Summary
Education
Certification
Timeline
Skills
Work History
Affiliations
Professional Afflictions
Work Availability
Security Clearance
Accomplishments
Overview
Websites
Interests
Languages
Generic

Afolabi Olomo.

ISSO
Chicago,IL

Summary

A US ARMY Reservist, with DOD active Secret Clearance and prolific information system security officer with deep experience in Privacy and Data Security Management and Operations, Vulnerability Scanning, Assessment and Authorization (A&A), NIST 800-60, NIST 800-53 Rev.1 and Rev.4 and NIST 800-37 Rev.1, NIST 800-18, NIST 800-53 Rev.3 and NIST 800-34, FIPS, FISMA Security Content Automation Protocol, NIST Family of Security Control, FedRAMP Security Assessment Framework, POA&M, Incident and Contingency Planning, Information Architecture and IT Security activities. Used Splunk and other technical testing tools such as Nmap, NESSUS for monitoring logs, alerts, and aggregations. Information Security Specialist with passion for aligning security architecture plans and processes with security standards and business goals. Extensive experience developing and testing security framework for cloud-based software. Versed in robust network defense strategies. COMPTIA security+,CYSA. and CISM. Certified

Education

Master of Science - Cyber Security

Southern New Hampshire University
Hooksett, NH
04.2024

Bachelor of Science - Occupational Safety And Health

Columbia Southern University
Orange Beach, AL
02.2022

Certification

• CompTIA Cybersecurity Analyst (CYSA) 2026

• CompTIA Security Certification (Security+) 2026

CISM

Timeline

Information System Security Officer

Peoples Gas
06.2017 - Current

Information Security Analyst

CyberXentLLC
01.2017 - 05.2017

System Administrator

NijaServiceLLC
03.2016 - 11.2016

Master of Science - Cyber Security

Southern New Hampshire University

Bachelor of Science - Occupational Safety And Health

Columbia Southern University

Skills

  • Network Assessment and Defense
  • TCP/IP protocol assessment
  • Capturing and analyzing network traffic using sniffer
  • Examining wireless network
  • Deep dive in packet analysis-using Wireshark and network miner
  • Network security- firewall configuration
  • Configure window-based firewall to allow incoming traffic
  • Configure a Linux based firewall to allow incoming traffic
  • Securing the ptsense firewall
  • Instruction detection using snort
  • Writing custom rules
  • Vulnerability scanning of Linux Target
  • Performing Reconnaissance from the WAN
  • Signature detection and alerting an administrator
  • Scanning network on the LAN
  • Log analysis of Linux system with Grep and Gawk
  • IPS, SYSLOG, and NTP
  • FISMA & FIPS Standard Guidelines: FIPS 199, 140-2, 197
  • NIST 800 Series: 800-37, 800-60, 800-53, 800-53A, 800-18, 800-30, 800-137
  • Tool: Spunk, Nessus, NMAP, VMware, ACAS
  • RMF Tools: eMASS, CSAM & XACTA
  • Security Monitoring: Splunk, WireShark, SCAP Scanner & SIEM
  • Networking: LANs, WANs, VPNs, Routers, Firewalls, DNS, TCP/IP
  • Penetration Testing Tool: Kali Linux, Metasploit
  • Software: MS Office (Word, Excel, Outlook, Access, PowerPoint & Project), Archer

Work History

Information System Security Officer

Peoples Gas
06.2017 - Current

• Identified trends and root causes of system failures or vulnerabilities using NESSUS Vulnerability Scanner, NMAP to scan ports, weak configuration, and missing patches.

• Performed installations, upgrades, and troubleshooting for 70+ users and 120 devices, including laptops, desktops, printers, and smartphone devices.

• Defined and executed Cybersecurity Maintenance Plans and activities such as application of Security Template Implementation guides, Information Assurance Vulnerability Management (IAVM) remediation actions, System and Software Security Patches.

• Configured and installed local servers, executed hardware and software upgrades, and supported disaster recovery and backup procedures Install firewalls and anti-virus software and deploy 2- factor authentication to ensure data integrity and cybersecurity for highly sensitive legal documentation.

• Installed, operated, and maintained state-of-the-art IT Infrastructures including local and wide area network (LAN & WAN), Mainframe, Mini and Microcomputers, and peripheral devices.

• Attended meetings with the IT department to identify continuous improvement opportunities and enhance the delivery of IT services to users

• Collaborated with the Corporate Information Security and IT Audit teams to review Information Security policies, standards, procedures, and guidelines.

• Conducted regular internal penetration testing and Investigated IT security incidents.

• Researched the latest information technology (IT) security trends.

• Continuing education on security issues in the oil and gas industry.

• Worked with Security Operation Center (SOC) Analyst in making sure Intrusion detection and prevention systems (IDS/IPS) such as SNORT to analyze and detect worms, vulnerabilities exploit attempts, IDS monitoring and management using Security Information and Event Management (SIEM) by Tenable to collect and analyze large volumes of logs and network traffic and alerts to assess, prioritize and differentiate between potential intrusion attempts and false alarms.

• Developed security standards and best practices for the organization.

• Recommended security enhancements to management or senior IT staff.

• Reviewed third-party application security vulnerabilities and recommended updates.

• Coordinated and executed IT security projects.

• Coordinated and executed IT security assessments and managed remediation of findings.

• Researched, assessed, and deployed added security processes and products in response to identified vulnerabilities.

  • Resolved diverse range of technical issues across multiple systems and applications for customers and end-users across various time zones.
  • Documented support interactions for future reference.
  • Assisted in development of system security protocols.
  • Developed and implemented preventive maintenance procedures.

Information Security Analyst

CyberXentLLC
01.2017 - 05.2017
  • Worked with other teams to enforce security of applications and systems.
  • Conducted security audits to identify vulnerabilities.
  • Administered and monitored firewalls, intrusion detection systems and anti-virus software to detect risks.
  • Drafted security reports and metrics to track security performance and strategize improvements.

• Investigated Desktop PC issues submitted through ticketing system; Identify and apply solutions for common computer problems.

• Created & modified new and existing Microsoft Access Database queries for account manager reporting and reconciliation.

• Installed updates for windows-based server operating systems.

• Created/disabled Active Directory user accounts for new hires and terminating employees.

• Loaded electronic claim and eligibility files, from clients and carriers into benefits system, ensure system contains the most current data; Investigate error reports generated and review with team managers to correct any issues.

• Documented and maintained all technical procedures in easy-to-follow how-to guides

• Reviewed support tickets and assigned them to the correct technical resource to ensure timely response to all IT related requests.

• Ensured HIPAA regulations are followed. Ensures file transmissions follow encrypted protocols, staff are following guidelines for disclosure of PHI and ePHI, participates in team HIPAA risk assessment and training.

  • Monitored use of data files and regulated access to protect secure information.
  • Skilled at working independently and collaboratively in a team environment.
  • Performed risk analyses to identify appropriate security countermeasures.

System Administrator

NijaServiceLLC
03.2016 - 11.2016
  • • Install and support networks, servers, storage, security systems.
  • • Configure software, hardware, peripherals, services, settings, directories, etc.
  • • Perform daily system checking and verify integrity of all systems.
  • • Established Policies & Procedures that implement the SDLC, Risk Management Framework (RMF), and RMF artifact standards and best practices.
  • • Responsible for upkeep, configuration and reliable operation of computer systems and network infrastructure.
  • • Develop specific aims, performance standards, and individual development plans for all personnel.
  • • Participated in the change management process, including reviewing Requests for Change (RFC) and assisted in the assessment of a potential change’s Security Impact.
  • • Reviewed system and application logs and verified completion of scheduled jobs.
  • • Performed and/or QC daily backup operations and applied upgrades on a regular basis.
  • • Performed network, server, and storage performance reporting to support capacity planning.
  • • Provided services as Security Controls Assessors (SCAs) and performed as integral part of Assessments and Authorizations (A&A) process to include scanning, documentation, reporting and analysis requirements.
  • • Performed ongoing performance tuning, hardware upgrades, and resource optimization.
  • • Developed and recommended security standards, network hardware/software.
  • • Select network management software to support HIPAA standards.
  • • Managed network Firewall, Antispam, Antivirus, and Web filtering devices, SSL certificates, and PGP encryption.
  • • Managed remote access and remote desktop software.
  • • Managed Exchange, Helpdesk Support, and Network Monitoring applications.
  • • Other duties as assigned.

Affiliations

  • Computing Technology Industry Association (CompTIA)
  • ISACA
  • SC2

Professional Afflictions

CompTia is a leading provider of vendor-neutral IT certifications that validate the skills and knowledge of IT professionals. CompTia offers certifications in various domains, such as security, networking, cloud computing, project management, and more

Work Availability

monday
tuesday
wednesday
thursday
friday
saturday
sunday
morning
afternoon
evening
swipe to browse

Security Clearance

Active DoD Security Clearance

Accomplishments

  • Resolved product issue through consumer testing.
  • Supervised team of 30 staff members.

Overview

9
9
years of professional experience
3
3
Certificate

Interests

Research to acquire more knowledge

Languages

English
Full Professional