Summary
Overview
Work History
Education
Skills
Certification
Timeline
Generic

Blessing Ngefor

Chicago,Illinois

Summary

Experienced Microsoft Defender Engineer with a background in Security Analysis, offering 3+ years of expertise and a strong understanding of information security. Seeking a position within your esteemed organization to enhance knowledge and skills for a successful career in cybersecurity, while contributing to company growth. Excellent time management skills, able to handle multiple tasks while adhering to strict deadlines. Dependable with a strong work ethic and eager to learn new skills.

Overview

3
3
years of professional experience
1
1
Certification

Work History

Microsoft Security Engineer

T-Mobile
11.2023 - Current
  • Implement migration to Defender for Endpoint/Servers to protect against threats.
  • Configure and enforce endpoint security policies using Microsoft Intune to secure devices across Windows, macOS, iOS, and Android platforms.
  • Implement policies of Attack Surface Reduction, Web Protection, Endpoint Detection and Response, Antivirus, Defender for SmartScreen, Firewall and Device Restriction for protecting client environment.
  • Implement Defender for Identity to protects on-prem users from external threats and lateral movement.
  • Implement Tenable.io for Vulnerability Assessment of clients environment and remediate vulnerabilities for a secure environment.
  • Design and implement solutions for Entra ID Privileged Identity Management to manage, control and monitor privileged access of Azure roles and Entra ID.
  • Implement of Azure policies for managing and monitoring your resources around your subscription.
  • Implement of Role based access control (RBAC) to ensure the principle of least privilege.
  • Design, implement, and maintain Azure AD Conditional Access policies to enforce security standards and prevent unauthorized access.
  • Conduct threat hunting activities in Microsoft Sentinel using custom KQL queries to identify potential vulnerabilities.
  • Implement identity and access management solutions using Azure AD, including Single Sign-On (SSO) and Role-Based Access Control (RBAC).
  • Implement Microsoft Purview DLP policies and created email alerts.
  • Configure Conditional Access policies to require Multi-Factor Authentication (MFA) for high-risk users and sensitive applications.
  • Implement session controls to limit user capabilities, such as restricting downloads in sensitive environments.
  • Work closely with Security compliance team to harden Azure infrastructure and resources with CIS benchmark framework.
  • Configure threat hunting and respond to alert that has came up in Defender for Endpoint.
  • Implement of Azure policies for managing and monitoring your resources around your subscription.
  • Stay updated on the latest cybersecurity trends and incorporate best practices into the organization’s XDR strategy.
  • Develop and maintain technical documentation, including configuration settings, workflows, and incident reports.
  • Utilize KQL to query and analyze large datasets in Azure Monitor, Azure Sentinel, and Microsoft Defender for Endpoint.
  • Conduct regular reviews of detection rules and analytics to improve threat visibility.

Cybersecurity Analyst

Peopod
10.2021 - 10.2023
  • Conducted Network Security Monitoring on services including SIEM, IDS/IPS, Firewall, Web Application Firewalls, and Data Loss Prevention (DLP).
  • Investigated phishing alerts in Microsoft Defender XDR and create a report.
  • Provided technical security guidance related to projects or teams leading in the participation of the development/implementation of new systems to ensure security specifications are met.
  • Performed threat analysis in a 24/7 environment, mitigating and managing all threats and risks to the company and gaining 99% security in data.
  • Handled various security incidents effectively to reduce disruption to business operations and avert any data breaches.
  • Analyzed current vulnerability management systems for effectiveness and make recommendations to maintain and improve accuracy and scalability of systems.
  • Collected and reported on key security metrics such as vulnerabilities and incidents on monthly base.
  • Managed Nessus scans periodically and work with the IT team to remediate vulnerabilities.
  • Advised incident responders in steps to take to investigate and resolve computer security incidents.
  • Monitored Microsoft Defender for Endpoint EDR alerts and investigate suspicious activities.
  • Performed regular security audits to ensure compliance with internal policies and external regulations.
  • Educated employees on cybersecurity best practices, including phishing and social engineering awareness.
  • Developed and updated security policies and documentation of SOC processes, procedures, and technologies.
  • Maintained and optimized security tools like firewalls, antivirus software, endpoint detection and response (EDR), and intrusion detection/prevention systems (IDS/IPS).
  • Investigated security incidents, determining their scope, origin, and impact.
  • Collaborated with IT teams to integrate security measures into the development and deployment of new applications.
  • Analyzed security incidents post-resolution, identifying areas for improvement in both technical controls and incident response processes.
  • Improved incident response times by developing and maintaining cybersecurity playbooks for common attack scenarios.
  • Ensured compliance with industry regulations by performing comprehensive audits on existing security policies and procedures.
  • Enhanced data integrity and availability by designing and implementing comprehensive backup and disaster recovery plans.
  • Reduced false positive alerts in security monitoring systems by fine-tuning detection parameters, enhancing operational efficiency.
  • Conducted comprehensive security audits for identifying potential vulnerabilities, leading to strengthened defense mechanisms.
  • Customized and managed security information and event management (SIEM) systems for real-time threat detection and analysis.
  • Played key role in regulatory compliance projects, ensuring adherence to industry standards and legal requirements related to cybersecurity.

Education

Associate of Science - Computer Science

Harry S Truman College
Chicago, IL

Bachelor of Science - Computer Science, Computer Network And Security.

Northeastern Illinois University
Chicago, IL
12-2025

Skills

  • Time management
  • Root-cause analysis
  • Incident Response
  • Threat Hunting
  • EDR
  • Teamwork
  • Phishing investigation
  • Passionate about security
  • Microsoft Suite
  • Sentinel SIEM
  • Microsoft Zero trust
  • Problem-solving
  • DLP
  • Malware analysis
  • Log analysis
  • IDS monitoring
  • Risk analysis
  • IOC monitoring
  • Excellent communication
  • Nessus
  • Wireshark
  • Automation
  • Quick Learner
  • Active listening

Certification

  • Microsoft AZ-500.
  • CompTIA Security+.
  • Certified in Cybersecurity by ISC2.

Timeline

Microsoft Security Engineer

T-Mobile
11.2023 - Current

Cybersecurity Analyst

Peopod
10.2021 - 10.2023

Associate of Science - Computer Science

Harry S Truman College

Bachelor of Science - Computer Science, Computer Network And Security.

Northeastern Illinois University
Blessing Ngefor