Cybersecurity Specialist with proficiency in online security research, planning, execution and maintenance. Skilled at training internal users on security procedures and preventive measures.
Overview
2
2
years of professional experience
Work History
SOC Analyst
GCB Services
Investigated and resolved incidents of unauthorized access to sensitive information.
Worked with other teams to enforce security of applications and systems.
Monitored use of data files and regulated access to protect secure information.
Implemented security measures to reduce threats and damage related to cyber attacks.
Administered and monitored firewalls, intrusion detection systems and anti-virus software to detect risks.
Monitored computer virus reports to determine when to update virus protection systems.
Drafted security reports and metrics to track security performance and strategize improvements.
Educated and trained users on information security policies and procedures.
Conducted security audits to identify vulnerabilities.
Analyzed network traffic and system logs to detect malicious activities.
Reviewed violations of computer security procedures and developed mitigation plans.
Developed, tested and implemented security policies, plans and procedures for organizational protection.
Engineered, maintained and repaired security systems and programmable logic controls.
Researched and developed new computer forensic tools.
Executed penetration testing to identify security weaknesses and develop disaster recovery plans.
Recommend improvements in security systems and procedures.
Performed risk analyses to identify appropriate security countermeasures.
Developed plans to safeguard computer files against modification, destruction, or disclosure.
Encrypted data and erected firewalls to protect confidential information.
Skilled at working independently and collaboratively in a team environment.
SOC Analyst
Telnet Solutions
03.2018 - 05.2020
Investigated and resolved incidents of unauthorized access to sensitive information.
Worked with other teams to enforce security of applications and systems.
Monitored use of data files and regulated access to protect secure information.
Implemented security measures to reduce threats and damage related to cyber attacks.
Administered and monitored firewalls, intrusion detection systems and anti-virus software to detect risks.
Monitored computer virus reports to determine when to update virus protection systems.
Drafted security reports and metrics to track security performance and strategize improvements.
Educated and trained users on information security policies and procedures.
Conducted security audits to identify vulnerabilities.
Analyzed network traffic and system logs to detect malicious activities.
Education
Bachelor of Science - Information Security And Assurance
Indiana University - Purdue University Indianapolis
Indianapolis, IN
05.2025
Skills
Telecommunications Systems
Certification and Accreditation
Risk Mitigation
Risk Analysis
Plan of Actions & Milestones (POA&M)
Preventative Maintenance
New System Research
Malware Analysis
Computer Forensics
Network Protocol Analysis
Risk Management Framework
Work Orders
Confidential Data Protection
Intrusion Detection System (IDS)
Proxy Servers
Virtual Local Area Networks
Websense Data Loss Prevention
Resource Allocation
Infrastructure Change
Risk Management Evaluations
Continuity Monitoring
Programmable Logic Control Systems
Threat Detection
Bug Fixes
Video Surveillance Systems
Industry Best Practices
Dashboard Creation
Customer Satisfaction
Risk Mitigation Plans
Ticket Changes
Compliance with Security Requirements
Threat Management
Searching Records
Web Applications
Flaw Detection
Designing Security Controls
Forensic Engineering
Data Architecture
Business Application Review
Providing Briefings
Vulnerability and Penetration Testing
Documentation Support
Wide Area Network (WAN)
Corporate Accounting
Best Practice Implementation
Developing Security Plans
Web Servers
Event Security Monitoring
Reading Comprehension
Problem Resolution
Critical Thinking Skills
Information Auditing
Data Encryption
Rule Knowledge
Protecting Networks
Site Evaluations
Active Learning
Wire Shark Software
Implementing Security Programs
Vulnerability Testing
Security Systems Knowledge
Security Maintenance
Warranty Requirements
Security Best Practices
Documentation
Timeline
SOC Analyst
Telnet Solutions
03.2018 - 05.2020
SOC Analyst
GCB Services
Bachelor of Science - Information Security And Assurance
Indiana University - Purdue University Indianapolis
Similar Profiles
Mojeed OgunlekeMojeed Ogunleke
Optimization Engineer at GCB ServicesOptimization Engineer at GCB Services