Summary
Overview
Work History
Education
Skills
Accomplishments
Certification
Languages
Timeline
Generic
Kingsley Omondiagbe

Kingsley Omondiagbe

San Diego,USA

Summary

DoD-cleared Cybersecurity Engineer with over 10 years of defense and enterprise experience, specializing in SIEM, vulnerability management, and compliance. Certified in CISM, PMP, CEH, CIH, CNDA, Security+, Network+, A+, CySA+, and CASP+, with a proven track record of enhancing security resilience and leading mission-critical projects. Expertise includes threat analysis, risk assessment, and implementing robust security protocols to safeguard digital infrastructures. Recognized for a collaborative approach and adaptability in dynamic environments, consistently delivering impactful results as a dependable team player.

Overview

14
14
years of professional experience
1
1
Certification

Work History

Cyber Security Engineer

Northrop Grumman Aeronautics Systems
12.2024 - Current
  • Led a COTS cybersecurity evaluation of 160 applications, identifying 100+ End-of-Life/End-of-Support (EoL/EoS) risks and providing upgrade/replacement recommendations that reduced unsupported software exposure by 40%.
  • Integrated applicable DoD STIGs and CVE analysis into the evaluation process, ensuring vulnerabilities were mapped to compliance requirements and industry-standard risk scoring.
  • Developed and implemented prioritized vulnerability mitigation strategies for licensed and open-source applications, improving overall compliance readiness for NIST Security audits by 30% and strengthening the organization’s security posture.
  • SIEM Integration & Log Management (Splunk).
  • Configured and deployed Splunk Universal Forwarder across Red Hat Linux systems to enable real-time log ingestion and monitoring.
  • Integrated Splunk Forwarders within containerized environments and Kubernetes clusters to centralize and secure event visibility.
  • Engineered and maintained enterprise-wide log forwarding and log management processes to support SIEM-driven threat detection.
  • Designed and implemented a centralized log management infrastructure using Splunk to streamline incident response and compliance reporting.
  • Managed container logging via Splunk Forwarders to ensure visibility and monitoring of Kubernetes-based workloads.
  • Monitored and analyzed user and device activity logs within Splunk to support insider threat detection and audit readiness.
  • Implemented automated audit logging and reporting in Splunk to satisfy regulatory and security framework requirements.
  • Enforced role-based access control (RBAC) policies in Splunk to restrict access to sensitive logs and administrative functions.
  • Configured session timeout and termination policies based on user roles within the SIEM platform to prevent unauthorized access.
  • Windows & Linux Log Auditing.
  • Implemented logging of user account and device activities on Windows Server environments to maintain audit trail integrity.
  • Enabled and managed event log forwarding on Red Hat Linux servers for continuous security visibility and SIEM integration.
  • Endpoint Protection & Host-Based Security management.
  • Deployed and maintained host-based security tools, including antivirus, host-based firewalls, and access control lists (ACLs), to secure endpoint systems.
  • Ensured security compliance and endpoint visibility by integrating HBSS tools with enterprise-level security monitoring platforms.
  • Compliance Auditing & SCAP.
  • Conducted SCAP-based compliance audits leveraging automation tools to validate system configurations and enforce policy baselines.
  • Performed compliance audits on virtual hypervisors to ensure alignment with RMF controls and operational security requirements.
  • Vulnerability Management & Virtual Environments.
  • Executed host and vulnerability scanning on virtual hypervisors to identify exploitable risks and support remediation efforts.
  • Reviewed logs regularly to detect suspicious activity patterns before they escalate into full-blown incidents, enabling rapid response efforts when necessary.

Principal Cyber Security Engineer

Range Generation (RGNext), Space Launch System, United States Space Force
02.2023 - 12.2024
  • Won the Company Security Spot Check award in 2023 for outstanding contributions and voluntary efforts to enhancing the organization’s cybersecurity measures.
  • Analyze the architectures of IT systems for compliance with DoD policies and RMF process; develop and execute security test plans; and use security tools such as ACAS, SCAP, and execution of STIGs. Organize, develop, and present briefings, written summaries, and written reports incorporating narrative, tabular, and/or graphic elements.
  • Used Cenzicallia to capture 75 computer images before performing vulnerability and compliance assessment.
  • Performed Standard Desktop Configuration (SDC) on 50 Assets for 5 different Enclaves.
  • Highly skilled in using NMAP and Nessus, including working through Nessus Troubleshooting to obtain required protocol authentication for Cybersecurity Scanning of Assets.
  • Configuration management experience: During the High-Risk Reduction project and then utilized Win Audit to perform software baseline capture on over 50 computers.
  • Manually fetched over 350 vulnerability patches while leading and collaborating with a team of 3 Software Engineers to manually perform mitigation on High-Risk Assets.
  • Also created over 50 detailed software compliance reports, hardware inventories, and security audit of servers.
  • Utilized WSUS to automate over 700 security patches on 55 High Risk Assets and 5 IA computers.
  • Used DoD repository and trusted third party for security patches.
  • Used PowerShell Script to review and analyze over 70 Nessus scan reports and suggested recommendations for security patches.
  • Security Impact Assessment (SIA) documentation.
  • FISMA and RMF Experience: Achieved 90% artifact collection by leading surveillance enclave site inspections, validating company assets against cybersecurity hardware and software listings, and capturing vulnerability and compliance scan results, as well as system, security, and application logs for FISMA ATO packages.
  • High Risk Reduction Project: Achieved a 100% success rate in software capture for configuration management documentation by using PowerShell scripts to collect software listings from 55 laptops.
  • Vendor Research: Conducted research on approved vendor sites to obtain software that supports the company's mission and operations.
  • Continuous Integration (Services Pack):
  • Continuous Testing (Service Pack):
  • Analyzed security incidents post-resolution, identifying areas for improvement in both technical controls and incident response processes.
  • Ensured compliance with industry regulations by performing comprehensive audits on existing security policies and procedures.
  • Led cybersecurity awareness training sessions, increasing staff vigilance against phishing and social engineering attacks.
  • Developed and enforced stringent cybersecurity policies, significantly reducing risk of data breaches.

Senior Cyber Security Engineer

TEKsystems, Space Launch System, United States Space Force
05.2022 - 02.2023
  • Monitor and correlate data (e.g., logs, events, activity, etc.) from a variety of sources (e.g., Splunk, Tenable/Nessus, etc.) to identify and mitigate threats, vulnerabilities and non-compliance.
  • Ensure all applicable RMF cybersecurity controls, policies, and procedures are implemented and validated against various government publications.
  • Maintain Information Assurance Standard Operating Procedure (IASOP), Security Controls Traceability Matrix (SCTM), Contingency Plan, Hardware Baseline, and Software Baseline.
  • Effectively collaborate with cybersecurity and system admin teams to ensure POA&M items are updated consistently.
  • Continuously Monitoring (ConMon) tasks are completed, and audits are conducted properly.
  • Maintain post assessment A&A packages to include, Authorization Cover Letter, System Validation Letter, 8570/8140 Certification, System Security Plan (SSP), Security Assessment Report (SAR), PPS (ports, protocols, and services), Plan of Action and Milestone (POA&M), Risk Assessment Report (RAR), Configuration Management Plan (CMP), Assured File Transfer Procedures (AFT), Media Protection Policy and Procedures, Incident Response Plan (IRP), Security Content Automation Protocol (SCAP), Vulnerability Scan, DoD IT Census, and Security Assessment Plan (SAP).
  • Perform self-inspections and report to the ISSM and SCA as needed.
  • Performed upgrade forwarders and software updates on appropriate machines.
  • Build operating system and server racks from scratch documenting along the way to ensure repeatability and efficiency in the future.
  • Experience in configuring Windows/RHEL servers, UPS, PDU, and workstations.
  • Functional Qualification Test, supporting as a tester and validating requirements.
  • Worked with organizational contacts to ensure program goals and or milestones.
  • Successful completion of the GCI Systems, in support of organizational customers.
  • Independently determine the approach to solutions and contribute to the completion of projects.
  • Incorporated cybersecurity measures for UCI that are replacing link 16.
  • Experience with data recording and analysis tools such as Wireshark.
  • Performed Scrum Master duties weekly.
  • Experience with DoD information security toolsets, including Host Based Security System (HBSS), SCAP, and vulnerability scanners, such as the Assured Compliance Assessment Solution (ACAS).

Cybersecurity Instructor & IT Consultant

ITech University and Cybersecurity Training Bootcamp
04.2020 - 05.2022
  • During my tenure as an instructor, I provided comprehensive computer application instruction to a total of 35 students at all levels, both in class and online. This included instruction in a variety of software applications ranging from beginner to advanced levels.
  • Developed and delivered training programs for 20 students on computer repair (hardware) and system troubleshooting.
  • These programs incorporated training guides to facilitate training and covered topics such as the installation of system software such as VM and VBOX, as well as Windows products.
  • As part of my cybersecurity instruction, I provided instruction on Cyber Security Compliance, Policies, and Documentation to 75 students interested in working within the industry. Also Trained additional 25 students on the Risk Management Framework.
  • To enhance my teaching experience, I utilized various training tools, including python scripts to educate students and businesses about the inherent vulnerabilities of IoT Devices.
  • Furthermore, I provided instructor-led technical training for CompTIA A+, Network+, and Security+ Certification Exam.
  • Overall, I have successfully trained and prepared a diverse group of students for a variety of technical roles in the computer and cybersecurity industries.

IT Specialist

US Navy, Lemoore
03.2014 - 06.2020
  • Monitored 50 computer virus reports to determine when to update virus protection systems.
  • Configure hardware devices and software and set-up workstations for employees with proper vulnerability protection and eliminate security problems and protect data.
  • Responsible for removing antivirus ransomware and other threats from laptops and desktop systems. Became an expert at risk assessment, operational performance, firewall security, vulnerability assessment, data structures and information systems.
  • Demonstrated knowledge of system engineering, safety and compliance, problem solving, quality assurance, security procedure, system security, internet connectivity and technical support.
  • Performed risk and vulnerability assessments as well as Assessment and Authorization (A&A) and provided results and recommendations to senior management.
  • Delivered network systems upgrade on time, under budget and with minimal service interruption.
  • Participated in the creation of 20 device hardening techniques and protocols.
  • Encrypted data and erected 15 firewalls to protect confidential information. Performed risk analyses to identify appropriate security measures.
  • Monitored use of data files and regulated access to protect secure information.
  • Managed relationships with third-party intrusion detection system providers.
  • Created cybersecurity best practice communications to educate staff against known threats and potential vectors of attack.
  • Responded to faults in both LAN and WAN networks to rapidly restore connectivity and prevent unnecessary downtimes.
  • Maintained a 97% satisfaction rating of permission auditing and review inspection for 12 months.

Logistic Specialist and Financial Manager

US Navy, North Island Naval Air Station
04.2011 - 04.2014
  • Comprehensive background in project management derived from managing operating target fund for the U.S Navy Budget.
  • Managed risk upon multiple lines to protect assets, property, and equipment valued at over $82M while meeting the expectations of senior leadership.

Education

Master of Science - Cybersecurity And Information Assurance

Western Governor University
Salt Lake, Utah
06-2025

Bachelor of Science - Cybersecurity and Information Assurance

06.2025

Skills

  • Burp Suite
  • Recon-ng
  • Nmap
  • Zenmap
  • Rapid7 Nexpose
  • Rapid7 Metasploit 2
  • Cloud Azure
  • Raspberry Pi 3
  • Security Content Automation Protocol (SCAP) DISA STIG
  • Assured Compliance Assessment Solution (ACAS)
  • Endpoint Monitoring
  • Event Logging
  • FISMA Compliance
  • Host Based Security System (HBSS)
  • System Assessments
  • Security Plans
  • Threat Detection
  • JIRA
  • Confluence
  • Wireshark
  • Splunk
  • ACAS (Nessus)
  • SCAP
  • STIG Viewer
  • Policy Analyzer
  • Log Management
  • Anti Malware
  • Cyber Incident Response
  • Docker Container
  • Hypervisor
  • Lean Manufacturing Operations
  • Log Monitoring
  • McAfee HBSS
  • Mirantis Kubernetes-as-a-Service (KaaS)
  • Trellises
  • Ubuntu
  • VMware ESXi
  • GitHub
  • SNARE
  • Carbon Black
  • McAfee ePO(Trellix)
  • Raspbian
  • Kali Linux
  • RHEL7
  • SIEM Tools
  • Nessus Vulnerability Scanner
  • Network Security Protocols
  • NIST Standards
  • Python (Programming Language)
  • Python IDLE
  • SPLUNK-SIEM
  • Security Operations Monitoring
  • Windows 10
  • Active Directory
  • PowerShell
  • Bitbucket
  • Artifactory
  • Python
  • VSphere
  • Virtual Box
  • Adverse Event Reporting System
  • Red Hat Enterprise Linux (RHEL)
  • Risk Management Framework
  • SAP Compliance
  • Security Log Management
  • Firewall management
  • Endpoint protection
  • Network security

Accomplishments

Led cybersecurity evaluation of 160+ applications, identifying 100+ End of Life/End of Support (EoL/EoS) risks and reducing unsupported software exposure by 40%.

Certification

  • IASAE II, IAT III
  • CompTIA Security X (Formally CASP) COMP001021555426
  • CEH (Certified Ethical Hacker)-EC Council - EC-Council ECC2980164357
  • CNDA (Certified Network Defense Architect (CNDA))-EC-Council - EC-Council ECC0359186742
  • EC Council (Certified Incident Handler) ECC0762594813
  • IAM III
  • ISACA Certified Information Security Manager (CISM) 242493118
  • Project Management Professional (PMP) - Project Management Institute (PMI) 3154575
  • IAT II
  • CompTIA CySA+ COMP001021555426
  • CompTIA Security + COMP001021555426
  • IAT I
  • CompTIA Network + COMP001021555426
  • CompTIA A+ COMP001021555426

Languages

English
Full Professional

Timeline

Cyber Security Engineer

Northrop Grumman Aeronautics Systems
12.2024 - Current

Principal Cyber Security Engineer

Range Generation (RGNext), Space Launch System, United States Space Force
02.2023 - 12.2024

Senior Cyber Security Engineer

TEKsystems, Space Launch System, United States Space Force
05.2022 - 02.2023

Cybersecurity Instructor & IT Consultant

ITech University and Cybersecurity Training Bootcamp
04.2020 - 05.2022

IT Specialist

US Navy, Lemoore
03.2014 - 06.2020

Logistic Specialist and Financial Manager

US Navy, North Island Naval Air Station
04.2011 - 04.2014

Master of Science - Cybersecurity And Information Assurance

Western Governor University

Bachelor of Science - Cybersecurity and Information Assurance

Kingsley Omondiagbe