ADE ADEPOJU
*********@*****.***
CISM CEH CCNA Cisco Cyber operation LI (Information Security Management System), Certificate in Cyber Security (ISC2)
SUMMARY
An Information Security Professional with 8 years of experience in safeguarding an organization's information and data resources by identifying threats, prioritizing risks, pre-empting cyber-attacks, and collaborating with teams to expedite the remediation of vulnerabilities that could impact an organization's operational excellence.
KEY SKILLS
•Incidence Response
•Vulnerability Management
•Project Management in the Field of Cybersecurity
•Promoting Awareness of Information Security
•Governance, Compliance, and Risk Management
•Third Party Risk Management
WORK EXPERIENCE
CYBER SECURITY/IT USER SUPPORT) BELAIRDIRECT INSURANCE INC JANUARY 2025 - DATE
Provided network administration and improved network security by monitoring network utilization for threats and activities, updating firmware, installing network devices, switches, and resolving TCP/IP issues
Successfully provided service desk first call and SLA resolution for hundreds of calls weekly on issues with virus protection-removal, repair, break-fix of software and network issues
Set up and decommission workstations for onboarding and offboarding, managing configurations to meet company standards.
Performed hands on fixes at the desktop level which included installing and upgrading software, drivers, test and repair of hardware, configuring systems and applications and EDR
Efficiently ensure prompt patching of systems, network devices and also resolving MFA, SSO related issues
Effectively utilized active directory users and computer resolving issues with identity and access management, passwords and locked accounts while carrying out server administration tasks
Produced monthly IT reports and coordinated with internal customers and end users on installation, moves, add and changes of PCs, monitors and printers to achieve minimal impact on work productivity.
CYBER SECURITY SPECIALIST AT IO SOLUTION (ROGERS COMMUNICATION) August 2023- December 2024
Analyzing internal IT controls, evaluate the design and operational effectiveness, determine exposure to risk, and develop remediation strategies.
Implementing and reviewing policies on DAM (Database Activity monitoring tools) to ensure all database activities are captured.
Conduct Audit to ensure compliance with all applicable plans, policies, and standards
Conduct design and code reviews Analyze and improve efficiency, scalability, and stability for assigned product area and/or systems.
Testing and re-testing Applications and Systems for known vulnerabilities.
Planning, implementing, managing, monitoring, and upgrading security measures for the protection of the organization's data, systems, and networks.
Led cross-functional engagements to assess cybersecurity risks in proposed and existing systems, ensuring alignment with CIA (Confidentiality, Integrity, Availability) principles.
Analyzed business requirements and project designs, providing risk advisory to mitigate security threats.
Represented the information security office in change management sessions, delivering updates on project security posture and residual risk mitigation plans.
Reviewed cloud service providers and third-party SLAs to ensure compliance with organizational security and data privacy policies.
INFORMATION AND RISK OFFICER AT ETRANZACT Feb 2023-May 2023
Collaborated with IT teams to design controls addressing identified risks. Drove compliance-related initiatives, including gap assessments for new and existing policies and standards.
Created and updated IT Governance documents, including policies, standards, procedures, and guidelines, supporting the organization’s Governance, Risk, and Compliance (GRC) practices.
Drove compliance-related initiatives, including gap assessments for new and existing policies and standards such as PCIDSS, ISO 27001, HIPPA, NIST, SOX, SOC2 compliance and audit process.
Conducted Data Privacy Impact Assessments (DPIAs) on initiatives involving personal data, delivering risk evaluations and recommendations.
Performed investigation on phishing email attacks and remediation while using SIEM tools in correlations of security incidences
Executed the installation and troubleshooting of two-factor authentications on end-user systems.
Responsible for change control within the organization, including communication of application changes and reporting these changes to the responsible team for further review or exceptions.
Information Security Analyst at Etranzact PLC Feb 2021- Feb 2023
Developed and chaired cybersecurity projects for different clients based on business needs
Configured and set up Anti-Virus, Endpoint Detection and Response, SIEM, NAC, etc.
Collaborated with IT teams to comprehend their business processes, risk management practices, and addressed their concerns and risks effectively.
Conduct third-party cyber risk assessments by working with vendors and ensuring adherence to Cybersecurity Terms and Conditions using a risk-based approach.
Infrastructure and Incident Analyst at First Bank PLC July 2015-Feb 2021
Conducted threat monitoring and analysis of security threats such as Trojan attacks, vulnerable software versions, malicious processes, unauthorized reconnaissance, etc. using various security tools
Quick resolution of security-related activities with security advice and reports of investigation shared.
Performed different User awareness and phishing simulations for staff members
PROJECTS
Implementation and Onboarding of Mobile Device Management for the whole enterprise and subsidiaries.
Successful implementation of organization’s assets on the Network Access control (NAC).
EDUCATION
Obafemi Awolowo University
Bachelors of Science 2012