ISC2 Dec 2023 – Dec 2026 Qualys Guard VMDR Specialist Qualys Jan 2024 – Current Insider Threat Detection Teramind Apr 2025 – Apr 2026 PROFESSIONAL EXPERIENCE
CYBERSECURITY SPECIALIST - LEVEL 1
GenDigital November 2022 – November 2023 Security Operations & Incident Response • Executed incident response procedures for data breach investigations affecting 500+ enterprise clients • Implemented security controls and countermeasures to prevent unauthorized access and data exfiltration • Technical Security Implementation • Deployed endpoint security solutions across heterogeneous environments (Windows, macOS, Android, iOS) • Configured and managed VPN infrastructure supporting secure remote access for distributed workforce • Automated security tool deployment reducing manual configuration time by 60% • Administered Identity and Access Management systems ensuring principle of least privilege Stakeholder Education & Communication • Delivered cybersecurity awareness training to enterprise clients on phishing, social engineering, and data protection • Created technical documentation and standard operating procedures for security incident handling • Collaborated with cross-functional teams to integrate security best practices into business operations • Escalated complex security incidents through established chain of command to L2/L3 support tiers CONTENT SECURITY ANALYST - LEVEL 2
Genpact LLC March 2018 – September 2022 • Applied data classification and content filtering policies to protect sensitive information • Participated in policy development and quality assurance testing programs • Identified emerging social media threats and developed mitigation strategies • Contributed to continuous improvement initiatives for security policy frameworks TECHNICAL SUPPORT COORDINATOR
Hilton Worldwide May 2012 – May 2014 • Provided technical troubleshooting for web application security issues and system vulnerabilities • Supported secure payment processing systems and customer data protection protocols • Implemented conflict resolution procedures while maintaining data confidentiality standards
HANDS-ON CYBERSECURITY PROJECTS
Enterprise Security Assessment Datacom Simulation August 2024
• Conducted comprehensive penetration testing and vulnerability assessment for a simulated enterprise environment
• Developed incident response playbook documenting attack vectors, indicators of compromise, and remediation steps
• Performed risk analysis using qualitative and quantitative methodologies Cyber Defense Operations AIG Shields Up Program June 2024
• Monitored threat intelligence feeds and CISA alerts for emerging vulnerabilities and attack campaigns
• Analyzed Common Vulnerabilities and Exposures (CVE) reports for impact assessment and prioritization
• Developed Python-based cryptographic tools for ransomware key recovery and decryption Security Awareness Program MasterCard Simulation March 2024
• Designed phishing simulation campaigns to test employee security awareness levels
• Conducted gap analysis identifying high-risk departments requiring enhanced security training
• Developed role-based security training curricula tailored to specific business unit requirements Cloud Security Implementation Microsoft Azure Challenge February 2024
• Successfully deployed and configured Virtual Machines using Microsoft Azure
• Implemented security controls including port rules, disk encryption, and access management
• Configured Remote Desktop Protocol with security best practices
• Demonstrated cloud security configuration and management expertise EDUCATION & TRAINING
Bachelor of Science, Applied Sociology Texas State University Continuing Education: Advanced Python for Cybersecurity Automation, AI/ML Security and Adversarial Testing, Cloud Security Architecture and Implementation, Digital Forensics and Incident Response
(DFIR), IBM Machine Learning & LLM Technology, Python (Security automation, Data analysis, Penetration testing), PowerShell scripting, Bash/Shell scripting CORE COMPETENCIES
Operating Systems: Windows Server administration, Linux/Unix systems, macOS security configuration, Mobile device security (Android/iOS) Communication & Leadership: Technical writing, Stakeholder management, Security awareness training, Cross-functional collaboration, Conflict resolution Analytical Skills: Threat modeling, risk assessment, business impact analysis, root cause analysis, data correlation and pattern recognition Emerging Technologies: Large Language Model security testing, AI prompt engineering, Machine learning model vulnerabilities, Deepfake detection