Summary
Overview
Work History
Education
Skills
Certification
Security Tool Experience
Timeline
Generic

Kola Oladeru

Houston,TX

Summary

I am a SOC Analyst professional with many years of experience across cybersecurity and threat intel analysis. Strong cybersecurity background includes information security engineering, network security, firewalls, systems analysis, intrusion analysis, and incident response. I have excellent analytical skills Specialized in proactive network monitoring using various SIEM Tools. Excellent analytical, organizational and communication skills. I perform vulnerability scans and assessments. I have a deep knowledge of identifying and analyzing suspicious events. Demonstrates an ability to work with analysts to provide indications and contribute to predictive analysis of malicious activity. Value-centric leader who thrives in fast-paced environments delivering forward-thinking and professionalism. Skilled SOC Analyst with a background in cyber threat detection, vulnerability assessment, and risk mitigation. Experienced in implementing security measures for networks and systems, ensuring data integrity and confidentiality. Strengths include deep understanding of cybersecurity frameworks, incident response protocols, and forensic investigation techniques. Previous roles have realized improved system resilience against cyber threats.

Overview

8
8
years of professional experience
1
1
Certification

Work History

SOC Analyst/Incident Response

CIPHERTECHS
New York
01.2019 - Current
  • Analyze malicious activity to determine weaknesses exploited, exploitation methods, effects on system and information, and responsible of security monitoring networks, web sites, applications, databases, servers, data centers and other infrastructures to protect them from cyber threats
  • Performed triage and analysis of network traffic, IDS events and phishing investigations for malicious intent with the use of various network defense toolsets like Demisto, Splunk and QRadar and Malware analysis: Using static and dynamic methods to analyze malware's inner workings, including disassembling, deconstructing, and reverse engineering malicious code
  • To identify threats: Examine programs and software for threats, and record malware threats
  • Write reports: Create malware reports and forensics or incident response reports
  • TCP/IP and packet analysis using various tools to determine False/True Positive signature alerts
  • Triage network events and determine appropriate course of action in response to identified and analyzed anomalous activity
  • Communicate potential threats identified in IDS/IPS alerts to affected organizations
  • Document and escalate incidents (including events)
  • Conduct research, analysis, and correlation across a wide variety of all source data sets
  • Determine tactics techniques and procedures (TTPs) for threat actors and other intrusion sets
  • Facilitates the rapid and secure exchange of cybersecurity information used to identify, respond to, and prevent information system compromises
  • Research indicators of compromise (IOC) from commercial data feeds, intelligence reports and open source for implementation in border security controls, support a 24/7/365 Security Operations Center and monitor security tool
  • Processed abuse inbox emails (spam, phishing, etc.) and create tickets assigned to the SOC group using ServiceNow/ Salesforce for tracking purposes
  • Monitor hosts for cyber threat events and vulnerabilities
  • Perform incident response activities focusing on identifying and remediating malicious activity and/or actors within critical infrastructure and identify suspicious/malicious activities or codes

SOC Analyst

PROSEC SOLUTION INC
Houston, TX
08.2017 - 01.2019
  • Configured security baselines to ensure compliance with organizational security policies
  • Continuous monitoring and interpretation of threats using the IDS and SIEM
  • Use Vulnerability Assessment tools such as Nessus, NMAP to perform security testing
  • Investigate malicious phishing emails, domains and IPs using Open-Source tools and recommend proper blocking based on analysis
  • Conduct log analysis using Splunk
  • Search firewall, email, web, or DNS logs to identify and mitigate intrusion attempts
  • Monitoring and analysis of security events to determine intrusion and malicious events
  • Rescan mitigated systems for further infections
  • If none, commission systems back to the network
  • Research new and evolving threats and vulnerabilities with potential to impact the monitored environment
  • Conduct research on new and evolving threats and vulnerabilities using security blogs
  • Conducted audits of systems to certify proper security controls were implemented
  • Analyze various log, network, malware, forensic, and open source information to validate security threats, recommend appropriate countermeasures, and assess impact of incidents
  • Author SOPs as needed or directed to facilitate SOC operations
  • Assist with the creation of the daily SOC report and brief customer as necessary
  • Participate in daily security meetings with other contractor and customer teams
  • Report security incidents using ServiceNow ticketing system for events that signal an incident and require Tier 3 Incident Response review
  • Monitor security infrastructure and security alarm devices for indicators of compromise utilizing cybersecurity tools such as firewalls and IDS/IPS systems under 24/7 operations
  • Analyzed security event data using SIEM tool
  • Conducted software demonstrations of TEM for Console Operators and Web Reports users

IT Helpdesk Internship

BestBuy
Wheaton, Maryland
12.2016 - 08.2017
  • Served as the first point of contact for customers seeking technical assistance over the phone or email
  • Performed remote troubleshooting through diagnostic techniques and pertinent questions
  • Walked the customer through the problem-solving process
  • Directed unresolved issues to the next level of support personnel
  • Provided information on IT products or services
  • Utilized and maintained the helpdesk tracking software
  • Supported with onboarding of new users
  • Ensured each workstation has a computer, monitor, keyboard, mouse, hard drive, and any additional specialized equipment
  • Installed, tested and configured new workstations, peripheral equipment and software
  • Maintain inventory of all equipment, software and software licenses
  • Reported issues to the Service Desk for escalation
  • Managed PC setup and deployment for new employees using standard hardware, images and software
  • Assigned users and computers to proper groups in Active Directory
  • Performed timely workstation hardware and software upgrades as required
  • Pass on any feedback or suggestions by customers to the appropriate internal team
  • Identified and suggested possible improvements on procedures

Education

Master’s Degree - Cyber Security

University of Maryland University College
01.2021

Bachelor of Science - Information Assurance & Security Management (Cyber Security)

University of Maryland University College
01.2017

Skills

  • ArcSight Enterprise Security Manager
  • Arcsight Command Center
  • Arcsight Logger
  • Splunk
  • Demisto
  • Python
  • BlueCoat
  • Crowdstrike
  • SentinelOne
  • Microsoft Defender
  • ProofPoint Intel Security
  • ProofPoint Threat Analysis Platform
  • Symantec Data Loss Prevention
  • Mimecast
  • Fidelis XPS
  • IP Networking
  • Security/Network
  • McAfee
  • Trellix
  • Security Information & Event Management
  • TCPDump
  • Netflow
  • Wireshark
  • Varonis
  • Rapid7
  • LogRhythm
  • AlienVault
  • Devo
  • Tanium
  • Sumo Logic
  • VMWare
  • VirtualBox
  • Cisco VPN
  • SSL Appliances
  • BMC Remedy Ticketing System
  • ServiceNow
  • Salesforce
  • JIRA
  • AWS
  • Microsoft Azure
  • Wiz
  • Security analysis
  • Operating system security
  • Malware analysis
  • SIEM management
  • Data loss prevention
  • Vulnerability assessment
  • DNS management
  • Encryption techniques
  • Log analysis
  • Packet analysis
  • Wireshark usage
  • Network monitoring
  • TCP and IP protocols
  • Penetration testing
  • Cloud security
  • Endpoint security
  • Social engineering
  • Forensic investigation
  • Incident response
  • Security awareness training
  • Intrusion detection
  • Threat intelligence
  • Firewall configuration

Certification

  • EC-Council Certified Ethical Hacker (CEH)
  • EC-Council Certified Network Defense Architect (CNDA)
  • EC-Council Certified Hacking Forensic Investigator (CHFI)
  • CompTIA Security +
  • CompTIA Network+
  • AWS Professional

Security Tool Experience

  • ArcSight Enterprise Security Manager
  • Arcsight Command Center
  • Arcsight Logger
  • Splunk
  • Demisto Security Orchestration
  • BlueCoat
  • Crowdstrike
  • SentinelOne
  • Microsoft Defender
  • ProofPoint Intel Security
  • ProofPoint Threat Analysis Platform (TAP)
  • Symantec Data Loss Prevention (DLP)
  • Mimecast
  • Fidelis XPS
  • McAfee/Trellix Security Information & Event Management (SIEM)
  • TCPDump
  • Netflow
  • Wireshark
  • Varonis
  • Rapid7
  • LogRhythm
  • AlienVault
  • Devo
  • Tanium
  • Sumo Logic
  • VMWare
  • VirtualBox
  • Cisco VPN
  • BMC Remedy Ticketing System
  • ServiceNow
  • Salesforce
  • JIRA
  • AWS
  • Microsoft Azure
  • Wiz

Timeline

SOC Analyst/Incident Response

CIPHERTECHS
01.2019 - Current

SOC Analyst

PROSEC SOLUTION INC
08.2017 - 01.2019

IT Helpdesk Internship

BestBuy
12.2016 - 08.2017

Master’s Degree - Cyber Security

University of Maryland University College

Bachelor of Science - Information Assurance & Security Management (Cyber Security)

University of Maryland University College
Kola Oladeru