Summary
Overview
Work History
Education
Skills
Certification
Timeline
Generic

Akah Tenjoh Okwen

Houston,Texas

Summary

Highly motivated IT professional With over six years of experience in cybersecurity, network security, incident response, and GRC, I am well-equipped to contribute effectively to your team.
My technical skills encompass vulnerability assessments, threat analysis, SIEM, Python scripting, and network hardening. I have a proven ability to detect and respond to . I am eager to bring my expertise to your organization and contribute to its cybersecurity objectives


Overview

6
6
years of professional experience
1
1
Certification

Work History

Cyber security Analyst

Peraton
Arlington, VA
03.2023 - Current
  • Deployed, endpoint detection and response (EDR) ,intrusion prevention system(IPS) and security information and event management (SIEM) tools to monitor networks for suspicious activity and potential breaches
  • Conducted incidence response, containment, mitigation and recovery maintaining system integrity
  • Analyzed and correlated security events in Azure sentinel and implemented countermeasures to mitigate against intrusion attacks
  • Developed best practices, policies, programs, procedures and security standards for the organization
  • Managed user accounts, user groups and permissions in the Identity and Access management (IAM)
  • Implemented secure network architectures, virtualization technologies, identity and access management principles, application security, encryption technologies, SOA, and web applications
  • Managed Next-generation and Cisco ASA firewall
  • Conducted regular security awareness training for employees to promote a strong security culture within the organization
  • Performed regular security assessments, vulnerability scanning using Nessus, Qualys and recommended mitigation strategies
  • Collaborated with internal and external stakeholders to ensure the security of data, systems, and network
  • Conduct audit & evaluate in alignment to the supply cyber security control framework
  • Utilized NIST cybersecurity framework to improve security practices, protect information and information systems.

Cyber network defender

U.S. Army
Wahiawā, HI
05.2018 - 06.2023
  • Designed, deployed, and maintained network security solutions such as firewalls, IDS/IPS, VPNs, and network access control (NAC)
  • Respond to network security incidents, investigate breaches, and implement incident response procedures to contain, mitigate, and recover from security incidents
  • Monitored and analyzed network traffic for anomalies, using Wireshark and NMAP
  • Designed and deployed network Segmentation, dividing the network into smaller segments to isolate sensitive data and minimize the impact of potential breaches
  • Implemented device hardening technique to Secure network devices like routers, switches, and firewalls through best practices and configuration techniques
  • Secured wireless networks using encryption standards and access control mechanisms
  • Conducted network security audits, assessments, and compliance reviews to ensure adherence to security policies, standards, and regulatory requirements
  • Maintained a backup and recovery system
  • Troubleshoot TCP/IP issues and other network connectivity issues
  • Create and manage user accounts using active directory domain services(ADDS), applied group policies, OUs And permissions
  • Ensure systems with updated patches
  • Resolved DHCP/TCP/IP and DNS issues
  • Design and deploy LAN/WAN, OSPF, BGP, NAT/PAT
  • Configure and maintain Virtual Private Networks (VPNs) for secure remote access to the network.

Cyber security analyst

Cask
Arlington, VA
03.2014
  • Network Access Control (NAC) controlled and managed network access for devices and users to ensure only authorized devices/personnel with the appropriate permissions can access the network.(IAM)
  • Assisted in identifying, remediating, and/or mitigating vulnerabilities in the environment, ensuring appropriate response to high risk and aged findings
  • Conducted Security Awareness and Training educating employees about cybersecurity best practices
  • Assisted in the development and implementation of security policies, procedures, and guidelines to establish a comprehensive security framework
  • Analyzed threat and indication of compromise (IOC) using cyber kill chain or ATT&CK
  • Investigated security incidents, containing the damage, restoring systems to normal operation, and implementing measures to prevent similar incidents in the future
  • Reviewed and managed security logs, including firewall, SIEM, and syslog to detect and investigate anomalies
  • Document security incidents, investigations, and remediation efforts for reporting and analysis purposes
  • Experienced of current technologies in authentication, federation, and identity management space (OAUTH 2.0, OpenID Connect, SAML, SCIM, FIDo.

Education

Bachelor's degree in Computer Science -

University of Ngaoundere
06.2016

Skills

  • Cisco Firewall
  • TCP/IP
  • EDR
  • HIPAA
  • PCI DSS
  • DNS
  • Linux
  • Python
  • Communication skills
  • NIST standards
  • SIEM
  • LAN/WAN
  • Wireshark
  • Nmap
  • Azure active directory

Certification

  • CompTIA Security+
  • Microsoft Certified, security, compliance and Identity fundamentals
  • ITIL4
  • COBIT
  • CompTIA A+
  • Google IT support certificate

Timeline

Cyber security Analyst

Peraton
03.2023 - Current

Cyber network defender

U.S. Army
05.2018 - 06.2023

Cyber security analyst

Cask
03.2014

Bachelor's degree in Computer Science -

University of Ngaoundere
Akah Tenjoh Okwen