Summary
Overview
Work History
Education
Skills
Deployment Setup Projects
Education Certifications
Certification
Timeline
SoftwareEngineer
Glenn N. Dodoo

Glenn N. Dodoo

Cybersecurity

Summary

Dynamic Cyber Security Analyst with extensive experience at Goldman Sachs, adept at implementing robust security measures and conducting risk assessments. Proven expertise in vulnerability scanning and access control systems, complemented by strong communication skills. Successfully enhanced data protection protocols, significantly reducing potential threats and ensuring compliance with industry standards.

Overview

16
16
years of professional experience

Work History

Information security global consulting

Club Quarters hotels
11.2022 - Current
  • Cross-functional AND CLOSE, regular interaction with diverse functions spanning all aspects of the business
  • Defending systems against unauthorized access, modification, and/or destruction
  • Scanning and assessing network for vulnerabilities
  • Monitoring network traffic for unusual activity
  • Configuring and supporting security tools such as firewalls, anti-virus software and patch management systems
  • Implementing network security policies, application security, access control, and corporate data safeguards
  • Training fellow team members in security awareness and procedures
  • Developing and updating business continuity and disaster recovery protocols
  • Contributes to the publication of capital and operating budgetary guidance for all hotels globally
  • Other duties, responsibilities, and qualifications may be required and/or assigned as necessary

Cyber security administrator, North America/Global Consulting

WORLDWIDE flight services (DHS)
09.2021 - 12.2024
  • Maintains a deep operational knowledge of the WFS IT environments & security mechanisms.
  • Fine-tune the configuration of the Security Tools, Platforms, & Processes.
  • Translates WFS security needs into ISMS Policies & Controls to be implemented by the local IT.
  • Delegates basic security checks & daily/low-level remediations to the local ITs.
  • Trains & upskills the IT Teams worldwide to handle more complex security activities over time.
  • Acknowledges, investigates, & Documents major security alerts in partnership with our MSSP and checks that the threats have been eradicated.
  • Coordinates with the IT Teams worldwide when complementary steps are required during & after an alert.
  • Conducts User Awareness Training & Campaigns and measures behavior improvements.
  • Identifies gaps & vulnerabilities in the ongoing security measures & processes and logs them in the improvement plan.
  • Oversees, instructs, and coordinates with the MSSP in charge of the 24x7 Global Threat Hunting & Incident Response Processes.
  • Ensures that critical security patches are applied in due time by WFS IT Teams worldwide.
  • Assist Security Companies in performing internal & external penetration tests.
  • Participates in major security projects like the replacement of the Group’s Proxies or the implementation of cloud security

IT Systems Analyst – short-term contract

Morgan Stanley
New York, NY
04.2021 - 09.2021
  • Working with NSC Global which is an IT Service Management Company, tasked with setting up NDS workstations
  • Performed Installation of software and deployments.
  • Moving profiles and hardware.
  • Disconnection and reconnections of nodes.
  • Data and network security consultations and implementations.
  • Installation of SIEM tools.
  • Bit lock settings and TPM security settings
  • Certifications of Nodes and systems
  • Amulets and VOIP setups for trading floors

Cyber Security Analyst

Goldman Sachs
New York, NY
11.2019 - 01.2021
  • Work with a team to ensure all security measures are implemented and data loss prevention is checked/mitigated using tools and engineering expertise.
  • Responsible for site block access to the Bank and data access to the financial institution checking data loss prevention.
  • Used Splunk to run logs to check network activities on Kerberos/NDS and data analysis.
  • Used the IONIC tool to check firewall and active directory access to file exception rule uploads onto Proxy servers.
  • Created, enforced, and managed Access Control Policies and procedures.
  • Administrated Windows Active Directory environment using Microsoft Management console.
  • Assisted with the day-to-day management of physical security and server-based card access system.
  • Grant access and run analysis on blocked and enabled access on servers.
  • Used crowd-strike Falcon tool to perform endpoint detection and response doing managed threat hunting.
  • Used Symantec tool to categorize web-based accessibility onto servers to prevent data leakage risks.
  • Used Vontu to track data on the network and emails to triage and perform data loss prevention to activities.
  • Using Splunk for data research and logging activities on the network.
  • Researched into forensics using Splunk on user activities.
  • Used Ionics to check analytics and access control on user basics and web (domain) accessibility.
  • Used Symantec Bluecoat to categorize web-based sites and to check for data leakages and risks.
  • Used Splunk in diagnosing problems and providing intelligence for business operations and web analytics.
  • Used Mercurius to check block/grant access to blacklisted and whitelisted sites within compliance with policies or site rules set.
  • And used a dashboard to monitor the progress of data flow on requests and processed requests on tickets. (Graphical representation)
  • Work with the DevOps team in the implementation of cloud infrastructure on AWS migration and cloud setups.

Security Analyst/ Data Security

Sears Holdings
New York, NY
04.2018 - 12.2019
  • Signing up members, collating data of members, and adding them to the MSA app.
  • Checking data safety following RMF process of making sure all data confidentiality Integrity and availability (CIA) is observed.
  • Assisting clients with their IT issues by providing helpdesk assistance, recording logs, creating tickets on reported issues, and resolving them.
  • Utilized Qualys for network/vulnerability scanning, discovery, organizing assets, and creating reports.
  • Inputting of members to the PS program and updating clientele app on client Information.
  • System categorization, selection, and implementation of controls through the RMF Process in terms of Confidentiality, Integrity, and Availability (CIA).
  • Conducting Risk Assessment to identify vulnerabilities, threats, and associated.
  • Integrated complex access control, and video management solution systems.
  • Impacts in the system for appropriate control selection and implementation by Employing system/ Network scans and other vulnerability tools and generating reports.
  • Troubleshooting IT, smartphones, and gadgets to be able to install and implement Program rollout for members.
  • Led the Business-to-business arrangements and coordination team to educate and update member information.
  • Able to bring in incremental sales by 80% for the store on weekly basis with Member signups and clientele services.
  • Conducting Risk Assessment to identify vulnerabilities, threats, and associated impacts in the system for appropriate control selection and implementation by employing system/Network scans, Qualys, and other vulnerability tools including Qualys, and generating reports on member information.
  • Maintain CCTV and access control systems.
  • Assisting clients with their IT issues providing helpdesk assistance recording logs creating tickets on reported issues and resolving them.

Cyber Security Analyst

Cyber Vision Technologies, LLC
New York
06.2012 - 04.2018
  • In a team of Information Security Experts to secure Systems for companies/Organizations as Third-Party Assessor (3PAO)/ External Auditor in the Security Operational Center.
  • System categorization, selection, and implementation of controls through the RMF process in terms of Confidentiality, Integrity, and Availability (CIA).
  • Conducting Risk Assessment to identify vulnerabilities, threats, and associated impacts in the system for appropriate control selection and implementation by employing system/Network scans and other vulnerability tools and generating reports.
  • Used Qualys for vulnerability scanning, report creation, remediate and verify, and other network results.
  • Embarks on conducting Privacy Threshold Analysis (PTA) and Privacy Impact Analysis (PIA).
  • Thoroughly assess Security controls to verify that all implemented Management, Security Operations, Privacy, and technical controls are sufficient.
  • Also, detailed Security Assessment Reports (SAR) and Plan of Action and Milestone (POAM) are developed.
  • Through RAR development, suitable mitigation solutions are suggested within a specific time frame to address all known vulnerabilities and threats in the System to secure information.
  • Creates a platform to have discussions among data sharing partners to Maximize system security.
  • Creates System Security Plan (SSP) to highlight the system security posture in terms of security requirements and control in use and planned by the Information System Owner for compliance.
  • Identification of vulnerabilities, threats, and risks in the system by Conducting IT risk assessment.
  • Securing System's Confidentiality, Integrity, and Availability by auditing system security Installations and providing recommendations for system owners by developing Contingency Plan.
  • Employing system/Network scans, Qualys, and other vulnerability tools and generating reports. On member in customer information.
  • Coordinated, and managed third-party contractors during the installation of CCTV, Access Control, and audio/visual systems to maintain a secure and safe transportation system.
  • Experience in Installation, Configuration, and Administration of Windows Servers and Active Directory.
  • Assisting clients with their IT issues providing helpdesk assistance recording logs and creating tickets on the reported issue.

IT Systems Analyst/Business Development

INTERPAYAFRICA Systems
Ghana
01.2009 - 01.2012
  • Ability to competently work with Microsoft Office applications and Windows OS-10.
  • Responsible for the strategic planning and business development of company e-commerce products and platforms.
  • Provide payment solutions for companies and institutions to customers.
  • Training and facilitating customers to be able to Generate electronic billing and payment collection using payment platform and integrate with them through company API.
  • Training and signing up of institutions and universities to use the company products.
  • Team planning and working with the development team to provide absolute customer specification and satisfaction on company products line and customer information security.

Education

Bachelor of Science - Cybersecurity and Networks

Monroe College
NY, NY

Skills

  • Cyber Security
  • Risk Assessment
  • Security Policies
  • System Security
  • Vulnerability Scanning
  • Access Control Systems
  • Security Information and Event Management (SIEM)
  • Intrusion Detection System (IDS)
  • Active directory
  • Qualys
  • Network Scan
  • Security Operational Center (SOC)
  • Information security
  • Network Security
  • Disaster Recovery
  • Cobit
  • HIPAA
  • Iso
  • Nist
  • Data collection
  • Firme
  • Cisco
  • Incident response
  • TCP/IP
  • FTP

Deployment Setup Projects

  • At Morgan Stanley and Worldwide Flight Services, participated in requirements/control definition, implementation design, build and staging verification and transition to maintenance, and support of security hardening tools on network infrastructure
  • Designed configured security tool deployment, and provided support security on deployments
  • Took part in setting up and deploying security tools like the Zscaler project for web proxy security, and NSS deployments
  • Took part in configuring and applying AV and Firewall policies in implementing EDR on endpoints on the network domains
  • Engaged and led security projects like network traffic segmentation for endpoints and servers using tools like Colortokens firewall and traffic segmentation
  • Worked on threat-hunting assessments using Palo Alto and SonicWALL firewall tools to monitor and configure ports and endpoints protection/accessibility to the web
  • Whitelisting and disabling/disallowing ports, IPs, and traffic accessibility from the domain controller to the network and applications - WAF (web application firewall)
  • Worked with SIEM tools like Splunk for threat hunting and log analytics using Kerberos to determine activities on the network and also use to determine remediation strategies
  • Experience in working with Rapid7 Insight Platform (insight IDR and MDR) to collect data from across network environments, to manage vulnerabilities, monitor for malicious behavior, and investigate and shut down attacks
  • Worked with EDR and network monitoring tools like Threatspike and CrowdStrike, to monitor intrusion detection on devices on the network and set up controls to monitor and remediate any unknown lateral movements, reconnaissance, and malware activities
  • Experience in setting up MFA control measures in protecting servers and endpoint accessibility using tools like Threatspike, Cisco Duo, Microsoft Authenticator etc.
  • Experienced in working with AD and email management security tools like Azure (Encarta), Microsoft 0365 for email threat hunting by setting DKM, SPF rules and integrating with other DLP tools like Barracuda (email gateway systems) to secure data on email and network, monitoring and setting policies, setting Rules on Exchange admin etc.

Education Certifications

  • Bachelor of Science in Cybersecurity and Networks, Monroe College, New York, NY
  • Certified Ethical Hacker, 04/20 - 04/23
  • Certified Information Systems Auditor (CISA)
  • Controlled Unclassified Information, NIST 800-171, 04/20
  • AWS Certified Solutions Architect, 03/20 - 03/23
  • CISCO CCNA certified, 10/21
  • ISO-27001 Information Security
  • Comptia Security+

Certification

  • CISA License - [Timeframe]
  • comptia Security+ Training - [Timeframe]
  • CCNA, [Company Name] - [Timeframe]
  • CEH - [Timeframe]
  • Scrum Master [Job Title] - [Timeframe]
  • ISO27001, [Company Name] - [Timeframe]
  • Conrolled Unclassified Information ,NIST 800-171 [Job Title] - [Timeframe]

Timeline

Information security global consulting

Club Quarters hotels
11.2022 - Current

Cyber security administrator, North America/Global Consulting

WORLDWIDE flight services (DHS)
09.2021 - 12.2024

IT Systems Analyst – short-term contract

Morgan Stanley
04.2021 - 09.2021

Cyber Security Analyst

Goldman Sachs
11.2019 - 01.2021

Security Analyst/ Data Security

Sears Holdings
04.2018 - 12.2019

Cyber Security Analyst

Cyber Vision Technologies, LLC
06.2012 - 04.2018

IT Systems Analyst/Business Development

INTERPAYAFRICA Systems
01.2009 - 01.2012

Bachelor of Science - Cybersecurity and Networks

Monroe College