Adegoke Adejayan
**** ****** ** ******, ***** 751**-***-*** 1673 ****.********.**@*****.***
PROFESSIONAL SUMMARY
Proactive and skilled Cybersecurity Analyst with foundational experience in chemical operations and a proven ability to apply structured methodologies to threat detection and incident response. Currently expanding expertise in SIEM operations, threat hunting, and cloud security (Azure/AWS). Possesses DOD clearance and a strong commitment to continuous learning, supported by a master’s degree in Cybersecurity and ongoing advanced training.
CORE COMPETENCIES
Security Operations: Threat Hunting, Incident Response & Remediation, Vulnerability Scanning, Risk Analysis, Log Analysis, MITRE ATT&CK Framework
Security Tools & Platforms: SIEM (Splunk, Elastic Search), SOAR, EDR, IDS/IPS, Wireshark, TCPdump, Security Onion, CASB, DLP
Cloud & Infrastructure: AWS, Azure, Virtualization (VMware), Linux (Red Hat), Windows, M365
Scripting & Automation: Python, PowerShell, Bash
Compliance & Standards: NIST CSF, ISO 27001/27701, Encryption, Data Protection, Industrial Control Systems (ICS/SCADA)
Core Skills: Analytical Problem-Solving, Critical Thinking, Cross-Team Collaboration, Stakeholder Communication, Playbook Development, Investigative Workflows
CERTIFICATIONS
●Microsoft Certified: Cybersecurity Architect Expert In view
●CompTIA CySA+
●CompTIA Security+
●CompTIA Network+
●CompTIA A+
PROFESSIONAL EXPERIENCE
US ARMY Supervisor, Computer Operations September 2022 – October 2025
●Conducted CBRN (Chemical, Biological, Radiological, and Nuclear) reconnaissance and surveillance to identify and mitigate potential hazards, ensuring the safety and operational readiness of the unit.
●Executed decontamination operations and maintained assigned CBRN defense equipment, demonstrating strict adherence to safety protocols and procedural accuracy.
●Provided technical advice on CBRN operations and hazards and supported the planning and evaluation of individual and collective CBRN training for the organization.
●Applied a methodical, process-driven approach to complex operational challenges, building a strong foundation for structured cybersecurity analysis and incident response.
Cybersecurity Analyst I
Surgery Partners – Irvine, CA March 2022 – August 2022
Assisted in triaging and analyzing security events from email security, IDS, and endpoint tools, escalating incidents per NIST-aligned processes.
Supported the operational execution of investigative playbooks and contributed to the tuning of SOAR automation workflows.
Participated in an on-call rotation, providing support during off-hours and critical incidents.
PROJECTS & HANDS-ON EXPERIENCE
Defensive Cyber Operations (DCO) Simulation: Worked with a small team to analyze log data in Splunk and Kibana/Elastic Search, hunting for threat signals and pulling out adversary IOCs from large datasets during a simulated DCO exercise.
Vulnerability Management & Risk Analysis: Practiced identifying and assessing network vulnerabilities, then used the MITRE ATT&CK Framework to break down adversary TTPs and suggest practical countermeasures—essentially simulating what it takes to maintain a solid security posture.
Threat Hunting & Incident Response: Ran threat hunting exercises based on SANS FOR608 techniques, walking through how to reconstruct security events, spot gaps in coverage, and dig through machine data for signs of potential threats.
Automation & Security Tooling: Took repetitive data analysis tasks and built out PowerShell and Bash scripts to automate them—cutting down on manual work, reducing mistakes, and helping speed up response during mock incident scenarios.
ICS/SCADA Security Analysis: Spent time with SANS ICS 410 materials to better understand the unique security challenges in industrial environments, building a foundation for how to approach risk and protection in critical infrastructure.
EDUCATION
MSC Cyber Operations, University of Maryland Global Campus CGPA: 4.0
BSC Geography and Planning Science, Adekunle Ajasin University, Nigeria
Reference
Available on request.