Versatile IT professional with a comprehensive background in DevSecOps, DevOps, and Cloud Security, combining hands-on experience in AWS and GCP. Proven ability to integrate security seamlessly into development and operational processes, optimizing cloud infrastructure for efficiency and resilience. Adept at driving automation initiatives and fostering a culture of security awareness. Orchestrated the implementation of DevSecOps practices for over 7 years, seamlessly embedding security into the CI/CD lifecycle. Automated vulnerability assessments, compliance checks, and threat detection, resulting in a robust and secure development pipeline.
Overview
10
10
years of professional experience
Work History
DEVSECOPS/APPLICATION SECURITY ENGINEER
KUNAI CONSULTING
07.2022 - Current
Company Overview: Experience with DevOps/DevSecOps methodologies and processes
Knowledge and experience with network protocols, network technologies, and identity management principles
Work with developers to improve the security of our products and services
Able to configure and manage Web application scanning and static code analysis tools
Implemented white source vulnerability scan for vulnerabilities in our CICD
Clean up white source security vulnerabilities reported in most of our repositories
Partnered with teammate to check for startup time analysis for our operating systems to prepare for a possible migration to amazon Linux
Develop technical solutions to address security weaknesses and work with stakeholders to implement them
Own application security review as well as security guidance documentations
Assist with security incident response as needed
Implemented a production-ready, load-balanced, highly available, secure, and fault-tolerant
Added some parameters in our codes to capture data from our pipelines for company decision making purposes
Thorough understanding of Web application security concepts, principles, and guidelines, such as OWASP
Created troubleshooting guides for one pipeline support to assist customers facing challenges with one pipeline
Ability to configure and maintain Web application firewalls and WAF security policies
Supported customers in troubleshooting Ace issues
Build systems at scale to prevent classes of vulnerabilities
Built and managed dev and testing environments, assisting developers in Debugging an application
Issues on containers monitored and troubleshot failed builds in various pipelines
Architected and configured Dev/Stage/QA environments in AWS (VPC, subnets, security groups)
Evaluated existing security architecture and protocols for risk of vulnerability and recommended improved tools and protocols to management
Assisted with developing training materials to cover organizational policies, procedures, tools, and monitoring requirements
Reviewed security audits to bring awareness to security problems and issues
Identified opportunities to improve network, application, and cloud security through implementation of secure frameworks
Made recommendations to improve security procedures and systems
Evaluated firewalls and monitored threats to establish secure cloud environments
Selected appropriate AWS service based on computer, data, or security requirements
Collaborated with architects and engineers to design networks, systems and storage environments that reflected business needs, security specifications and service level requirements
Directed vulnerability assessments or analysis of information security systems
Provided technical support related to security product installation and use
Maintained documentation of security and disaster recovery policies and procedures
Evaluated performance indicators to assess security control quality
Configured computing, networking, and security systems within cloud environment
Performed best practices by creating systems with fast load times, multiple browser support and minimal memory usage
Organized and carried out cyber security awareness training and tabletop exercises
Experience with DevOps/DevSecOps methodologies and processes
Knowledge and experience with network protocols, network technologies, and identity management principles
Designed and implemented highly available, scalable, and secure AWS Infrastructures using IAAC tools such as Terraform/CloudFormation
Use AWS direct connect to connect client on-premises to AWS datacenter
Wrote custom Lambda functions to enable automation in environment
Implemented Security best practices in AWS, including multi factor authentication, access key rotation, role-based permissions, enforced strong password policy, configuration
Architected and configured Dev/Stage/QA environments in AWS (VPC, Subnets, Security groups, EC2 instances, load balancer, RDS, Redis, Route 53)
Migrating on-premises based workloads into Cloud infrastructure
Designed for high availability and business continuity using self-healing-based architectures, fail over routing Policies, multi–AZ Deployment of EC2 Instances, ELB health checks, Auto Scaling, and other disaster recovery Models, this improved speed by up to 35% and Lowered cost and enhanced reliability by 40%
Implemented AWS Systems manager management service Capabilities to automatically collect Software Inventory, apply OS patches and automate Administration Tasks, and complex workflows across our environments
Configured S3 events to set up automated communication Between S3 and Other AWS Services, this enhanced security by 60% through data encryption and supported the transfer of data on SSL
Configures Cloud watch alarm rules for Operational and Performance Metrics for our AWS Resources and Applications, this improved Operational Performance by up to 60%, and made it easier for us to observe a single platform across multiple applications and infrastructures
Setup and configured logs files for detailed monitoring and alerts notifications when changes are made
Built high performing, resilient, and efficient infrastructure for customer applications and performed reviews for architecture and infra builds
AWS SOLUTIONS ARCHITECT
ALLIED HEALTH DC
07.2016 - 05.2017
Design tasks related to the development of enterprise's solutions architecture
Direct identification and recommendation of appropriate solutions, upgrades, replacements, or decommissioning options incorporating business and technology productivity, usability, and TCO
Establish and stimulate software development standards and processes along with best practices to deliver scalable and high-quality software
Provide necessary leadership, analysis, and consulting support
Developed baseline VPC and Network design including leveraging VPN connectivity and Direct Connect
Authored development guidelines to expedite application design efforts through ready-made frameworks
Analyze organization's IT environment to detect critical deficiencies and recommend solutions for improvement
Mentored team, sharing skills and expertise and encouraged each member to bring forward ideas and suggestions for improvement
Provide analysis of security protection technologies as necessary
Work closely with Information Technology professionals in the company to ensure hardware is available for projects and working properly
Provide supervision and guidance to development teams
Assures solutions not only are fit for specific purpose but also closely align with standards guidelines of technology solutions
Work closely with project management teams to successfully monitor progress of initiatives
Continually research current and emerging technologies and propose changes where needed
SOC ANALYST
CITI BANK
01.2015 - 06.2016
Consistently monitoring and working on alerts generating on Splunk
Creating Splunk dashboards to capture all customized logs generated by systems and applications
Assisting in creating new use cases and performing SOC testing
Cybersecurity threat hunt
Used OWASP ZAP to can our web applications
Cybersecurity management and policy creation
Creating and updating SOC run books as required
User FireEye to fully integrated malware protection with antivirus (AV) defenses, machine learning, behavior analysis, indicators of compromise (IOCs) and endpoint visibility
Also use FireEye to single integrated workflow to analyze and respond to threats within Endpoint Security
Investigating attachments and links for imbedded malware using Veritas, FireEye ETP, and IronPort
Giving client recommendations on how to securely resolve escalated issues
Training new employees on how to handle investigations and safely deal with phishing emails
Developing follow-up action plans to resolve reportable issues and communicating with other IT teams
To address security threats and incidents accordingly
Supporting Incident Response till resolution following Standard Operation
Skills
AWS
GCP
Azure
Linux
Windows
MacOS
AWS Organization
AWS IAM
AWS AD Connector
Active Directory
AWS Workspaces
AWS Secrets Manager
AWS SSO
Azure AD
Jump Cloud
Duo
Mimecast
Abnormal
OWASP ZAP
Qualys
SonarQube
Vulnerability assessment
Identity and Access management
Web application security
Container security
Intrusion detection
Security automation
Dynamic code analysis
Security training
Malware analysis
Cloud security
Application risk assessment
Verbal and written communication
Checkmarx
Fossa
42Crunch
Burp Suite
Logic Monitor
Styra
Flare
Cloudstrike
Vulnerability Management
Splunk
Rapid7
Exabeam
Vanta
Arctic Wolf
KnowBe4
Sentinel One
Data Lake
Noble9
CI/CD
IAC
Package management
Confluence
Docker
Kubernetes
VPC
Subnets
SGs
TGW
VGW
NGW
IGW
AWS WAF
Jira
ServiceNow
SysAid
Security Hub
AWS Guard Duty
AWS Shield
AWS Firewall
KMS
Manager
AWS Inspector
AWS Certificate Manager
AWS KMS
Snapshot Lifecycle Manager
AWS Cloud HSM
Educationcertification
Associate of Science, Applied Science, Southeastern Community College, West Burlington, IA, 05/2021
Bachelor of Science, Computer Science, Buea University, Buea-Cameroon, 09/2014