Summary
Overview
Work History
Education
Skills
Certification
Timeline
Generic

Egodotaye O. Emmanuel

Portsmouth,VA

Summary

Information security professional well-versed in protecting organizational data and ensuring compliance with industry standards. Known for proactive risk assessment and efficient security solutions. Strong focus on team collaboration and adapting to evolving security threats. Proficient in threat analysis and network security.

Overview

8
8
years of professional experience
1
1
Certification

Work History

Information Security Analyst

Norfolk State University
10.2022 - Current
  • Conducted internal audits to identify areas of improvement within the organization''s information security program.
  • Collaborated with IT teams to ensure seamless integration of security measures into existing infrastructure.
  • Conducted security audits to identify vulnerabilities.
  • Reduced vulnerabilities by performing thorough penetration testing on a regular basis.
  • Supported legal teams in investigations involving cybercrime or data breaches, providing crucial technical expertise.
  • Streamlined threat monitoring processes for quicker identification of potential risks.
  • Optimized resource allocation by prioritizing identified risks based on their potential impact on business operations.
  • Increased organizational resilience with the development of comprehensive disaster recovery plans.
  • Administered and monitored firewalls, intrusion detection systems and anti-virus software to detect risks.
  • Championed a culture of continuous improvement through regular evaluations of existing security measures against established benchmarks and metrics.
  • Managed relationships with third-party vendors to ensure timely delivery of essential security products and services.
  • Mitigated risks associated with remote access by implementing strict access controls for external users.
  • Enhanced system protection by designing and deploying intrusion detection systems.
  • Strengthened network security by conducting regular risk assessments and implementing appropriate countermeasures.
  • Boosted cybersecurity awareness among employees through effective training sessions and workshops.
  • Analyzed network traffic and system logs to detect malicious activities.
  • Improved incident response times by creating and maintaining detailed incident response procedures.
  • Assessed vendor security during procurement processes, ensuring compliance with company policies and industry best practices.
  • Performed risk analyses to identify appropriate security countermeasures.
  • Recommend improvements in security systems and procedures.
  • Developed plans to safeguard computer files against modification, destruction, or disclosure.
  • Encrypted data and erected firewalls to protect confidential information.

Computer Helpdesk Technician

Navy
03.2017 - 09.2022
  • Collaborated with the cybersecurity team to promptly address and mitigate potential threats, safeguarding company data and systems from unauthorized access.
  • Developed and maintained a working knowledge of industry trends to provide insightful recommendations for system upgrades and software implementation.
  • Continuously improved professional skills through training, certifications, and participation in relevant industry forums, ensuring up-to-date knowledge on emerging technologies.
  • Developed comprehensive knowledge base articles to facilitate quick resolution of common issues, improving overall support efficiency.
  • Enhanced customer satisfaction by efficiently troubleshooting and resolving technical issues for computer users.
  • Created detailed documentation outlining step-by-step procedures for common troubleshooting tasks, increasing first-contact resolution rates.
  • Improved user experience by conducting regular maintenance tasks such as software updates, virus scans, and performance optimizations.
  • Served as a liaison between the IT department and end-users, fostering positive relationships through effective communication about technology-related concerns.
  • Provided guidance on best practices related to system usage and security measures, reducing the number of incidents involving compromised data or accounts significantly.
  • Managed high call volumes, prioritizing tasks to ensure timely responses and resolutions for all inquiries.
  • Maintained inventory of computer hardware components, ensuring availability of replacement parts when needed for repairs or upgrades.
  • Assisted customers with password resets and account management tasks while maintaining strict adherence to security protocols.
  • Streamlined helpdesk processes, resulting in reduced wait times and increased productivity for endusers.
  • Provided exceptional remote support to users, utilizing remote access tools to diagnose and resolve issues effectively.
  • Ensured smooth transitions during employee offboarding by securely wiping data from company devices according to established guidelines.
  • Implemented ticketing system improvements that led to more accurate tracking of support requests and faster response times.
  • Reduced downtime for end-users by promptly addressing hardware failures and performing necessary repairs or replacements.
  • Assisted in the onboarding process for new employees by providing thorough training on company software applications and hardware equipment.
  • Supported company-wide software rollouts by preparing systems, providing training materials, and offering post-implementation assistance as needed.
  • Collaborated with IT team members to identify trends and develop proactive solutions for recurring problems.
  • Used ticketing systems to manage and process support actions and requests.
  • Managed high levels of call flow and responded to technical support needs.
  • Diagnosed and troubleshot hardware, software and network issues.
  • Responded to customer inquiries and provided technical assistance over phone and in person.
  • Installed and configured operating systems and applications.
  • Installed, configured and maintained computer systems and network connections.
  • Configured hardware, devices, and software to set up work stations for employees.
  • Researched and identified solutions to technical problems.
  • Created user accounts and assigned permissions.
  • Monitored system performance to identify potential issues.
  • Configured and tested new software and hardware.
  • Removed malware, ransomware, and other threats from laptops and desktop systems.
  • Tested new software and hardware prior to deployment.
  • Patched software and installed new versions to eliminate security problems and protect data.
  • Developed and implemented preventive maintenance procedures.
  • Generated reports to track performance and analyze trends.
  • Helped streamline repair processes and update procedures for support action consistency.
  • Maintained servers and systems to keep networks fully operational during peak periods.
  • Offered assistance in implementing and developing training programs.
  • Assisted in development of system security protocols.

Education

Master of Science - Management Information Systems

Strayer University
Virginia Beach, VA
03-2022

Bachelor of Science - CYBERSECURITY

Strayer University
Virginia Beach, VA
03-2020

Skills

  • Threat intelligence
  • Security awareness training
  • Vulnerability assessment
  • Risk mitigation
  • SIEM management
  • Network security
  • Compliance management
  • Incident response
  • Critical thinking skills
  • Application security
  • Security architecture
  • Regulatory compliance
  • Access control
  • Intrusion detection
  • Privacy regulations
  • Wireshark software
  • Cybersecurity expertise
  • Penetration testing
  • Audit support
  • Security policy development
  • Developing security plans
  • Data protection
  • Firewall administration
  • Data security
  • Identity management
  • Information auditing
  • Best practices implementation
  • Mobile security
  • Infrastructure assessment
  • Disaster recovery
  • Microsoft Hyper-v server
  • Encryption technologies
  • Microsoft ASPNET
  • Erecting firewalls
  • Telecommunications systems
  • Symantec endpoint protection
  • Vulnerability & penetration testing
  • Risk analysis & mitigation
  • Reporting and documentation
  • Managing security breaches
  • Protecting networks
  • Cloud security
  • Monitoring computer viruses
  • Ethical hacking
  • Problem-solving
  • Attention to detail
  • Teamwork and collaboration
  • Time management
  • Multitasking

Certification

  • CISSP - Certified Information System Security Professional

Timeline

Information Security Analyst

Norfolk State University
10.2022 - Current

Computer Helpdesk Technician

Navy
03.2017 - 09.2022

Master of Science - Management Information Systems

Strayer University

Bachelor of Science - CYBERSECURITY

Strayer University
Egodotaye O. Emmanuel