Summary
Overview
Work History
Education
Skills
Certification
Timeline
Generic

Dayo Obajuluwa

Dallas,Tx

Summary

Experienced Cloud Security Engineer with extensive knowledge of cloud security principles. Experience building and managing scalable, high-available and fault tolerant cloud architecture across multiple platforms, vulnerability management and implementing solutions for Secure Software Development Life Cycle (SDLC). My overall goal is to expand my career as a Cloud Engineer focused more on Infrastructure and DevOps Security where my expertise can be utilized to bring value.

Overview

9
9
years of professional experience
1
1
Certification

Work History

Cloud Security Engineer

LPL Financial
02.2024 - Current
  • Managed and optimized Cloud-Native Application Protection Platforms (CNAPP) including Wiz and Prisma Cloud to secure multi-cloud environments.
  • Configured and maintained Cloud Security Posture Management (CSPM) to detect and remediate misconfigurations and compliance drifts across AWS/Azure.
  • Designed and implemented AWS Service Control Policies (SCPs) to enforce organization-wide security guardrails and prevent unauthorized actions.
  • Performed vulnerability assessments using agentless and agent-based scans, triaged alerts to eliminate false positives, and drove timely remediation with DevOps teams.
  • Enforced secure cloud architecture by reviewing IAM policies, encryption standards (KMS, TLS, FIPS-validated), and network segmentation controls.
  • Integrated security checks into CI/CD pipelines (Terraform, GitHub Actions, Checkov) to enforce security guardrails for Infrastructure as Code.
  • Supported incident detection and response by monitoring CNAPP alerts, investigating threats, and collaborating with SOC/IR teams for rapid containment.
  • Delivered security reporting and risk posture dashboards to leadership, aligning cloud controls with NIST, ISO 27001, CIS Benchmarks, and compliance frameworks.

Cloud Security Engineer (DevSecOps)

Signature Consulting
02.2022 - 02.2024
  • Provide subject matter expertise on cloud architecture security and provide support for both product development and the operations teams to provide the best DevOps Practices and support applications with feasible approaches.
  • Increased production release by creating and maintaining automated CI/CD pipeline using Jenkins and integrated tools such as GitHub, Packer, Maven, SonarQube, Docker, Slack to ensure an agile infrastructure.
  • Develop automated Security capabilities within the CI/CD pipelines to support the ability to shift security left and incorporate security early and throughout the software development lifecycle to reduce code smells and vulnerabilities.
  • Created quality gates in SonarQube dashboard and enforced them in the CI/CD pipelines to reduce code smells and vulnerabilities in the code build.
  • Build and Deploy Serverless Application (Lambda) using Serverless Application Model (SAM) and CloudFormation Stack Set.
  • Build and deployed Docker containers to break up monolithic apps into microservices, improving developer workflow, increasing scalability, and optimizing speed.
  • Assisted in vulnerability assessment activities using PRISMA Cloud, Qualys, and Nessus to identify and prioritize security vulnerabilities.
  • Conducted regular scans, analyzed results, and provided actionable recommendations for remediation.
  • Creating and deploying custom auto-remediation solutions using CloudTrail, CloudWatch, Config, Lambda and Systems Manager for Cloud security compliance.
  • Proactively monitor cloud infrastructure and services for event monitoring, performance metrics and security using AWS CloudWatch and Datadog and PRISMA Cloud
  • Experience with wiz to vulnerability management tool for monitoring and assessing resources and infrastructure across multi-cloud environment to help identify critical issues and potential impact.
  • Integrate Prisma cloud alerts with SNOW for timely remediation, create custom queries and policies in Prisma Cloud for alerting on security gaps and misconfigurations and work closely with the development team to resolve know security gaps.
  • Automate solution for shipping audit logs, DNS logs from Sysdig to Exabeam using Terraform.
  • Experience in Amazon Cloud Services (AWS) creating features like EC2, IAM, VPC, EBS, AMI, APIs, Route 53, snapshots, Autoscaling, Cloud watch, CloudTrail, CloudFront, SQS, SNS, RDS, Cloud Watch, S3, API Gateways, Autoscaling, ALB, NLB, Lambda, Security groups using Terraform and CloudFormation
  • Work with engineers and development teams to ensure that cloud architecture solutions are compliant with security framework such as NIST, CMMC, HIPAA, PCI-DSS etc.

DevOps Automation Engineer

MBL Technologies
07.2019 - 11.2021
  • Architecting Infrastructure for Microservices deployment to production via Rolling and Blue-Green strategies.
  • Involved in designing and deploying multi-tier applications using AWS services like (EC2, Route53, S3, RDS, Dynamo DB, SNS, SQS, IAM) focusing on high-availability, fault tolerance, and auto-scaling.
  • Designed, developed, and implemented Continuous Integration and Continuous Deployment (CI/CD) frameworks from code to deploy using various CI tools within the AWS ecosystem.
  • Configured Jenkins jobs and pipelines using Azure DevOps, Git, Gradle, Maven, MS - Build, Jenkins, SonarQube, JFROG Artifactory, which includes build and deployment of Java applications to Apache Server, .Net applications to IIS Server.
  • Automated baking and deployment of custom golden AMI with Packer and Jenkins.
  • Integrated security tools like Fortify, Veracode, Snyk, SonarQube, Checkmarx in Jenkins Ci/CD build pipeline.
  • Wrote Ansible playbooks in YAML for configuration management of deployed infrastructure on AWS cloud.
  • Created and updated SQL Gap scripts for Database refresh and Database Migration to RDS (Database Replatforming) for Web Application migration from on-prem to the cloud.
  • Created and maintained terraform and cloud formation templates to automate the services that are used for the application deployment.
  • Coordinate/assist developers with establishing and applying appropriate branching, labeling/naming conventions using GIT source control and analyze and resolve conflicts related to merging of source code for GIT.

Cloud Security Consultant

Deloitte & Touché LLP
11.2018 - 07.2019
  • Develop and execute cloud Information Security strategy to proactively identify risk and provide appropriate security countermeasure.
  • Provide subject matter expertise on system security and evaluate and recommend new and emerging security products and technologies.
  • Maintain application servers in AWS and responsible for migration of financial system and security products into AWS
  • Provide strategies and requirements for the seamless migration of applications, web services, and data from local and server-based systems to the AWS cloud.
  • Understanding of secure-cloud configuration, (CloudTrail, AWS Config, etc.), cloud-security technologies (VPC, Security Groups, etc.) and cloud-permission systems (IAM).
  • Recognize, adopt, and instill the best practices in security engineering fields throughout the organization: development, cryptography, network security, security operations, and incident response.
  • Performed technical Third-Party Assessment on current Tenable Security Center deployment and configurations to identify gaps and flaws for further analysis.
  • Analyzed current tenable architecture against network architecture for potential performance bottleneck and provided recommendations for increased performance.
  • Reviewed configuration of Center for Internet Security (CIS) benchmarks within tenable tool and provided recommendations on hardening configurations.
  • Reviewed tenable dashboards, scan reports, policies and plugins and provided recommendations for desired outputs and performance.

Information Security Analyst

KForce Gov Solution
02.2017 - 11.2018
  • Development and maintenance of IT Governance, Risk and Compliance strategy and internal procedures to ensure information security.
  • Worked with System Owners through the Assessment and Authorization (A&A) process for legacy and new Major Application Systems.
  • Creating, updating, and reviewing System Security Plans (SSP), Risk Assessment (RA), Privacy Impact Assessments (PIA), System Security test and Evaluation (ST&E), Corrective Action Plans (CAP) and the Plan of Actions and Milestones (POA&M)
  • Work under general supervision of the program manager in coordinating all related security control assessment activities using the NIST 800-53A guidelines.
  • Perform security scans and evaluates threats and vulnerabilities based on Tenable Security Center reports.
  • Provide compliance insight, guidance and training for new system implementations and other security related concerns.
  • Provide proactive and innovative resolutions to system and software security challenges, and consulting with management to accomplish day-to-day operational, technical & business goals
  • Expertise in performing Application Security risk assessments throughout the SDLC, which includes Application Security design, review, testing and remediation.
  • Experience with threat modeling tools and software (e.g., Microsoft Threat Modeling Tool, OWASP Threat Dragon).
  • Proven experience in manual/automated security testing, secure code review of web and mobile applications

Education

Master’s - Cyber Security Technology

University of Maryland University College
Maryland
09.2018

Bachelor of Science (BS) - Computer Science

Nigeria
07.2013

Skills

  • Cloud Platforms: AWS, Azure
  • Operating System: Linux, Windows, Centos
  • DevOps/CI/CD: GitHub Actions, Jenkins, Code Deploy, Code Build, Code Pipeline, Code Commit, AWS CodeStar, Teamcity
  • DevSecOps Tools: SonarQube, CheckMarx Kics, Veracode, Snyk, OWASP ZAP, Qualys, PrismaCloud, Nessus
  • IAC: Terraform, Cloud Formation, Ansible
  • Build Tools: Ant, Maven, Packer
  • Version Control: GitHub, Bitbucket
  • Containers: Docker, Elastic Kubernetes Service (EKS), Elastic container Service (ECS), Artifactory, ECS, Docker Hub
  • Serverless Application: Lambda, Serverless Application Model (SAM)
  • Scripting: Shell, Bash, Python
  • Databases: MySQL, SQL Server, DynamoDB, Redshift
  • Workflow and Project Management: Zendesk, Atlassian tools (JIRA, Confluence), Asana, Service NOW
  • Monitoring/Logging: Grafana, Prometheus, PagerDuty, Datadog, CloudWatch, Fluentd, Sysdig, Prisma Cloud, Wiz io
  • AWS Services: IAM, S3, VPC, EC2, Security Groups, AWS Secret Manager, AWS System Manager, Security Hub, AWS Config, Lambda, CloudWatch Event Bridge, AWS Organization
  • Compliance: NIST SP Series, FedRAMP, ISO 27001, CMMC, SOX, PCI-DSS
  • Application Security: STRIDE Threat Modelling Methodology, OWASP Threat Dragon

Certification

  • AWS Certified Solutions Architect Associate
  • AWS Certified Security Specialty
  • AWS Certified Developer Associate
  • ISACA Certified Information Security Manager (CISM)
  • ISC2 CGRC: Certified in GRC
  • CompTIA Security+

Timeline

Cloud Security Engineer

LPL Financial
02.2024 - Current

Cloud Security Engineer (DevSecOps)

Signature Consulting
02.2022 - 02.2024

DevOps Automation Engineer

MBL Technologies
07.2019 - 11.2021

Cloud Security Consultant

Deloitte & Touché LLP
11.2018 - 07.2019

Information Security Analyst

KForce Gov Solution
02.2017 - 11.2018

Master’s - Cyber Security Technology

University of Maryland University College

Bachelor of Science (BS) - Computer Science