Summary
Overview
Work History
Education
Skills
Certification
Timeline
Generic

Raymond Egbusinwa

Newark,New York

Summary

Highly-motivated employee with desire to take on new challenges. Strong worth ethic, adaptability and exceptional interpersonal skills. Adept at working effectively unsupervised and quickly mastering new skills.

Overview

9
9
years of professional experience
1
1
Certification

Work History

Cybersecurity Analyst

COLLEBRA INC,
, New Jersey
11.2020 - Current
  • Responded promptly to cyber incidents by analyzing attack signatures, isolating affected systems, and restoring normal operations.
  • Monitored user activities on the network for suspicious behavior or malicious activity.
  • Analyzed network traffic logs, firewall logs, intrusion detection system alerts, and antivirus reports to identify potential threats.
  • Conducted vulnerability scans using automated tools to detect any weaknesses in the system.
  • Implemented firewalls and other security measures to protect data from external threats.
  • Provided technical support for troubleshooting issues related to security systems and networks.
  • Assisted with developing strategies for responding to potential cyber attacks such as malware outbreaks, phishing campaigns, ransomware attacks.
  • Performed regular system audits of all network resources to ensure compliance with corporate security policies.
  • Created detailed incident reports following a successful breach or other security event.
  • Participated in risk assessment exercises designed to identify areas of vulnerability within the organization's IT infrastructure.
  • Investigated suspected intrusions or breaches into the company's computer networks and systems.
  • Reviewed audit logs daily for unusual activity or patterns that could indicate an attempted breach or attack.
  • Updated existing processes and procedures related to cybersecurity best practices regularly.
  • Maintained up-to-date knowledge of evolving cybersecurity trends and technologies.
  • Installed patches and upgrades on a regular basis as part of ongoing maintenance efforts.
  • Configured systems with encryption software to secure sensitive data against unauthorized access.
  • Provided training on various topics related to cybersecurity awareness and best practices.
  • Analyzed system risk to identify and implement appropriate security countermeasures.
  • Assisted with creating disaster recovery plans in case of a major security incident.
  • Updated virus protection systems based on computer virus reports.
  • Monitored server event logs to identify and resolve performance and security issues.
  • Managed user authentication and authorization of data access.
  • Generated reports using statistical software in response to user requests.
  • Duplicated and backed up data to preserve availability and security in event of data breach.
  • Created and implemented Active Directory group policy settings to manage workstations.
  • Built firewalls and encrypted data to secure confidential information.
  • Alleviated leakage of company proprietary data to unauthorized resources and analyzed past performance data to enhance operations.
  • Made recommendations to improve security procedures and systems.
  • Researched, planned and implemented small- and large-scale improvements to address changing conditions and needs.
  • Analyzed security procedure violations and developed plans to prevent recurrence.
  • Promoted security awareness among employees and clients to alleviate risks and breaches.
  • Updated computer security policies and procedures upon learning of new risks.
  • Used penetration testing tools to identify weaknesses in security systems.
  • Designed, implemented and maintained security systems and controls.
  • Investigated information security breaches to identify vulnerabilities and evaluate damage.
  • Worked closely with fellow security personnel to remedy and alleviate technology issues.
  • Coordinated security updates to avoid outages and downtime.

Cybersecurity Analyst

BANK OF NEW YORK MELLON
, NY
06.2015 - 10.2020
  • Developed and implemented security policies and procedures to protect the company's assets from unauthorized access.
  • Analyzed network traffic logs, firewall logs, intrusion detection system alerts, and antivirus reports to identify potential threats.
  • Monitored user activities on the network for suspicious behavior or malicious activity.
  • Implemented firewalls and other security measures to protect data from external threats.
  • Assisted with developing strategies for responding to potential cyber attacks such as malware outbreaks, phishing campaigns, ransomware attacks.
  • Responded promptly to cyber incidents by analyzing attack signatures, isolating affected systems, and restoring normal operations.
  • Conducted vulnerability scans using automated tools to detect any weaknesses in the system.
  • Provided technical support for troubleshooting issues related to security systems and networks.
  • Created detailed incident reports following a successful breach or other security event.
  • Reviewed audit logs daily for unusual activity or patterns that could indicate an attempted breach or attack.
  • Participated in risk assessment exercises designed to identify areas of vulnerability within the organization's IT infrastructure.
  • Investigated suspected intrusions or breaches into the company's computer networks and systems.
  • Configured systems with encryption software to secure sensitive data against unauthorized access.
  • Provided training on various topics related to cybersecurity awareness and best practices.
  • Maintained up-to-date knowledge of evolving cybersecurity trends and technologies.
  • Installed patches and upgrades on a regular basis as part of ongoing maintenance efforts.
  • Assisted with creating disaster recovery plans in case of a major security incident.
  • Analyzed system risk to identify and implement appropriate security countermeasures.
  • Updated virus protection systems based on computer virus reports.
  • Protected secure data files and regulated access.
  • Monitored server event logs to identify and resolve performance and security issues.
  • Supported users with in-person and remote technical assistance.
  • Provided training and support to users for both hardware and software needs.
  • Managed user authentication and authorization of data access.
  • Duplicated and backed up data to preserve availability and security in event of data breach.
  • Generated reports using statistical software in response to user requests.
  • Designed and implemented plans to secure computer files against breach, destruction or accidental modification.
  • Created and implemented Active Directory group policy settings to manage workstations.
  • Built firewalls and encrypted data to secure confidential information.
  • Researched, planned and implemented small- and large-scale improvements to address changing conditions and needs.
  • Alleviated leakage of company proprietary data to unauthorized resources and analyzed past performance data to enhance operations.
  • Made recommendations to improve security procedures and systems.
  • Promoted security awareness among employees and clients to alleviate risks and breaches.
  • Analyzed security procedure violations and developed plans to prevent recurrence.
  • Updated computer security policies and procedures upon learning of new risks.
  • Learned about latest security threats from blogs and online publications.
  • Used penetration testing tools to identify weaknesses in security systems.
  • Collaborated with stakeholders to implement and update disaster recovery plans.
  • Designed, implemented and maintained security systems and controls.
  • Coordinated security updates to avoid outages and downtime.
  • Worked closely with fellow security personnel to remedy and alleviate technology issues.
  • Reviewed security bulletins and vulnerability patch releases.
  • Conducted record searches and coordinated with other units on procedural problems involving complex cases.

Cyber Security Specialist

American Income Life
, NY
10.2014 - 10.2020
  • Conducted risk assessments of existing information systems.
  • Performed regular system scans to detect potential cyber-attacks and intrusions.
  • Monitored network traffic for malicious or unauthorized activity.
  • Developed and implemented security protocols to protect corporate networks and systems.
  • Created detailed reports on current security threats and vulnerabilities.
  • Assisted in the development of incident response plans, procedures, and policies.
  • Identified and addressed security gaps in existing applications and services.
  • Provided technical advice on cyber defense strategies, tools, and technologies.
  • Researched emerging trends in cybersecurity threats, risks, and countermeasures.
  • Collaborated with IT teams to ensure data integrity across multiple platforms.
  • Implemented software patches to address identified system vulnerabilities.
  • Configured firewalls to protect against external attacks and malware infections.
  • Documented processes for responding to cyber threats in accordance with industry standards.
  • Evaluated the effectiveness of existing security infrastructure by running penetration tests.
  • Tracked reported incidents using ticketing systems for further investigation.
  • Coordinated with remote IT personnel to resolve any issues related to network security.
  • Investigated new methods of authentication such as biometrics or two-factor authentication.
  • Participated in threat intelligence sharing initiatives with other organizations.
  • Developed comprehensive training programs on best practices for data protection.
  • Analyzed system risk to identify and implement appropriate security countermeasures.
  • Ensured compliance with all applicable laws regarding data privacy and security.
  • Audited networks and security systems to identify vulnerabilities.
  • Built firewalls and encrypted data to secure confidential information.
  • Worked closely with fellow security personnel to remedy and alleviate technology issues.
  • Learned about latest security threats from blogs and online publications.
  • Analyzed security procedure violations and developed plans to prevent recurrence.
  • Promoted security awareness among employees and clients to alleviate risks and breaches.
  • Investigated information security breaches to identify vulnerabilities and evaluate damage.
  • Made recommendations to improve security procedures and systems.
  • Educated individuals on complex computer terms using easy-to-understand wording.
  • Reviewed security bulletins and vulnerability patch releases.
  • Designed, implemented and maintained security systems and controls.
  • Designed and implemented plans to secure computer files against breach, destruction or accidental modification.

Education

Bachelor of Arts - Information Technology

University of Benin
Nigeria
05-2000

Skills

  • Cybersecurity
  • Vulnerability Assessment
  • Network Security Management
  • Network Support
  • Security Regulations Compliance
  • Managing Security Breaches
  • Developing Security Plans
  • Information Security Policy Design
  • It Security
  • System Installation And Configuration
  • Incident Response Management
  • Threat Management
  • Security Evaluation
  • Security Vulnerability Assessment
  • Risk Analysis & Mitigation

Certification

  • Comptia security Plus

Timeline

Cybersecurity Analyst

COLLEBRA INC,
11.2020 - Current

Cybersecurity Analyst

BANK OF NEW YORK MELLON
06.2015 - 10.2020

Cyber Security Specialist

American Income Life
10.2014 - 10.2020

Bachelor of Arts - Information Technology

University of Benin
Raymond Egbusinwa