Results-driven IT professional with notable success in planning, analysis and implementation of security initiatives. Strengths in providing comprehensive network design and security frameworks.
Certified as a Data Privacy Practitioner (CPP), Web Application Security Professional (CWASP), Splunk Certified Core User, Splunk Certified Power User, Splunk Enterprise Certified Admin, CompTIA Security+ Certification.
Overview
10
10
years of professional experience
1
1
Certification
Work History
SOC Analyst
Kinzo Group
11.2021 - Current
Streamlined incident response processes for quicker threat detection and remediation.
Enhanced network security by monitoring systems for potential threats and vulnerabilities.
Identified root causes of security breaches through thorough investigation and analysis of log data.
Monitored use of data files and regulated access to protect secure information.
Implemented automated tools for continuous monitoring of system logs, reducing manual efforts by the team.
Collaborated with IT teams to implement effective security measures, safeguarding critical data and systems.
Administered and monitored firewalls, intrusion detection systems and anti-virus software to detect risks.
Supported compliance initiatives by conducting regular audits of security controls and providing recommendations for improvement.
Drafted security reports and metrics to track security performance and strategize improvements.
IT Service Desk Specialist
Ministry Of Government And Consumer Services
01.2021 - 11.2021
Played a crucial role in the planning and execution of disaster recovery exercises to ensure business continuity in the event of a critical system failure.
Increased overall departmental efficiency by automating repetitive tasks using scripting languages such as PowerShell or Python.
Boosted first-call resolution rates by proactively researching common user issues and developing targeted solutions.
Installed, configured and maintained computer systems and network connections.
Removed malware, ransomware, and other threats from laptops and desktop systems.
Addressed security vulnerabilities promptly through thorough analysis of security logs, patch management, and collaborating with cybersecurity experts within the organization.
Explained security measures in simple terminology to help users understand malware and phishing threats.
Generated reports to track performance and analyze trends.
Implemented robust cybersecurity measures to protect sensitive data and prevent unauthorized access.
Developed technical documentation to facilitate user training and improve issue resolution times.
Streamlined operations with the implementation of IT service management best practices.
Skilled at working independently and collaboratively in a team environment.
Network Security Analyst
Canopy Growth Corporation
02.2020 - 01.2021
Researched and developed new computer forensic tools.
Analyzed network traffic and system logs to detect malicious activities.
Reviewed violations of computer security procedures and developed mitigation plans.
Optimized firewall configurations to minimize unauthorized access and maintain system integrity.
Reviewed log files from various sources to track down root causes of incidents, allowing for targeted remediation efforts.
Conducted regular vulnerability assessments to identify potential risks and implement proactive countermeasures.
Assisted management in developing a business continuity plan that addressed potential cyber threats and their impacts on operations.
Coordinated with third-party security information and event management (SIEM) providers to maintain protections and predict threats.
Worked closely with HR departments to ensure employees followed access controls and data handling procedures, minimizing the risk of insider threats.
Implemented advanced encryption techniques for secure data transmission across the organization''s networks.
Computer Network Technician
Canada Career College
01.2019 - 11.2020
Provided faculty and staff with security software and network configuration support.
Configured, monitored and maintained email applications and virus protection software.
Performed system patches, service packs, hot fixes and new security configurations.
Installed cabling, wireless routers and telephone systems for data communications networks.
Assigned application access, security roles and permissions.
Investigated and corrected problems with printers, copiers and other peripheral devices.
Installed patches and performed backups, system builds and image updates.
Troubleshot hardware and software to determine and rectify network problems.
Maintained thorough understanding of local area and wide area networking and components.
Evaluated security measures and made recommendations to network administrator for upgrades and changes.
Internal Auditor
Scudo Group
02.2014 - 06.2016
Evaluated company's policies to determine how well standards adhered to best practices.
Collaborated closely with the Audit Lead to define the scope and plan internal audits, utilizing a risk-based approach aligned with ISO 27001, NDPR, and AUC Cyber Security and e-Africa Regulations to effectively address key vulnerabilities.
Partner with the Audit Lead to plan and scope internal audits, ensuring alignment with risk priorities and regulatory requirements.
Conducted stakeholder interviews and gather evidence through detailed document and data analysis.
Observed and assessed business processes across critical areas like stock, accounts, and financial records, performing both financial and operational audits.
Evaluated adherence to company policies, procedures, and external regulations, providing assurance on the adequacy of security controls and their effectiveness in supporting business objectives.
Reviewed and update internal control policies and procedures to ensure comprehensive coverage and mitigate potential risks.
Assessed existing risk management processes, accurately document findings, and recommend appropriate mitigating controls for identified security vulnerabilities and control gaps.
Followed up with responsible teams to ensure timely implementation of recommended actions.
Conducted risk-based reviews of IT systems, proactively identifying process and operational lapses.
Investigated IT incidents to detect potential fraud, business losses, and operational inefficiencies.
Actively participated in IT projects and product development, identifying risks and recommending robust controls at early stages.
Effectively communicate audit findings and recommendations to relevant stakeholders, including responsible teams, external auditors, and management.
Monitored and follow up on the implementation of recommendations from various sources, ensuring timely action and risk mitigation.
Reviewed system deployments to verify incorporation of security controls and compliance with established development policies and procedures.
Assessed IT operations controls, staffing, training needs, and segregation of duties.
Senior Data Scientist/Algo Solution PIC at Daraz Group (Alibaba Group - Alibaba International Digital Commerce Group)Senior Data Scientist/Algo Solution PIC at Daraz Group (Alibaba Group - Alibaba International Digital Commerce Group)
Lead Fellow at Centers for Medicare and Medicaid Services (CMS), Office of Group Director Quality Improvement & Innovation Group, Center for Clinical Standards & QualityLead Fellow at Centers for Medicare and Medicaid Services (CMS), Office of Group Director Quality Improvement & Innovation Group, Center for Clinical Standards & Quality