About
Embarking on a career as a cybersecurity analyst, I bring a self-motivated and target-oriented approach, paired with a commitment to maintaining the highest standards of integrity and honesty. My strong problem-solving skills and attention to detail enable me to identify and address security vulnerabilities effectively. I thrive in high-pressure environments, leveraging both physical and mental alertness to anticipate and counteract cyber threats. I excel at fostering teamwork and collaborating within diverse professional settings to achieve common goals. My strong interpersonal and communication skills facilitate seamless interaction with colleagues, clients, and stakeholders. With a commitment to continuous learning and staying abreast of the latest cybersecurity trends and techniques, I am dedicated to protecting organizational assets and data. My initiative and active listening abilities further enhance my capacity to contribute to winning outcomes in the dynamic and ever-evolving field of cybersecurity.
Work
SpaceBlock Technology
|SOC Analyst
Highlights
Monitor and respond to alerts from endpoint security tools solutions
Review and analyze logs from various sources (e.g., network devices, security, endpoints, applications) to identify potential security incidents.
Examine network traffic patterns and anomalies to identify potential threats
Analyze and respond to brute force attack, phishing attacks by identifying malicious emails, communicating with affected users, and blocking identified threats.
Review and monitor user access controls and permissions to ensure compliance with security policies.
Support the development and delivery of security awareness training programs for employees to improve their understanding of security best practices.
Examination of vulnerabilities in computer systems and networks.
Performing vulnerability assessments using tools like Nessus.
Conducting comprehensive penetration testing to identify network, endpoint, & application vulnerabilities.
Document and communicate security findings and recommendations effectively.
Collaborate with IT teams to ensure timely patching of systems and applications based on identified vulnerabilities and threat intelligence.
Monitor and enforce secure configurations of systems and applications, ensuring compliance with security policies and standards.
Support the implementation and monitoring of a Zero Trust security model within the organization.
Regularly review audit logs for suspicious activities and anomalies that may indicate a security threat
Communicate effectively with non-technical stakeholders, providing clear and concise updates on security incidents and response action.
Proficient in deploying, configuring, and managing Splunk Enterprise environments.
Expertise in creating advanced Splunk searches, reports, and dashboards for data analysis.
Setting up real-time alerts and automation using Splunk for proactive monitoring.
Experience in developing and customizing Splunk apps, add-ons, and modular inputs.
Knowledge of using Splunk for security monitoring, event correlation, and threat detection.
Ability to perform deep-dive data analysis and create insightful visualizations using Splunk.
Experience in deploying and managing Universal Forwarders and Heavy Forwarders for efficient data collection and forwarding.
Experience in integrating Splunk with security and IT operations tools, including apps for PaloAlto, Cisco,Azure,AWS,Microsoft,etc.
PostNet Brookly Dey
|Branch Manager
Highlights
Develop goals and objectives that tend to growth and prosperity
Design and implement business plans and strategies to promote the attainment of goals.
Ensure that the company has the adequate and suitable resources to complete its activities.
Organize and coordinate operations in ways that ensure maximum productivity
Supervise the work of employees and provide feedback and counsel to improve efficiency and effectiveness.
Maintain relationships with partners/vendors/suppliers.
Gather, analyze and interpret external and internal data and write reports.
Assess overall company performance against objectives.
Represent the branch in events, conferences.
Ensure adherence to legal rules and guidelines.
Uptons Kodak Express
|IT Support Technician
Highlights
Identify hardware and software solutions.
Troubleshoot technical issues
Diagnose and repair faults.
Resolve network issues
Install and configure hardware and Software
Speak to customers to quickly understand their problems
Provide timely and accurate customer feedback.
Guide customers through problem-solving steps.
Follow up with clients to ensure resolution
Replace or repair necessary parts
Support the roll-out of new applications
Create procedural documentation for support.
Manage multiple cases simultaneously
Test and evaluate new technologies
Conduct electrical safety checks on equipment.
ANZ Newzealand
|Cybersecurity Management Virtual Internship
Highlights
Conducted security assessments and identified potential vulnerabilities and weaknesses in clients' systems.
Participated in multiple threat analysis and incident response activities.
Monitored and analyzed security-related data to identify potential security risks.
Assisted in the preparation of reports and presentations on cybersecurity initiatives and projects.
Collaborated with team members to ensure effective and efficient execution of cybersecurity tasks.
SAP Johannesburg
|Cybersecurity Virtual Internship
Highlights
Actively participated in a variety of cybersecurity projects and tasks, gaining valuable experience under the mentorship of seasoned professionals.
Demonstrated an ability to apply cybersecurity concepts, techniques, and best practices to real-world scenarios, further enhancing knowledge and skills in the field.
Played a key role in security testing and evaluating security systems and technologies, contributing to the overall effectiveness and integrity of the organization's cybersecurity measures.
Collaborated closely with a dynamic team to proactively identify, report, and resolve cybersecurity threats and vulnerabilities, ensuring a robust and secure digital environment for the organization.
Education
Cybrary
Certification
Comptia Linux+ Certification
Cisco Network Academy
Certification
Certicate in NDG Linux Unhatched
Cybrary
Certification
Microsoft Certified Solution Associate Certification
Cybrary
Certification
System Security Certified Professional
Alison College
Diploma
Diploma in Standards Integrated Management System
Scholars International Institute of Technology, Denver USA
Diploma
Diploma in Comptia Network
SkillFront
Associate
ISO/IEC 2000 IT Service Management Associate
Salesforce
Certification
Certified Associate
ISEA
Certification
Certified Cyber Hygiene Practitioner, Ministry of Electronics and Information Technology (India)
The International Cyber Threat Task Force
Certification
Ransomware Uncovered Specialist Certificate
SkillFront
Associate
ISO/IEC 2000 IT Service Management Associate
Digital Skills Nigeria
HTML5 Application Development
IBM
Cybersecurity Analyst (Coursera)
Itronix Solutions
Certification
Certified Python Programming Professional Certification
ALX
Software Engineering (Back End Develpoment)
Cybersecurity Certificate (Coursera)
Skills
Technical Tools
SIEM (3+ Years), Kali linux (2+ Years), Metasploit, Nmap (3+ Years), Nessus (2 + Years), OWASP ZAP (3+ years), Splunk Enterprise (3+Years), Cisco Packet Tracer (4+ years), Virus Total(3+Years), TCP view(3+ Years), Explorer (3+ Years).
Interests
Career Highlights
Experienced with EDR, SIEM, IDS/IPS, Threat Behavior Analytic systems, Experienced using host and network data to triage alerts and perform investigations, Experienced with regulatory requirement and standards such as NIST, MITRE ATT&CK framework, Malware Analysis, Network Security, System Security, Penetration Testing/Vulnerability Scanning, Experienced in creating reports to monitor remediation of IT findings and issues, Enterprise knowledge such as firewall/server/database – patching/encryption/access control and etc., Technical writing, Data Loss Prevention, End Point Protection, Threat Modeling, Advanced Threat Protection, CyberKill Chain, APT, Experienced with OWASP TOP 10 for Web Application & Mobile Application.
Area of Interest
SOC Analyst, Information Security Analyst, Vulnerability Management, Penetration Tester, Endpoint Security Engineer, Cybersecurity Facilitator.