Summary
Overview
Work History
Education
Skills
Certification
Languages
Timeline
Generic

Kelechukwu Onyelonu

Upper Marlboro,MD

Summary

I am an experienced Information Specialist dedicated to managing data for employers and clients while effectively distributing information throughout the organization. My responsibilities include data analysis, supporting security protocols, organizing and classifying information, maintaining accurate records, and actively contributing to team initiatives. I possess expertise in information technology, technical documentation, reporting, customer service, and process improvement. Additionally, I hold a Secret Clearance and certifications in Security+ and CySA+, with ongoing pursuits for CISSP and CISM certifications.

Overview

6
6
years of professional experience
1
1
Certification

Work History

Information Technology Specialist

US Army Reserve
01.2020 - Current
  • Provide senior-level support regarding data analytics strategies based on the National Institute of Standards and Technology (NIST) Cybersecurity Framework. This includes analyzing threat information from multiple sources, disciplines, and agencies across the Intelligence Community; Synthesizing and placing intelligence information in context; draws insights about the possible implications. Ensures threats and vulnerabilities are identified as early as possible and mitigated.
  • Provides senior-level support regarding the development of cyber threat indicators (attacks and compromise) monitoring to maintain awareness of the status of the highly dynamic operating environment; Coordinates and performs the collection, processing, analysis, and dissemination of cyber threat/warning assessments. Ensure vulnerabilities are identified as early as possible and mitigated.
  • Provide senior-level support regarding the intelligence of data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs) to analyze events that occur within the Company's environments (on-premises and cloud) to mitigate threats.
  • Ensure vulnerabilities are identified as early as possible and mitigated Senior-level support regarding the development of assessment plans and measures of performance and/or effectiveness. Conducts strategic and operational effectiveness assessments as required for cyber events. Determines whether systems performed as expected and provides input to the determination of operational effectiveness.
  • Ensures COMPANY has a properly managed cyber analysis framework.
  • Provide senior-level support regarding the assimilation of data and information from analytics and intelligence to support the creation of dashboards that inform senior leaders regarding the security posture of the organization. Generates routine and urgent reports and action plans to support enhanced security procedures and response measures to ongoing or imminent threats. Ensures Washington Metropolitan Area Transit Authority (COMPANY) has a properly managed and reportable cyber threat intelligence awareness program.
  • Provides senior-level support regarding the analyses of defensive and simulated offensive results, techniques used, and information collected from a variety of sources to identify, analyze, and report events that occur or might occur within the network to protect information, information systems, and networks from threats. Ensures vulnerabilities are identified as early as possible and mitigated.
  • Provide senior-level support regarding the response to routine and urgent cybersecurity situations within the permit domain to mitigate immediate and potential cyber threats. Uses mitigation, preparedness, and response and recovery approaches, as needed, to maximize safety, preservation of property, and information security. Investigate and analyze all relevant incident response activities. To ensure real-time cyber defense incident handling (e.g., forensic collections, intrusion correlation and tracking, threat analysis, and direct system remediation) tasks to support deployable Incident Response Teams (IRTs).
  • Provide senior-level support regarding incident response support functions through technical activities that gather evidence on criminal or foreign intelligence entities to mitigate possible or real-time threats, protect against insider threats, sabotage, and international terrorist activities, or support other intelligence activities. Investigates, analyzes, and respond to threats within the organization environment or enclave. Ensures the organization can respond to attacks quickly and eliminate threats.
  • Provides senior-level support regarding the consultation for the support program to establish relationships between the incident response team and other groups, both internal (e.g., legal department) and external (e.g., law enforcement agencies, vendors, and public relations professionals). Ensures the organization can respond to attacks quickly and eliminate threats.
  • Provides senior-level support regarding the processes to apply tactics, techniques, and procedures for a full range of investigative tools and processes to include, but not limited to, interviews, cyber surveillance, counter surveillance, and surveillance detection, and appropriately balances the benefits of intelligence gathering. Ensures vulnerabilities are identified as early as possible and mitigated.
  • Provides senior-level support regarding the activities to produce timely, fused, all-source cyber operations intelligence and/or indications and warnings intelligence products (e.g., threat assessments, briefings, intelligence studies, country studies). Analyzes collected information to identify vulnerabilities and potential for exploitation. To ensure the reporting of all cyber events/activity is presented in a timely and actionable media; relevant to cyber intelligence and security best practices.
  • Provides senior-level support regarding detailed intelligence plans to satisfy cyber operations requirements. Collaborates with cyber operations planners to identify, validate, and impose requirements for collection and analysis. Participates in targeting selection, validation, synchronization, and execution of cyber actions. Synchronizes intelligence activities to support organization objectives in cyberspace. To ensure the reporting of all cyber events/activity is presented in a timely and actionable media; relevant to cyber intelligence and security best practices.
  • Provides senior-level support regarding the monitoring of all defensive measures and information collected from a variety of sources to identify, analyze, and report events that occur or might occur within the network to protect information, information systems, and networks from internal and external threats. Takes appropriate action by reporting, remediating, and/or providing preventive recommendations being the liaison between the security engineering and authorizing official (as needed). To ensure the analysis of the information (data) from various sources within the enterprise and recognize a possible security violation or threat.
  • Used ticketing systems to manage and process support actions and requests.
  • Developed and maintained strong client relationships to deliver exceptional customer service and problem resolution.
  • Performed daily system monitoring, verifying integrity and availability of hardware, server resources, systems and key processes.
  • Resolved escalated issues by serving as subject matter expert on wide-ranging issues.
  • Controlled and managed server room, wireless network, server infrastructure, audiovisual equipment, laptops and video conferencing equipment.
  • Set up network profiles, security permissions and file sharing systems.
  • Resolved issues and escalated problems with knowledgeable support and quality service.
  • Monitored networks and network devices to resolve technical problems quickly.
  • Diagnosed and resolved hardware and software issues.

Infosec / Information System Security Officer Jr

Department of Homeland Security
11.2021 - 11.2022
  • Assists with the development of cybersecurity career-enhancing workforce plans, strategies, and guidance to enable the development and retention of the best professionals possible. Creates training and education requirements to address changes to cybersecurity policy, emerging threats, certification requirements, and industry best practices through partnerships with universities, certification companies, state/federal partners, and other innovative strategies that deliver relevant content. Creates a strong culture of cybersecurity within the IT organization and drives behavioral changes for all business units within homeland security. Ensures that timely, mission-focused, and tailored cybersecurity training and developmental opportunities are provided to cybersecurity personnel.
  • Assists in the creation of governance standards based on NIST and other frameworks (policies, processes, plans, templates, etc.) by which the company Cybersecurity program is managed and measured. Assists with the development and maintenance of cybersecurity plans, strategies, and policies to support and align with organizational cybersecurity initiatives and regulatory compliance. Ensures that the Company's cybersecurity program has a governance model based on best practices.
  • Assists with performance assessments of threats and vulnerabilities for systems and networks within the network environment; determines deviations from acceptable configurations, enterprise or local policy; assesses the level of risk; and develops and/or recommends appropriate mitigation countermeasures in operational and nonoperational situations. Measures effectiveness of defense-in-depth architecture against known vulnerabilities. Ensures that system and network threats and vulnerabilities are identified and remediated promptly.
  • Assists with evaluating the performance of the IT security program and its components to determine compliance with published standards. Tracks findings and reports of remediation progress. Supports policy compliance, governance, and incident response programs. Prepares audit reports that identify technical and procedural findings and provides recommended remediation strategies/solutions. Coordinates external audit requirements. Ensures that systems, processes, and people comply with published policy and alerts personnel to potential risk areas.
  • Assists with compiling and reviewing budgets for the Cybersecurity program using actual performance, previous budget figures, estimated revenue, expense reports, and other data sources to control funds and provide for proper financial administration. Uses an understanding of system security to develop budgetary requirements. Works with other cybersecurity personnel to ensure they effectively plan and monitor their budgets. Tracks contracting costs and needs, managing statement of work efforts. Ensures that the cybersecurity program manages costs effectively, projects future budget needs, improves services received, and meets schedule demands for service delivery.
  • Assists with preparing the presentation of governance and compliance management reports, key performance metrics, scorecards, and briefings as required to cybersecurity and IT leadership. Works with leadership to use continuous monitoring scoring and grading metrics to make information security investment decisions to address persistent issues. Works with organization risk analysts to ensure risk metrics are defined realistically to support continuous monitoring. Ensures the enterprise has cybersecurity scorecards that present a clear view of the health of the enterprise including but not limited to system-level health (categorized by business units and rolled up), operational defensive effectiveness (detection, response, remediation of threats), employee training/effectiveness (phishing, social engineering), etc.
  • Provides support for the cybersecurity components of the governance, risk, and compliance (GRC) tool. Configures and populates the tool to enable security professionals to document a wide array of controls. Creates and maintains inherited controls at the direction of the Authorizing Official. Supports audit and metric requirements by developing exports and reports. Ensures all system security controls are tracked and managed effectively.
  • Assists with the execution of a risk-based, repeatable/consistent system security strategy based on the NIST Risk Management Framework/Cybersecurity Framework which includes: control selection and inheritance, drafting and reviewing system authorization documentation, documenting/remediating vulnerabilities, populating a Governance Risk and Compliance (GRC) tool, partnering with developers/owners to ensure security is a part of the complete system development life cycle, and continuous monitoring. Ensures COMPANY has a consistent process around system authorization and monitoring.
  • As a part of the system security life cycle, provides support for the evaluation of the effectiveness of procurement function in addressing information security requirements and supply chain risks through procurement activities and recommends improvements. Develops and documents supply chain risks for critical system elements, as appropriate. Ensures that COMPANY systems and technology are procured with security considered from the start.
  • Evaluate and support the documentation, validation, assessment, and authorization processes necessary to ensure that existing and new information technology (IT) systems meet the organization's cybersecurity and risk requirements. Ensures the appropriate treatment of risk, compliance, and assurance from internal and external perspectives. Ensures COMPANY has a properly managed risk management framework.
  • Provides support regarding privacy impact assessments of an application's security design for the appropriate security controls, which protect the confidentiality and integrity of Personally Identifiable Information (PII) and assess the security effectiveness of the security controls. Ensures that PII is properly protected in all COMPANY systems and applications.
  • Assist with the implementation of the security controls specified in a security plan or other system documentation and develop a strategy for monitoring control effectiveness; coordinate the system-level strategy with the organization and mission/business process monitoring strategy. Ensures that COMPANY has a properly managed risk management framework.
  • Advises security managers on risk levels and security posture of managed systems, and the cost/benefit analysis of information programs/projects, policies, processes, systems, and elements.
  • Consult with customers to gather and evaluate functional requirements, determine security controls that mitigate risks, adhere to policy, facilitate customer needs, and translate these requirements into technical solutions. Guides customers about the applicability of security controls to meet business needs. Supports the development phases of the systems development life cycle.
  • Consulted with team members to assess flawed root causes and plan for remediation.
  • Performed risk analyses to identify appropriate security countermeasures.
  • Conducted security audits to identify vulnerabilities.
  • Recommend improvements in security systems and procedures.
  • Encrypted data and erected firewalls to protect confidential information.
  • Developed plans to safeguard computer files against modification, destruction, or disclosure.
  • Demonstrated respect, friendliness and willingness to help wherever needed.
  • Proven ability to learn quickly and adapt to new situations.
  • Cultivated interpersonal skills by building positive relationships with others.
  • Assisted with day-to-day operations, working efficiently and productively with all team members.
  • Demonstrated strong organizational and time management skills while managing multiple projects.
  • Strengthened communication skills through regular interactions with others.

Education

Bachelor of Science - Cybersecurity

University of Maryland Global Campus
College Park, MD
08.2029

Bachelor of Science - Information Technology

Prince George’s Community College (PGCC)
Largo MD
07.2022

Skills

  • Network security monitoring tools
  • Encryption tools
  • Web vulnerability scanning tools
  • Penetration testing
  • Antivirus software
  • Risk analysis
  • Malware analysis
  • End user support
  • LAN protocols
  • Hardware installations
  • Virtualization technologies
  • Audit support
  • Problem-solving skills
  • Document management
  • Confidential data management
  • Information security
  • Hardware updates
  • Document review
  • Enterprise architecture
  • Machine learning
  • Stakeholder collaboration
  • Software updates

Certification

  • Security+, CompTIA - July 2021
  • CySA+, CompTIA- October 2025

Languages

English
Professional Working

Timeline

Infosec / Information System Security Officer Jr

Department of Homeland Security
11.2021 - 11.2022

Information Technology Specialist

US Army Reserve
01.2020 - Current

Bachelor of Science - Cybersecurity

University of Maryland Global Campus

Bachelor of Science - Information Technology

Prince George’s Community College (PGCC)
Kelechukwu Onyelonu