Summary
Overview
Work History
Education
Skills
Software
Timeline
Generic

Aziz Adeniran

Newark

Summary

Dynamic cybersecurity professional with extensive expertise in safeguarding digital assets and ensuring secure network environments. Recognized for collaboration and adaptability, consistently delivering measurable results in high-pressure situations. Proficient in threat analysis, risk management, and incident response, with a strong ability to navigate complex security challenges. Valued for reliability, clear communication, and a proactive approach to evolving threats in the cybersecurity landscape.

Overview

8
8
years of professional experience

Work History

SOC Analyst

Spotify
03.2022 - 06.2025
  • Providing 24 x 7 watch supporting continuous monitoring and incident response for hybrid cloud/ on-prem customer networks
  • Providing support in the detection, response, mitigation, and reporting of cyber threats affecting customer networks
  • Analyzing and reporting cyber threats as well as assisting in deterring, identifying, monitoring, investigating, and analyzing computer network intrusions
  • Monitored network traffic using SIEM tools to identify potential threats in real-time.
  • Maintained accurate documentation of all SOC activities, facilitating knowledge sharing across the organization.
  • Improved incident management workflows through streamlined communication between SOC Analysts, IT departments, and other relevant parties.
  • Collaborated with IT teams to implement effective security measures, safeguarding critical data and systems.
  • Improved system security by configuring firewalls and intrusion detection systems.
  • Monitored real-time security alerts to identify potential threats, significantly reducing incident response times.
  • Conducted in-depth analysis of security breaches to determine their root causes and prevent future incidents.
  • Encrypted data and erected firewalls to protect confidential information.
  • Intrusion detection and prevention systems (IDS/IPS)
  • Anti-malware systems
  • Security Incident and Event Management systems (SIEM)
  • Data Loss Prevention systems (DLP)
  • Advanced Endpoint Detection and Response systems (EDR)
  • Write new rules to ensure appropriate MITRE ATT&CK framework coverage
  • Escalate potential incidents
  • Assist in any incident response activities
  • Improved incident management workflows through streamlined communication between SOC Analysts, IT departments, and other relevant parties.
  • Document threat campaign(s) techniques and lateral movements and extract indicators of compromise (IOCs).
  • Manage the Security monitoring tools, and set up dashboards and alerts. Develop and maintain technical documentation and Standard Operating Procedures (SOP)

Cybersecurity Specialist

Spotify
02.2018 - 01.2022
  • Conducted vulnerability assessments to identify and mitigate potential risks in network infrastructure.
  • Led incident response efforts, coordinating with cross-functional teams to address security breaches.
  • Analyzed security logs and monitored systems for anomalies, ensuring proactive threat detection
  • Maintained up-to-date knowledge of emerging threats, providing proactive solutions for potential vulnerabilities.
  • Contributed to the development of company-wide policies on information security, privacy, and acceptable use of technology resources.
  • Enhanced network security by implementing advanced threat detection and prevention tools.
  • Managed patch management procedures effectively, ensuring timely updates to mitigate vulnerabilities in the organization''s systems.
  • Optimized security infrastructure by evaluating, recommending, and implementing appropriate hardware and software upgrades.
  • Created strong encryption protocols for data protection, safeguarding sensitive information from potential breaches.
  • Monitored confidential company data and mitigated hacking through network systems updates.
  • Conducted security audits to identify vulnerabilities.
  • Performed risk analyses to identify appropriate security countermeasures.
  • Encrypted data and erected firewalls to protect confidential information.
  • Reviewed firewall configurations regularly to ensure optimal perimeter defense against external threats.
  • Increased employee awareness on cybersecurity best practices through comprehensive training programs.
  • Collaborated with IT teams to ensure secure implementation of new software applications and systems.
  • Reduced cyber risks by conducting regular vulnerability assessments and penetration tests.
  • Evaluated and recommended security tools, optimizing system defenses against evolving threats.
  • Maintain documentation related to compliance programs, including responses to customer inquiries, POA&M, and SSP.
  • Assist in integrating new acquisitions into the standard compliance framework

Help Desk Assistant

FanDuel
01.2017 - 02.2018
  • Maintained updated contact lists across various platforms ensuring easy access to essential information during crucial moments.
  • Offered technical support and troubleshooting issues to enhance office productivity.
  • Opened and properly distributed incoming mail to promote quicker response to client inquiries.
  • Answered multi-line phone system, routed calls, delivered messages to staff, and greeted visitors.
  • Increased profitability and productivity by minimizing downtime and streamlining quality control procedures.
  • Contributed to successful project completion by providing research assistance when needed.
  • Generated reports using established templates that provided valuable insights into department performance metrics.
  • Maintained inventory of office supplies by monitoring usage patterns and submitting timely orders for replenishments.
  • Worked closely with management to provide effective assistance for specific aspects of business operations.
  • Organized resources, records, and personnel to accomplish aggressive targets
  • Reviewed and edited documents for accuracy, grammar, and clarity

Education

Cybersecurity Specialists & Linux Essentials

Kernelios

COMPTIA A+ & Security+ & Cloud +& Cissp & Cloud+

Alison Empower

Skills

  • Incident detection and response management
  • Endpoint threat management
  • Security vulnerability assessment
  • Cyber threat analysis
  • Incident management
  • Proficient in TCP/IP protocols
  • User identity management
  • Risk management for data integrity
  • Wireshark usage
  • OS security implementation
  • Encryption techniques
  • Security analysis
  • Firewall configuration
  • Malware analysis
  • Network monitoring
  • Data encryption

Software

MITRE ATT&CK Navigator – Threat mapping and adversary behavior analysis NIST Cybersecurity Framework – Risk management and compliance alignment πŸ§ͺ Sandboxing & Malware Analysis Cuckoo Sandbox – Malware behavior analysis Wireshark – Packet analysis and network forensics

Timeline

SOC Analyst

Spotify
03.2022 - 06.2025

Cybersecurity Specialist

Spotify
02.2018 - 01.2022

Help Desk Assistant

FanDuel
01.2017 - 02.2018

COMPTIA A+ & Security+ & Cloud +& Cissp & Cloud+

Alison Empower

Cybersecurity Specialists & Linux Essentials

Kernelios
Aziz Adeniran