Summary
Overview
Work History
Education
Skills
Accomplishments
Certification
Languages
Timeline
Hi, I’m

Aziz Adeniran

Irving,TX

Summary

Accomplished IT Compliance Coordinator and Cybersecurity Specialist with a keen eye for detail, focusing on Data Protection, Information Security, and Privacy compliance within the healthcare sector. Showcasing proficiency in evaluating NIST Cybersecurity Framework compliance, supporting SOC 2 audit processes, and skillfully tracking and overseeing privacy and security recommendations. Capable of managing remediation efforts, maintaining thorough documentation, and collaborating with Managed Security Service Providers (MSSPs) to design and implement information security awareness training initiatives. Exhibiting exceptional expertise in malware and ransomware analysis, incident response, and security evaluations, utilizing top-tier industry tools such as Nessus, OpenVAS, Metasploit, Nmap, Splunk, IBM QRadar, and FireEye HX to detect and address potential security threats. Possessing experience in penetration testing, ethical hacking, and network security administration in both on-site and cloud-based settings. Demonstrating remarkable organizational, research, analytical, and problem-solving abilities, as well as the capacity to effectively convey intricate technical concepts to a diverse range of audiences, including both technical and non-technical individuals.

Overview

14
years of professional experience
1
Certification

Work History

Amyx, Iinc.

Cybersecurity Specialist
11.2021 - Current

Job overview

  • Coordinate and assess cybersecurity compliance activities, including evidence gathering for Data Protection, Information Security, and Privacy
  • Collaborate with Privacy and Compliance Officer to support SOC 2 compliance review and third-party audit activities
  • Monitor communication channels for security vulnerabilities and security patches
  • Review penetration test results and vulnerability scans, coordinating mitigation activities with IT and IS teams
  • Assist in the development and delivery of information security awareness training programs
  • Conduct penetration testing and vulnerability assessments on applications, networks, and infrastructure
  • Provide guidance on remediation of identified vulnerabilities and exploits, including patch updates and decommissioning of servers
  • Develop and maintain security policies, procedures, and guidelines to ensure a secure and compliant environment
  • Participate in incident response and investigation efforts, working closely with the IT and cybersecurity teams
  • Support the evaluation and implementation of new security tools and technologies.

Blueprint Solutions

Desktop Support Analyst
02.2022 - 06.2023

Job overview

  • Delivered exceptional customer service while addressing urgent technical issues via phone, email, or in-person support channels.
  • Streamlined processes for increased efficiency by implementing software updates and patches.
  • Ensured data integrity and security through regular backups and implementation of antivirus software.
  • Served as a liaison between IT department staff members to ensure seamless integration of technology services across all business units within the organization.
  • Assisted in development of system security protocols.
  • Responded to customer inquiries and provided technical assistance over phone and in person.
  • Patched software and installed new versions to eliminate security problems and protect data.
  • Worked with third-party vendors to resolve issues with hardware or software covered by annual maintenance agreements.
  • Removed malware, ransomware, and other threats from laptops and desktop systems.

Check Point Software Technologies

SOC Analyst
12.2017 - 09.2021

Job overview

  • Implemented Ansible automation to streamline and expedite remediation actions for detected vulnerabilities, such as patch updates and server decommissioning, resulting in a more efficient and secure environment
  • Created Ansible playbooks to automate repetitive security assessment and compliance management tasks, freeing up time for more critical investigations and improving the accuracy and consistency of our security reporting
  • Collaborated closely with Managed Security Service Provider (MSSP) to facilitate technical investigations of alerts generated via SIEM and SOC systems
  • Developed regular and customized security assessment reports for a diverse audience, including Executive Team, Operations, and Employees
  • Supported the implementation of a Compliance Management System and contributed to security incident response plan development
  • Conducted remediation actions for detected vulnerabilities, such as patch updates and server decommissioning, to maintain a secure environment
  • Monitored network traffic and log data to identify and assess potential security threats and incidents, employing tools like Splunk and IBM QRadar SIEM systems
  • Performed comprehensive network security evaluations, utilizing an array of tools such as FireEye HX, Proofpoint, Burp Suite, Nmap, Kali Linux, Metasploit, Fortinet, and Crowdstrike
  • Investigated PCAP files using Wireshark to pinpoint unusual traffic, analyzed affected hosts, and generated IOC executive summaries
  • Utilized a variety of tools and techniques for static and dynamic malware analysis, creating lab environments (Flare, Remnux, Inetsim), and demonstrating a keen interest in reverse engineering
  • Developed Yara and Snort rules to enhance security measures, leveraging extensive knowledge of networking principles and protocols like TCP/IP, HTTP, HTTPS, DNS, and RPC
  • Partnered with incident response teams to scrutinize, isolate, and resolve security events, proactively monitoring security notifications and incidents in real-time
  • Contributed to the establishment and maintenance of SOC policies, procedures, and playbooks to strengthen the organization's security posture
  • Continually improved security measures by identifying process gaps and recommending appropriate countermeasures, working closely with cross-functional teams to ensure robust security throughout the organization
  • Created Ansible playbooks to automate repetitive security assessment and compliance management tasks, freeing up time for more critical investigations and improving the accuracy and consistency of our security reporting.

Blue Origin

System Administrator
04.2016 - 11.2017

Job overview

  • Installed, configured, and troubleshooted Windows Server and Linux-based operating systems, ensuring maximum system uptime and availability
  • Monitored system performance and utilization, proactively addressing issues to optimize the performance and reliability of virtual machines
  • Designed and executed backup and disaster recovery strategies, enabling swift recovery in the event of system failure or disaster
  • Established and sustained security measures, including firewalls, intrusion detection and prevention systems, and antivirus software, to defend the company's network and systems against unauthorized access and potential security risks
  • Administered and maintained Active Directory, Group Policy, and other directory services, providing secure and efficient access to network resources for users
  • Configured and oversaw network switches, routers, and other network equipment, ensuring dependable and effective network connectivity
  • Addressed and resolved user support inquiries, delivering prompt issue resolution and maintaining high levels of user satisfaction
  • Formulated and implemented system and network policies and procedures in compliance with industry standards and regulations
  • Collaborated with cross-functional teams to streamline IT operations and support business objectives
  • Conducted regular audits and assessments to ensure the organization's infrastructure adheres to security best practices and industry standards
  • Managed and updated existing documentation, including policies, checklists, and asset inventories
  • Maintained IT knowledge base, creating a repository of procedures and technology changes associated with change management
  • Assisted in the development of security management principles, practices, policies, and procedures
  • Conducted regular audits of user accounts and access rights to prevent unauthorized access and maintain compliance
  • Developed and maintained backup and disaster recovery plans to minimize potential data loss and system downtime
  • Provided technical support and guidance to end-users, ensuring timely resolution of issues and maintaining high levels of customer satisfaction.

Dnv Gl

Technical Support Engineer
05.2010 - 06.2012

Job overview

  • Installed, configured, and troubleshooted Windows Server and Linux-based operating systems, ensuring maximum system uptime and availability
  • Monitored system performance and utilization, proactively addressing issues to optimize the performance and reliability of virtual machines
  • Designed and executed backup and disaster recovery strategies, enabling swift recovery in the event of system failure or disaster
  • Established and sustained security measures, including firewalls, intrusion detection and prevention systems, and antivirus software, to defend the company's network and systems against unauthorized access and potential security risks
  • Administered and maintained Active Directory, Group Policy, and other directory services, providing secure and efficient access to network resources for users
  • Configured and oversaw network switches, routers, and other network equipment, ensuring dependable and effective network connectivity
  • Addressed and resolved user support inquiries, delivering prompt issue resolution and maintaining high levels of user satisfaction
  • Formulated and implemented system and network policies and procedures in compliance with industry standards and regulations
  • Collaborated with cross-functional teams to streamline IT operations and support business objectives
  • Conducted regular audits and assessments to ensure the organization's infrastructure adheres to security best practices and industry standards
  • Managed and updated existing documentation, including policies, checklists, and asset inventories
  • Maintained IT knowledge base, creating a repository of procedures and technology changes associated with change management
  • Assisted in the development of security management principles, practices, policies, and procedures
  • Conducted regular audits of user accounts and access rights to prevent unauthorized access and maintain compliance
  • Developed and maintained backup and disaster recovery plans to minimize potential data loss and system downtime
  • Provided technical support and guidance to end-users, ensuring timely resolution of issues and maintaining high levels of customer satisfaction.

Education

KERNELIOS SECURITY
Brooklyn, United States

Certificate in Cyber Security Risk Assessment, Treatment, And Reporting from CYBER SECURITY SPECIALIST
11.2023

University Overview

Kernelios Security
Brooklyn, United States

CERTIFIED IN LINUX ESSENTIALS
11.2023

University Overview

Alison Empower
Newark, United States

No Degree from CERTIFIED IN CompTiA A+ / ComTIA SECURITY+
10.2022

University Overview

Osun State University
Nigeria

Bachelor of Science from Computer Science
06.2011

University Overview

Skills

Windows

Linux

Kali Linux

Network and Security Tools:

Wireshark

Nmap

Metasploit

Nessus

Splunk

IDS/IPS

Firewall

Endpoint Protection

VPN

DNS Monitoring Tools

Burp Suite

OpenVAS

Snort

OSSEC

Aircrack-ng

Tcpdump

Cain and Abel

Acunetix

Qualys Vulnerability Management

IDS Integration

Symantec Endpoint Protection

Splunk SIEM

Proofpoint

OWASP ZAP

Carbon Black

Procmon

FireEye HX

Programming:

Python

PHP

HTML

Networking:

Local Area Network (LAN)

DNS

DHCP

VPN

Networking

WAN

Active Directory

LAN

Cloud platforms:

AWS

Azure

GCP

Malware Analysis:

PEStudio

Procmon

InetSim

ProcessHacker

FlareVm

Network Security:

Palo Alto firewall

pfSense

Cisco ASA

Check Point

Juniper SRX

Endpoint Security:

CrowdStrike

Carbon black

FireEye HX

Microsoft Defender ATP

Symantec Endpoint Protection

Automation and Configuration Management:

Ansible

Puppet

Chef

Terraform

Jenkins

GitLab

Interpersonal Skills:

Leadership

Communication

Ethics and Integrity

Strong Internet Research

Excellent Verbal, Written, and Quantitative Skills

Time Management and Prioritization Abilities

Effective Presentation and Negotiation Skills

  • Technical Documentation
  • Interpersonal Communication
  • Application Installations
  • Computer Security
  • Connectivity Resolution
  • Problem-Solving
  • Information Security Policies
  • Virtualization Security
  • Penetration Testing

Accomplishments

Accomplishments
  • CompTIA Cloud Essentials+
  • CompTIA Network+
  • CompTIA Pentest+
  • CompTIA Security +
  • CompTIA Cybersecurity Analyst (CYSA+)
  • Certified Cybersecurity (CC) by ISC2
  • Cisco Certified Network Associate (CCNA)
  • Certified Information Systems Auditor (CISA)
  • Certified in Risk and Information Systems Control (CRISC)
  • CompTIA Secure Infrastructure Specialist - CSIS
  • CompTIA Network Security Professional – CNSP
  • CompTIA Security Analytics Professional – CSAP
  • CompTIA Network Vulnerability Assessment Professional – CNVP

Certification

  • CISSP - Certified Information System Security Professional
  • CISA - Certified Information Systems Auditor


Languages

English
Native or Bilingual

Timeline

Desktop Support Analyst
Blueprint Solutions
02.2022 - 06.2023
Cybersecurity Specialist
Amyx, Iinc.
11.2021 - Current
SOC Analyst
Check Point Software Technologies
12.2017 - 09.2021
System Administrator
Blue Origin
04.2016 - 11.2017
Technical Support Engineer
Dnv Gl
05.2010 - 06.2012
KERNELIOS SECURITY
Certificate in Cyber Security Risk Assessment, Treatment, And Reporting from CYBER SECURITY SPECIALIST
Kernelios Security
CERTIFIED IN LINUX ESSENTIALS
Alison Empower
No Degree from CERTIFIED IN CompTiA A+ / ComTIA SECURITY+
Osun State University
Bachelor of Science from Computer Science
Aziz Adeniran