Summary
Overview
Work History
Education
Skills
Certification
Work Availability
Timeline
Generic

Ochuba Udeagha

Woodbine,Maryland

Summary

  • Detail-oriented team player with strong organizational skills. Ability to handle multiple projects simultaneously with a high degree of accuracy.
  • To seek and maintain full-time position that offers professional challenges utilizing interpersonal skills, excellent time management and problem-solving skills.
  • Cybersecurity Specialist with proficiency in online security research, planning, execution and maintenance. Skilled at training internal users on security procedures and preventive measures.
  • Information Security Specialist with passion for aligning security architecture plans and processes with security standards and business goals. Extensive experience developing and testing security framework for cloud-based software. Versed in robust network defense strategies.

Overview

6
6
years of professional experience
1
1
Certification

Work History

IT System Cybersecurity Analyst

DIASPO CARE
Columbia, MD
01.2018 - Current
  • Recommend improvements in security systems and procedures.
  • Conducted security audits to identify vulnerabilities.
  • Designed company-wide policies to bring operations in line with Center for Internet Security (CIS) standards.
  • Performed risk analyses to identify appropriate security countermeasures.
  • Developed and maintained incident response protocols to mitigate damage and liability during security breaches.
  • Managed relationships with third-party intrusion detection system providers.
  • Directed in-house cyber security auditing program to detect flaws and weaknesses in software.
  • Participated in creation of device hardening techniques and protocols.
  • Spearheaded bring your own device program, defining necessary security parameters and designing complementary security deployments.
  • Created cybersecurity best practice communications to educate staff against known threats and potential vectors of attack.
  • Collaborated with third-party payment card industry (PCI) compliance partners.
  • Maintained company-wide compliance with industry standards and
  • Authored security incident reports, highlighting breaches, vulnerabilities and remedial measures.
  • Verified strength of network security measures such a penetration testing and vulnerability assessment through external intrusion testing services.
  • Maintained company-wide compliance with industry standards and Certification requirements is crucial for demonstrating a commitment to quality,security and regulatory adherence.
  • Monitored computer virus reports to determine when to update virus protection systems.
  • Monitored use of data files and regulated access to protect secure information.
  • Analyzed network traffic and system logs to detect malicious activities.
  • Executed penetration testing to identify security weaknesses and develop disaster recovery plans.
  • Drafted security reports and metrics to track security performance and strategize improvements.
  • Researched and developed new computer forensic tools.
  • Developed, tested and implemented security policies, plans and procedures for organizational protection.
  • Engineered, maintained and repaired security systems and programmable logic controls.
  • Reviewed violations of computer security procedures and developed mitigation plans.
  • Investigated and resolved incidents of unauthorized access to sensitive information.
  • Implemented security measures to reduce threats and damage related to cyber attacks.
  • Educated and trained users on information security policies and procedures.
  • Administered and monitored firewalls, intrusion detection systems and anti-virus software to detect risks.

Education

Bachelor of Science - MATH/STAT/COMP.SC

University Of Calabar
CALABAR ,CROSS RIVER
03.1998

Skills

  • Websense Data Loss Prevention
  • Work Orders
  • Flaw Detection
  • Symantec Endpoint Protection
  • Plan of Actions & Milestones (POA&M)
  • Project Requirements
  • Complex Problem-Solving
  • Threat Detection
  • Reading Comprehension
  • Telecommunications Systems
  • Cybersecurity Policy Development
  • Preventative Maintenance
  • Risk Mitigation
  • New System Research
  • Remediation Activities
  • Tenable Nessus
  • Active Listening
  • Diagnostic Tools
  • Ajax (Programming)
  • Linux Server
  • Network Security Measures
  • Operational Improvements
  • Third-Party Collaboration
  • PCI Compliance
  • Data Encryption
  • Microsoft Hyper-V Server
  • Design Modification
  • Identifying Risks
  • Security Improvements
  • Security Systems Knowledge
  • IDS Integration
  • Information Auditing
  • Critical Thinking Skills
  • Production Work
  • Developing Security Plans
  • Video Surveillance Systems
  • Web Applications
  • Continuity Monitoring
  • Confidential Data Protection
  • Designing Security Controls
  • Customer Satisfaction
  • Providing Briefings
  • Intrusion Test Oversight
  • Vulnerability and Penetration Testing
  • Compliance with Security Requirements
  • Incident Response Management
  • Software Deployment
  • Qualys Cloud Platform
  • Oracle E-Business Suite Financials
  • Training Junior Team Members
  • Computer Forensics
  • Bug Fixes
  • Profit Margins
  • Social Perceptiveness
  • Risk Management Evaluations
  • Operational Management
  • Event Security Monitoring
  • Best Practice Implementation
  • Microsoft ASPNET
  • Managing Security Breaches
  • Deductive Reasoning Skills
  • Office Cleaning
  • Resource Allocation
  • Security Evaluation
  • Requirements Traceability Matrix (RTM)
  • CIS Compliance
  • Overhauling Systems
  • Data Architecture
  • Business Application Review
  • Virtual Local Area Networks
  • Surveillance System Monitoring
  • Searching Records
  • Best Practices and Methodologies
  • Computer Network Defense
  • Security Recommendations
  • Infrastructure Change
  • Multi-Factor Authentication
  • Remediation Planning
  • Network Performance Monitoring
  • Cisco Jabber
  • Cloud Hosting
  • Erecting Firewalls
  • Threat Research
  • Violation Investigation
  • Scanning Tools
  • Computer Security Incident Response Team (CSIRT)
  • Wire Shark Software
  • Risk Management Framework
  • Disaster Recovery Operations
  • Forensic Engineering

Certification

compTIA Security +

Work Availability

monday
tuesday
wednesday
thursday
friday
saturday
sunday
morning
afternoon
evening
swipe to browse

Timeline

IT System Cybersecurity Analyst

DIASPO CARE
01.2018 - Current

Bachelor of Science - MATH/STAT/COMP.SC

University Of Calabar
Ochuba Udeagha