Summary
Overview
Work History
Education
Skills
Certification
Timeline
Generic

OLUWASEUN JOSEPH ADEDEJI

North Brunswick,NJ

Summary

Dedicated and analytical CSOC Analyst with years of experience monitoring, detecting, and responding to cybersecurity threats. Proficient in managing SIEM and EDR tools, conducting vulnerability assessments, and implementing security measures to safeguard organizational assets. Adept at leading incident response efforts and providing security training to team members. Committed to staying abreast of the latest cyber threats and technologies to develop robust defense strategies. I am seeking to leverage my expertise to enhance the security posture of a forward-thinking organization.

Overview

8
8
years of professional experience
1
1
Certification

Work History

Cybersecurity Analyst

FieldNation
03.2023 - Current
  • Monitor and analyze local threat operations channels, SIEM, AV, DLP policy violation consoles, and alert clients/stakeholders of suspicious/malicious activity within agreed SLA timelines
  • Utilize SIEM (Splunk, Azure Sentinel), IDS/IPS, DLP, sniffers, and malware analysis tools to investigate and mitigate potential threats across the network
  • Leverage Endpoint Detection and Response tools (365 Defender, Cortex) to detect malicious processes, lateral movement, and anomalous behavior within the network
  • Analyze network perimeter data, packet filtering, proxy firewalls, and IPS/IDS to implement strategic plans for enhancing network defense and hardening security posture
  • Monitor open-source and commercial threat intelligence feeds for IOCs, vulnerabilities, attacker TTPs, and emerging threats to stay ahead of potential risks
  • Perform incident response, security analysis, reverse engineering, abuse detection, and testing, with a focus on quickly identifying and mitigating security breaches
  • Manage virtual firewalls, access control lists, and network security zones to safeguard enterprise environments and ensure compliance with security policies
  • Perform an analysis of security incidents and threat actors utilizing the MITRE ATT&CK framework to enhance detection capabilities
  • Investigate and respond to security incidents reported by the Managed Security Service Provider (MSSP), security controls, and end users, while developing effective triage processes to ensure prompt and thorough incident handling
  • Assist in managing enterprise security infrastructure, including Intrusion
  • Author and maintain security event investigation reports, shift change reports, and regularly update case data in the Incident Response Management platform (ServiceNow)
  • Conduct risk assessments, lead threat analysis on APT groups, and develop remediation plans to address system vulnerabilities and refine security procedures
  • Utilize SIEM for documentation and baseline creation, leveraging logs from Windows/Linux endpoints to handle incident investigations and provide timely client support

SOC Analyst II

Dell Technologies
07.2018 - 02.2023
  • Conduct comprehensive analysis to identify and categorize threats, encompassing phishing attacks, user events, data compliance issues, and malware outbreaks
  • Perform in-depth investigations into large-scale cyber threats, employing a variety of analytical techniques and tools
  • Identify and communicate emerging threat patterns in a clear and understandable manner
  • Prepare detailed reports on advanced threats and cyber-attacks, offering insights and recommendations for remediation
  • Efficiently address and resolve service tickets within established timelines
  • Engage with customers and prospects through email correspondence and phone calls, providing expert guidance on our products' capabilities in threat detection and remediation
  • Cultivate expertise in our product suite and demonstrate its efficacy in threat mitigation to potential clients
  • Foster effective communication channels with team members, sharing critical information and insights
  • Contribute to the development and dissemination of best practices to enhance the quality, efficacy, and efficiency of our operational processes
  • Assist in the formulation and documentation of processes and standard operating procedures to streamline SOC operations

SOC Analyst

LOCALSTUFFS LLC
12.2016 - 05.2018
  • Monitored and analyzed security events using SIEM tools, identifying and responding to potential threats, while correlating data from firewalls, IPS/IDS, endpoints, and servers to detect true positives and false positives
  • Investigated and mitigated security incidents, providing detailed reports on findings, recommended actions, and assisting with incident response, containment, and remediation
  • Collaborated with cross-functional teams to develop, implement, and continuously improve security policies, procedures, and incident response playbooks
  • Analyzed network traffic and flow data to detect anomalies, malicious activity, and potential threats, ensuring prompt identification and mitigation of risks
  • Monitored emails for phishing and malware, capturing suspicious messages, analyzing attachments using tools like Symantec, and preventing data loss through active threat mitigation
  • Stayed up to date on emerging threats, vulnerabilities, and trends, and communicated relevant information to management for informed decision-making and optimized preventive measures
  • Identify vulnerabilities and work with teams to remediate issues, ensuring systems and networks remain secure
  • Conduct analysis of network traffic for abnormal activities
  • Support intelligence gathering and analysis to inform offensive and defensive cyber operations

Education

Bachelor of Science (B.S.) - Cyber Security

Thomas Edison State University
Trenton, NJ

Associate of Science - Science Technology

The Federal Polytechnic
Ekiti State, Nigeria
09.2006

Skills

    TECHNICAL SKILLS & TECHNOLOGIES

    SIEM &SOAR: Sentinel, Splunk, IBM QRadar, Cortex XDR

    Intrusion Detection Systems (IDS) / Intrusion Prevention Systems (IPS): Snort, Suricata, NetWitness, FireEye NX/HX, Bluecoat

    Endpoint Detection and Response (EDR): CrowdStrike, Carbon Black, Symantec, Defender Email Security: Symantec, Proofpoint, Metagrep, Defender

    Cloud Security: Microsoft Entra ID, Cloud App Security, Defender, ATP, AWS, GCP

    Vulnerability Management: Nessus, Qualys, Rapid7 Incident Response & Forensic Analysis

    Threat Intelligence: ThreatConnect, MISP, Open Source Intelligence (OSINT)

    Network Security: Firewalls, VPNs, Proxy Servers Operating Systems: Windows, Linux, macOS Programming/Scripting Languages: Python & PowerShell

Certification

  • CISSP, In progress
  • ISO 27001
  • CompTIA Security+
  • Splunk Power user
  • Microsoft Azure AZ 900 Certified
  • CompTIA CYSA+
  • CompTIA A+
  • CompTIA Network +

Timeline

Cybersecurity Analyst

FieldNation
03.2023 - Current

SOC Analyst II

Dell Technologies
07.2018 - 02.2023

SOC Analyst

LOCALSTUFFS LLC
12.2016 - 05.2018

Bachelor of Science (B.S.) - Cyber Security

Thomas Edison State University

Associate of Science - Science Technology

The Federal Polytechnic
OLUWASEUN JOSEPH ADEDEJI