Summary
Overview
Work History
Education
Skills
Certification
Timeline
Generic

Aziz Adeniran

Dallas,NJ

Summary

Accomplished Cybersecurity Specialist & Soc Analyst with a proven track record at Spotify & Lyft, enhancing network security through advanced threat detection tools and conducting rigorous vulnerability assessments. Expert in SIEM management and possesses exceptional problem-solving abilities. Reduced cyber risks significantly, demonstrating a strong commitment to data security and compliance standards.

Professional with a strong background in cybersecurity, skilled in threat detection, incident response, and vulnerability management. Known for effective team collaboration, adaptability in dynamic environments, and results-driven approach. Equipped with expertise in network monitoring, risk assessment, and security protocols, ensuring reliable protection and mitigation strategies. Recognized for analytical thinking, problem-solving abilities, and unwavering focus on achieving organizational goals.

Overview

8
8
years of professional experience
1
1
Certification

Work History

SOC Analyst

Lyfy
03.2021 - 10.2024
  • Client support and liaison: Provide expert guidance and act as a key liaison between Control Risks ONE and dedicated client in high-stress environments, managing security-related incidents and inquiries.
  • Tailored security solutions: Respond promptly to client requests, delivering bespoke verbal and written security assessments and recommendations based on a deep understanding of their operations, while ensuring proactive crisis management and coordination.
  • Intelligence and security risk consulting: Collect, evaluate, and disseminate relevant open-source and proprietary information, preparing comprehensive threat intelligence reports and risk assessments. Monitor global events and forecast operational impacts to the client based on bespoke escalation protocols and risk registers.
  • Crisis management and provider identification: Support Control Risks crisis management teams and evacuation operations by maintaining situational awareness of crises and identifying security providers to ensure rapid response and client safety.
  • Client account management: Serve as the primary point of contact for the dedicated account.
  • Monitor the network and associated systems for security related incidents, evaluate current threats and provide recommendations for remediation and reporting for any identified incidents to the Information Systems Security Manager (ISSM).
  • Use DOD provided tools to continually assess the security posture of the Network and all connected systems as well as evaluating new systems and changes to existing systems for configuration weaknesses prior to production deployment of the systems.
  • Support and manage Cybersecurity tools that enable the delivery of cyber security services. These include: security filtering, network monitoring, host based monitoring, event logging and correlation, and scanning tools.
  • Cybersecurity Vulnerability Management (IAVM) and DISA VDP Reviews
  • Conducts cyber threat intelligence analysis, develops correlation techniques, correlates actionable cybersecurity events, participates in the coordination of resources during incident response efforts, and reports and tracks incident findings and resolutions to customers that include trends, responses, and mitigation actions.
  • Assesses, plans, and enacts measures including refinements to cybersecurity architecture, tools configurations, and detection signatures to help protect customers from security breaches and attacks on its computer networks and systems
  • Monitored real-time security alerts to identify potential threats, significantly reducing incident response times.
  • Improved system security by configuring firewalls and intrusion detection systems.
  • Performed risk analyses to identify appropriate security countermeasures.
  • Encrypted data and erected firewalls to protect confidential information.
  • Improved incident management workflows through streamlined communication between SOC Analysts, IT departments, and other relevant parties.
  • Evaluated new cybersecurity solutions through rigorous testing procedures, recommending the most appropriate technologies based on specific requirements and budget constraints.
  • Collaborated with IT department to ensure seamless application of security policies across all technology platforms.
  • Maintained accurate documentation of all SOC activities, facilitating knowledge sharing across the organization.
  • Provided expert guidance on cybersecurity trends and emerging threats to internal stakeholders for informed decisionmaking.
  • Conducted comprehensive security assessments to identify risks and recommend mitigation strategies.
  • Implemented automated tools for continuous monitoring of system logs, reducing manual efforts by the team.
  • Updated security procedures and documentation, keeping pace with evolving cyber threats and industry best practices.

Cybersecurity Specialist

Spotify
03.2018 - 02.2021
  • Maintained up-to-date knowledge of emerging threats, providing proactive solutions for potential vulnerabilities.
  • Contributed to the development of company-wide policies on information security, privacy, and acceptable use of technology resources.
  • Reduced cyber risks by conducting regular vulnerability assessments and penetration tests.
  • Enhanced network security by implementing advanced threat detection and prevention tools.
  • Developing and implementing cybersecurity measures and best practices to protect sensitive financial data.
  • Conducting regular audits and tests to ensure the effectiveness of security protocols and identify potential vulnerabilities.
  • Responding promptly and effectively to any security incidents or breaches, minimizing damage and downtime.
  • Keeping up to date with the latest cybersecurity trends, threats, and countermeasures.
  • Collaborating with other departments to ensure company-wide understanding and compliance with cybersecurity measures and protocols.

Ensuring compliance with all relevant regulations and standards, including data protection and privacy laws.

  • Evaluate and conduct top-level system architecture design, integration, testing, installation, and troubleshooting from a cybersecurity perspective.
  • Translate military operational and mission requirements into system design concepts and performance specifications.
  • Prepare and review cybersecurity-related test plans, procedures, and reports for technical adequacy.
  • Integrate cybersecurity, COMSEC, and TEMPEST requirements throughout the system lifecycle.
  • Assess system performance against cybersecurity requirements, monitor field performance, and manage risk.
  • Support the preparation of cybersecurity acquisition documents, ensuring compliance with regulations and policies.
  • Implement the DoD Risk Management Framework (RMF), collaborating with the ISSM to ensure successful security controls.
  • Provide input on policy, budget, and doctrinal issues related to cybersecurity.
  • Prepare recommended IA approval documentation and support network security architecture development.
  • Analyze vulnerabilities, conduct risk assessments, and manage security certifications and accreditations.
  • Manage computer incident coordination with local NECs and CERTs, ensuring timely response.
  • Support compliance with the DoD IG Cybersecurity Self-Assessment and Federal Information Security Management Act (FISMA).
  • Participate in organizational inspections, review corrective actions, and develop innovative cybersecurity strategies.
  • Act as a consultant and mentor on cybersecurity matters to other team members.

Held Desk Assistant

FanDuel
01.2017 - 02.2018
  • Provided remote assistance to customers, guiding them through resolution steps over the phone or via email.
  • Collaborated with team members to solve complex problems and provide top-notch support services.
  • Assisted customers with software installation, ensuring proper setup and smooth operation.
  • Assessed, troubleshot and repaired various machines such as desktops, printers and sorters.
  • Conducted regular system maintenance, ensuring optimal performance and minimal downtime for clients.
  • Documented all support interactions in ticketing system to track progress and maintain records of resolved issues.
  • Reduced ticket backlog through diligent follow-up and prioritization of tasks.
  • Monitored network activity using specialized tools, identifying potential issues before they escalated into major problems.
  • Responded to customer inquiries and provided technical assistance over phone and in person.
  • Tested new software and hardware prior to deployment.
  • Diagnosed and troubleshot hardware, software and network issues.
  • Installed and configured operating systems and applications.
  • Monitored system performance to identify potential issues.
  • Configured and tested new software and hardware.
  • Maintained servers and systems to keep networks fully operational during peak periods.
  • Assisted in development of system security protocols.

Education

Cybersecurity Specialist & Linux Essentials

Kernelios
Brooklyn, New York

Skills

  • Vulnerability assessment
  • Endpoint security
  • SIEM management
  • Threat intelligence
  • Log analysis
  • Incident response
  • TCP and IP protocols
  • Intrusion detection
  • Identity management
  • Data loss prevention
  • Wireshark usage
  • Nmap scanning
  • Web security
  • Access control
  • Forensic investigation
  • Packet analysis
  • Security policies
  • Application security
  • Database security
  • Problem-solving abilities
  • Time management
  • Data security
  • Wireshark software
  • Cybersecurity frameworks
  • Threat hunting
  • Ethical hacking
  • Security monitoring
  • IDS integration
  • DDoS prevention
  • Risk management
  • Security protocol
  • Data analysis
  • Network monitoring
  • Security analysis
  • Firewall configuration & management
  • Malware analysis

Certification

  • CompTIA Cybersecurity Analyst (CySA+) - CompTIA.
  • Certified Information Systems Security Professional (CISSP)
  • Security+
  • comptiaA+
  • cloud+

Timeline

SOC Analyst

Lyfy
03.2021 - 10.2024

Cybersecurity Specialist

Spotify
03.2018 - 02.2021

Held Desk Assistant

FanDuel
01.2017 - 02.2018

Cybersecurity Specialist & Linux Essentials

Kernelios
Aziz Adeniran