Dynamic Cyber Security Analyst with extensive experience at Goldman Sachs, adept at implementing robust security measures and conducting risk assessments. Proven expertise in vulnerability scanning and access control systems, complemented by strong communication skills. Successfully enhanced data protection protocols, significantly reducing potential threats and ensuring compliance with industry standards.
Overview
16
16
years of professional experience
Work History
Information security global consulting
Club Quarters hotels
11.2022 - Current
Cross-functional AND CLOSE, regular interaction with diverse functions spanning all aspects of the business
Defending systems against unauthorized access, modification, and/or destruction
Scanning and assessing network for vulnerabilities
Monitoring network traffic for unusual activity
Configuring and supporting security tools such as firewalls, anti-virus software and patch management systems
Implementing network security policies, application security, access control, and corporate data safeguards
Training fellow team members in security awareness and procedures
Developing and updating business continuity and disaster recovery protocols
Contributes to the publication of capital and operating budgetary guidance for all hotels globally
Other duties, responsibilities, and qualifications may be required and/or assigned as necessary
Cyber security administrator, North America/Global Consulting
WORLDWIDE flight services (DHS)
09.2021 - 12.2024
Maintains a deep operational knowledge of the WFS IT environments & security mechanisms.
Fine-tune the configuration of the Security Tools, Platforms, & Processes.
Translates WFS security needs into ISMS Policies & Controls to be implemented by the local IT.
Delegates basic security checks & daily/low-level remediations to the local ITs.
Trains & upskills the IT Teams worldwide to handle more complex security activities over time.
Acknowledges, investigates, & Documents major security alerts in partnership with our MSSP and checks that the threats have been eradicated.
Coordinates with the IT Teams worldwide when complementary steps are required during & after an alert.
Conducts User Awareness Training & Campaigns and measures behavior improvements.
Identifies gaps & vulnerabilities in the ongoing security measures & processes and logs them in the improvement plan.
Oversees, instructs, and coordinates with the MSSP in charge of the 24x7 Global Threat Hunting & Incident Response Processes.
Ensures that critical security patches are applied in due time by WFS IT Teams worldwide.
Assist Security Companies in performing internal & external penetration tests.
Participates in major security projects like the replacement of the Group’s Proxies or the implementation of cloud security
IT Systems Analyst – short-term contract
Morgan Stanley
New York, NY
04.2021 - 09.2021
Working with NSC Global which is an IT Service Management Company, tasked with setting up NDS workstations
Performed Installation of software and deployments.
Moving profiles and hardware.
Disconnection and reconnections of nodes.
Data and network security consultations and implementations.
Installation of SIEM tools.
Bit lock settings and TPM security settings
Certifications of Nodes and systems
Amulets and VOIP setups for trading floors
Cyber Security Analyst
Goldman Sachs
New York, NY
11.2019 - 01.2021
Work with a team to ensure all security measures are implemented and data loss prevention is checked/mitigated using tools and engineering expertise.
Responsible for site block access to the Bank and data access to the financial institution checking data loss prevention.
Used Splunk to run logs to check network activities on Kerberos/NDS and data analysis.
Used the IONIC tool to check firewall and active directory access to file exception rule uploads onto Proxy servers.
Created, enforced, and managed Access Control Policies and procedures.
Administrated Windows Active Directory environment using Microsoft Management console.
Assisted with the day-to-day management of physical security and server-based card access system.
Grant access and run analysis on blocked and enabled access on servers.
Used crowd-strike Falcon tool to perform endpoint detection and response doing managed threat hunting.
Used Symantec tool to categorize web-based accessibility onto servers to prevent data leakage risks.
Used Vontu to track data on the network and emails to triage and perform data loss prevention to activities.
Using Splunk for data research and logging activities on the network.
Researched into forensics using Splunk on user activities.
Used Ionics to check analytics and access control on user basics and web (domain) accessibility.
Used Symantec Bluecoat to categorize web-based sites and to check for data leakages and risks.
Used Splunk in diagnosing problems and providing intelligence for business operations and web analytics.
Used Mercurius to check block/grant access to blacklisted and whitelisted sites within compliance with policies or site rules set.
And used a dashboard to monitor the progress of data flow on requests and processed requests on tickets. (Graphical representation)
Work with the DevOps team in the implementation of cloud infrastructure on AWS migration and cloud setups.
Security Analyst/ Data Security
Sears Holdings
New York, NY
04.2018 - 12.2019
Signing up members, collating data of members, and adding them to the MSA app.
Checking data safety following RMF process of making sure all data confidentiality Integrity and availability (CIA) is observed.
Assisting clients with their IT issues by providing helpdesk assistance, recording logs, creating tickets on reported issues, and resolving them.
Utilized Qualys for network/vulnerability scanning, discovery, organizing assets, and creating reports.
Inputting of members to the PS program and updating clientele app on client Information.
System categorization, selection, and implementation of controls through the RMF Process in terms of Confidentiality, Integrity, and Availability (CIA).
Conducting Risk Assessment to identify vulnerabilities, threats, and associated.
Integrated complex access control, and video management solution systems.
Impacts in the system for appropriate control selection and implementation by Employing system/ Network scans and other vulnerability tools and generating reports.
Troubleshooting IT, smartphones, and gadgets to be able to install and implement Program rollout for members.
Led the Business-to-business arrangements and coordination team to educate and update member information.
Able to bring in incremental sales by 80% for the store on weekly basis with Member signups and clientele services.
Conducting Risk Assessment to identify vulnerabilities, threats, and associated impacts in the system for appropriate control selection and implementation by employing system/Network scans, Qualys, and other vulnerability tools including Qualys, and generating reports on member information.
Maintain CCTV and access control systems.
Assisting clients with their IT issues providing helpdesk assistance recording logs creating tickets on reported issues and resolving them.
Cyber Security Analyst
Cyber Vision Technologies, LLC
New York
06.2012 - 04.2018
In a team of Information Security Experts to secure Systems for companies/Organizations as Third-Party Assessor (3PAO)/ External Auditor in the Security Operational Center.
System categorization, selection, and implementation of controls through the RMF process in terms of Confidentiality, Integrity, and Availability (CIA).
Conducting Risk Assessment to identify vulnerabilities, threats, and associated impacts in the system for appropriate control selection and implementation by employing system/Network scans and other vulnerability tools and generating reports.
Used Qualys for vulnerability scanning, report creation, remediate and verify, and other network results.
Embarks on conducting Privacy Threshold Analysis (PTA) and Privacy Impact Analysis (PIA).
Thoroughly assess Security controls to verify that all implemented Management, Security Operations, Privacy, and technical controls are sufficient.
Also, detailed Security Assessment Reports (SAR) and Plan of Action and Milestone (POAM) are developed.
Through RAR development, suitable mitigation solutions are suggested within a specific time frame to address all known vulnerabilities and threats in the System to secure information.
Creates a platform to have discussions among data sharing partners to Maximize system security.
Creates System Security Plan (SSP) to highlight the system security posture in terms of security requirements and control in use and planned by the Information System Owner for compliance.
Identification of vulnerabilities, threats, and risks in the system by Conducting IT risk assessment.
Securing System's Confidentiality, Integrity, and Availability by auditing system security Installations and providing recommendations for system owners by developing Contingency Plan.
Employing system/Network scans, Qualys, and other vulnerability tools and generating reports. On member in customer information.
Coordinated, and managed third-party contractors during the installation of CCTV, Access Control, and audio/visual systems to maintain a secure and safe transportation system.
Experience in Installation, Configuration, and Administration of Windows Servers and Active Directory.
Assisting clients with their IT issues providing helpdesk assistance recording logs and creating tickets on the reported issue.
IT Systems Analyst/Business Development
INTERPAYAFRICA Systems
Ghana
01.2009 - 01.2012
Ability to competently work with Microsoft Office applications and Windows OS-10.
Responsible for the strategic planning and business development of company e-commerce products and platforms.
Provide payment solutions for companies and institutions to customers.
Training and facilitating customers to be able to Generate electronic billing and payment collection using payment platform and integrate with them through company API.
Training and signing up of institutions and universities to use the company products.
Team planning and working with the development team to provide absolute customer specification and satisfaction on company products line and customer information security.
Education
Bachelor of Science - Cybersecurity and Networks
Monroe College
NY, NY
Skills
Cyber Security
Risk Assessment
Security Policies
System Security
Vulnerability Scanning
Access Control Systems
Security Information and Event Management (SIEM)
Intrusion Detection System (IDS)
Active directory
Qualys
Network Scan
Security Operational Center (SOC)
Information security
Network Security
Disaster Recovery
Cobit
HIPAA
Iso
Nist
Data collection
Firme
Cisco
Incident response
TCP/IP
FTP
Deployment Setup Projects
At Morgan Stanley and Worldwide Flight Services, participated in requirements/control definition, implementation design, build and staging verification and transition to maintenance, and support of security hardening tools on network infrastructure
Designed configured security tool deployment, and provided support security on deployments
Took part in setting up and deploying security tools like the Zscaler project for web proxy security, and NSS deployments
Took part in configuring and applying AV and Firewall policies in implementing EDR on endpoints on the network domains
Engaged and led security projects like network traffic segmentation for endpoints and servers using tools like Colortokens firewall and traffic segmentation
Worked on threat-hunting assessments using Palo Alto and SonicWALL firewall tools to monitor and configure ports and endpoints protection/accessibility to the web
Whitelisting and disabling/disallowing ports, IPs, and traffic accessibility from the domain controller to the network and applications - WAF (web application firewall)
Worked with SIEM tools like Splunk for threat hunting and log analytics using Kerberos to determine activities on the network and also use to determine remediation strategies
Experience in working with Rapid7 Insight Platform (insight IDR and MDR) to collect data from across network environments, to manage vulnerabilities, monitor for malicious behavior, and investigate and shut down attacks
Worked with EDR and network monitoring tools like Threatspike and CrowdStrike, to monitor intrusion detection on devices on the network and set up controls to monitor and remediate any unknown lateral movements, reconnaissance, and malware activities
Experience in setting up MFA control measures in protecting servers and endpoint accessibility using tools like Threatspike, Cisco Duo, Microsoft Authenticator etc.
Experienced in working with AD and email management security tools like Azure (Encarta), Microsoft 0365 for email threat hunting by setting DKM, SPF rules and integrating with other DLP tools like Barracuda (email gateway systems) to secure data on email and network, monitoring and setting policies, setting Rules on Exchange admin etc.
Education Certifications
Bachelor of Science in Cybersecurity and Networks, Monroe College, New York, NY
Global Senior Manager IT Infra, Information Security & Global Architecture at DHL Freight ForwardingGlobal Senior Manager IT Infra, Information Security & Global Architecture at DHL Freight Forwarding
Vice President of Global Information Technology // Global Security Officer at BBB IndustriesVice President of Global Information Technology // Global Security Officer at BBB Industries