Summary
Overview
Work History
Education
Skills
Certification
Securityclearance
Timeline
Generic

Dayo Olukemi

Elkton,MD

Summary

Experienced cyber and information systems security analyst/ISSO with a proven track record in delivering effective and reliable governance, risk management, information assurance, and compliance for mission-critical information and systems. Adept at security planning, eliciting requirements, and coordinating among stakeholders. Collaborative approach working closely with ISSMs, program managers, system administrators, PSRs, and AOs. Proficient in developing and maintaining secure IT solutions for classified environments, supporting ATO, IATT certification/re-certification/validation, and continuous monitoring.

Professional cybersecurity specialist skilled in threat analysis, network security, and incident response. Strong focus on team collaboration and achieving results, adapting to changing needs seamlessly. Known for robust problem-solving abilities, strategic thinking, and effective communication. Expertise includes risk management, vulnerability assessments, and regulatory compliance.

Overview

10
10
years of professional experience
1
1
Certification

Work History

Cyber Watch Operations Analyst

NEXAGEN Networks Inc.
01.2024 - Current
  • Planned and Conducted Audits, Analyzed Security Logs for Indicators of Compromise and Attacks and Anomalous activity Provided Findings, Summary and Actionable Recommendations reports and recommend actions after conducting a preliminary review of the security events
  • Installed, Configured and Implemented Security Tools, SCAP/STIG Baseline Configuration Assessment, Build and Ran ACAS Vulnerability Scans, Analyzed / Prioritized Scan Vulnerabilities Report and Monitored, Follow through Remediation and Mitigation of IAVM, IAVA-Alerts, IAVB-Bulletins and TA- Advisories, Prioritized Assets Software Risks Severity to determine Risks Exposure Countermeasures Prioritization to the Environment, System
  • Managed multiple projects simultaneously, delivering results within tight deadlines while maintaining high-quality standards.
  • Optimized operational efficiency by analyzing and streamlining processes.
  • Improved team productivity by implementing effective workflow strategies and time management techniques.
  • Created custom reports and visualizations to support decision-making processes.
  • Collaborated with IT teams to integrate security measures into the development and deployment of new applications.
  • Conducted security audits to identify vulnerabilities.
  • Analyzed security incidents post-resolution, identifying areas for improvement in both technical controls and incident response processes.
  • Reduced risk of cyber attacks by conducting regular vulnerability assessments and penetration testing.

Cybersecurity Technical Specialist IAT III

AKIMA
01.2023 - Current
  • Appointed DCWF role as Information System Security Officer – ISSO for DoD ATEC systems, services and programs
  • Supported Packages Building, SAP, SAR Approval Achievement and Continuous Maintenance of RMF ATO (Authority to Operate) lifecycle Technical Risk Assessment, Controls Testing and Validation, Creation and Tracking of Document, Maintenance of Artifacts / Completeness of Body of Evidence, and Timely Continuous Monitoring of ATO / Re-Authorization over on-prem/cloud-based system/application Interim Authority To Test (IATT) authorization and accreditation (A&A)

Cybersecurity Analyst

DMI, Inc.
01.2021 - 01.2023
  • Perform vulnerability and baseline scans, using tools, Tenable Nessus (ACAS), HBSS, Vulnerability scanner, analyze scan results and document findings in POA&M
  • Collaborate with system administrators to remediate (POA&Ms) findings
  • Ensure vulnerabilities and risks are efficiently mitigated in accordance with the approved continuous monitoring Plan
  • Reviewed, maintained, and ensured all Assessments and Authorizations (A&A) documentation were included in system security package for approval

Cloud Managed Application - Services Security Delivery Analyst – Contract Remote

Collabera / IBM
04.2018 - 01.2021
  • Managed external relationship with SOC, CSIRT and Vulnerability security vendors to ensure uninterrupted and security service delivery quality meets SLA and work closely to improve new capability efficiency and effectiveness
  • Monitored and Configured Endpoint Scans, Events Alerts/Notifications, IDS/IPS, Account and Access management DISA SCAP and STIG benchmarks, best practices guide and standards

Cybersecurity Analyst

Global Indemnity Plc
05.2016 - 01.2017
  • Conducted Tier II and Tier III incident preparedness testing, performed actionable incidence research, detection, response, investigation, prioritization, containment, recovery, and post incidence closure
  • Performed tuning of security devices and compiled metrics of all security devices and document processes and procedures
  • Provided analysis and trends of security log data to identify new attacks and threat vectors including complex state-sponsored actors
  • Rolled out Splunk Enterprise Base and Splunk Enterprise Security Plugin as SIEM solution
  • Prioritized security requirements, Prepared use cases, achieved statement -of-work SOW, agreed with owners on deliverables, policy, methodologies and standards for SOC deployment, maturity, breach incidence response, program reviews, SIEM replacement, and advanced harden security services

Information Security Engineer - Contract

Bryn Mawr Trust Co.
05.2015 - 04.2016
  • Reviewed and analyzed Dell Secure Works alerts and logs from DNS, Web proxy, DLP, IAM, Remote Authentication, Cloud access, Firewalls (FW), Intrusion Detection Systems (IDS), Antivirus (AV), and other security threat and vulnerability data sources
  • Supported the overall threats and Vulnerability Management program by conducting scans, analyzing and/or escalating security events

Education

Master of Science - Cyber Security

University of Maryland Global Campus
Adelphi, MD
01.2016

Skills

  • Security Planning
  • Requirements Elicitation
  • Coordination and Liaising among Stakeholders
  • Develop and Maintain Secure IT Solutions for Classified Environments
  • Support Authority to Operate ATO
  • IATT Certification/Re-Certification/Validation
  • Continuous Monitoring
  • System Security Plan (SSP)
  • Plan of Action and Milestones (POA&M)
  • Risk Assessment Report (RAR)
  • Security Traceability Matrix (SCTM)
  • Concept of Operations (CONOPs)
  • Security Assessment Plan
  • EMASS
  • FISMA
  • SRG and STIG Assessment
  • RMF Control Assessment
  • Baseline Configuration Management
  • Contingency Planning
  • Cyber Score Card Reporting
  • Spillage incident response and reporting
  • DoD IT Security Architecture and Design
  • Development / Operational Tests and Evaluations
  • Acquisitions
  • SIEM management
  • Application security
  • DDoS prevention
  • Cryptanalysis
  • Patch management
  • Security policy development

Certification

  • CCISO, EC-Council
  • CDPSE, ISACA
  • ECSAv10, EC-Council
  • CISSP, ISC2
  • CISM, ISACA
  • CEH, EC-Council
  • CSA, EC-Council
  • CHFI, EC-Council
  • CTIA, EC-Council
  • CISA, ISACA
  • AWS Certified Cloud Practitioner
  • ACE Certified, Palo Alto Network Accredited Configuration Engineer PAN OS 7.0
  • Security+CE, CompTIA
  • Network+, CompTIA
  • A+ Technician, CompTIA

Securityclearance

Secret (Active)

Timeline

Cyber Watch Operations Analyst

NEXAGEN Networks Inc.
01.2024 - Current

Cybersecurity Technical Specialist IAT III

AKIMA
01.2023 - Current

Cybersecurity Analyst

DMI, Inc.
01.2021 - 01.2023

Cloud Managed Application - Services Security Delivery Analyst – Contract Remote

Collabera / IBM
04.2018 - 01.2021

Cybersecurity Analyst

Global Indemnity Plc
05.2016 - 01.2017

Information Security Engineer - Contract

Bryn Mawr Trust Co.
05.2015 - 04.2016

Master of Science - Cyber Security

University of Maryland Global Campus
Dayo Olukemi