Summary
Overview
Work History
Education
Skills
Timeline
Generic

Kazeem Akintilo

Katy,Texas

Summary

Cybersecurity Specialist with proficiency in online security research, planning, execution and maintenance. Skilled at training internal users on security procedures and preventive measures.

Overview

2
2
years of professional experience

Work History

SOC Analyst

GCB Services
  • Investigated and resolved incidents of unauthorized access to sensitive information.
  • Worked with other teams to enforce security of applications and systems.
  • Monitored use of data files and regulated access to protect secure information.
  • Implemented security measures to reduce threats and damage related to cyber attacks.
  • Administered and monitored firewalls, intrusion detection systems and anti-virus software to detect risks.
  • Monitored computer virus reports to determine when to update virus protection systems.
  • Drafted security reports and metrics to track security performance and strategize improvements.
  • Educated and trained users on information security policies and procedures.
  • Conducted security audits to identify vulnerabilities.
  • Analyzed network traffic and system logs to detect malicious activities.
  • Reviewed violations of computer security procedures and developed mitigation plans.
  • Developed, tested and implemented security policies, plans and procedures for organizational protection.
  • Engineered, maintained and repaired security systems and programmable logic controls.
  • Researched and developed new computer forensic tools.
  • Executed penetration testing to identify security weaknesses and develop disaster recovery plans.
  • Recommend improvements in security systems and procedures.
  • Performed risk analyses to identify appropriate security countermeasures.
  • Developed plans to safeguard computer files against modification, destruction, or disclosure.
  • Encrypted data and erected firewalls to protect confidential information.
  • Skilled at working independently and collaboratively in a team environment.

SOC Analyst

Telnet Solutions
03.2018 - 05.2020
  • Investigated and resolved incidents of unauthorized access to sensitive information.
  • Worked with other teams to enforce security of applications and systems.
  • Monitored use of data files and regulated access to protect secure information.
  • Implemented security measures to reduce threats and damage related to cyber attacks.
  • Administered and monitored firewalls, intrusion detection systems and anti-virus software to detect risks.
  • Monitored computer virus reports to determine when to update virus protection systems.
  • Drafted security reports and metrics to track security performance and strategize improvements.
  • Educated and trained users on information security policies and procedures.
  • Conducted security audits to identify vulnerabilities.
  • Analyzed network traffic and system logs to detect malicious activities.

Education

Bachelor of Science - Information Security And Assurance

Indiana University - Purdue University Indianapolis
Indianapolis, IN
05.2025

Skills

  • Telecommunications Systems
  • Certification and Accreditation
  • Risk Mitigation
  • Risk Analysis
  • Plan of Actions & Milestones (POA&M)
  • Preventative Maintenance
  • New System Research
  • Malware Analysis
  • Computer Forensics
  • Network Protocol Analysis
  • Risk Management Framework
  • Work Orders
  • Confidential Data Protection
  • Intrusion Detection System (IDS)
  • Proxy Servers
  • Virtual Local Area Networks
  • Websense Data Loss Prevention
  • Resource Allocation
  • Infrastructure Change
  • Risk Management Evaluations
  • Continuity Monitoring
  • Programmable Logic Control Systems
  • Threat Detection
  • Bug Fixes
  • Video Surveillance Systems
  • Industry Best Practices
  • Dashboard Creation
  • Customer Satisfaction
  • Risk Mitigation Plans
  • Ticket Changes
  • Compliance with Security Requirements
  • Threat Management
  • Searching Records
  • Web Applications
  • Flaw Detection
  • Designing Security Controls
  • Forensic Engineering
  • Data Architecture
  • Business Application Review
  • Providing Briefings
  • Vulnerability and Penetration Testing
  • Documentation Support
  • Wide Area Network (WAN)
  • Corporate Accounting
  • Best Practice Implementation
  • Developing Security Plans
  • Web Servers
  • Event Security Monitoring
  • Reading Comprehension
  • Problem Resolution
  • Critical Thinking Skills
  • Information Auditing
  • Data Encryption
  • Rule Knowledge
  • Protecting Networks
  • Site Evaluations
  • Active Learning
  • Wire Shark Software
  • Implementing Security Programs
  • Vulnerability Testing
  • Security Systems Knowledge
  • Security Maintenance
  • Warranty Requirements
  • Security Best Practices
  • Documentation

Timeline

SOC Analyst

Telnet Solutions
03.2018 - 05.2020

SOC Analyst

GCB Services

Bachelor of Science - Information Security And Assurance

Indiana University - Purdue University Indianapolis
Kazeem Akintilo