Summary
Overview
Work History
Education
Skills
Certification
Timeline
Generic

Richard Ajayi

Summary

Highly skilled Cybersecurity Engineer with comprehensive understanding of network architectures, security protocols, and risk assessment methodologies. Proven strengths include vulnerability analysis, threat mitigation and cyber incident response. Demonstrated impact in previous roles includes successful implementation of sophisticated security solutions to safeguard company data and infrastructure.

Overview

3
3
years of professional experience
1
1
Certification

Work History

Cybersecurity Engineer

Vertical Relevance
Newark, NJ
02.2022 - Current
  • Trained personnel on proper use of data encryption techniques.
  • Provided technical support related to security product installation and use.
  • Reviewed system logs and monitored network traffic for suspicious activity.
  • Evaluated performance indicators to assess security control quality.
  • Responded quickly to any alerts generated by the organization's cybersecurity systems.
  • Created reports on the status of the organization's security posture.
  • Contributed to task list for maintaining network security across workstations, servers and peripherals.
  • Maintained documentation of security and disaster recovery policies and procedures.
  • Configured antivirus software programs for maximum protection against malware.
  • Planned, engineered, and supported data center technology to provide protected and safe data storage.
  • Evaluated user access privileges according to company security protocols.
  • Provided technical advice on security best practices and procedures.
  • Deployed endpoint protection tools such as anti-malware software.
  • Collaborated with IT teams to develop secure configurations for operating systems, applications, and hardware devices.
  • Coordinated with vendors to evaluate products related to cybersecurity solutions.
  • Performed system maintenance by handling security verifications of systems and processes.
  • Assisted in developing policies and procedures related to information security management.
  • Performed regular penetration tests to identify weaknesses in the system.
  • Identified potential cyber threats and assessed risk levels of new technologies.
  • Conducted security vulnerability scans and identified areas for improvement.
  • Investigated security breaches or incidents and developed remediation strategies.
  • Directed vulnerability assessments or analysis of information security systems.
  • Researched emerging threats using threat intelligence sources.
  • Implemented software tools to assist in threat detection, prevention and analysis.
  • Monitored systems for indications of threats, security breaches or intrusions.
  • Developed incident response plans to ensure compliance with industry standards.
  • Safeguarded data through installation of firewalls and data encryption programs.
  • Implemented firewalls, intrusion detection systems, and other security measures.
  • Ensured data privacy regulations are met through periodic auditing processes.
  • Conducted penetration tests to uncover security system weaknesses.
  • Directed risk assessment operations and system test execution.
  • Investigated information security breaches to identify vulnerabilities and evaluate damage.

Education

Mechanical Engineering

Texas A&M University
College Station, TX
12-2016

Skills

  • Data encryption
  • System monitoring
  • Incident response
  • Risk assessment
  • Vulnerability testing
  • Firewall implementation

Certification

  • AWS Certified Security Engineer

Timeline

Cybersecurity Engineer

Vertical Relevance
02.2022 - Current

Mechanical Engineering

Texas A&M University
Richard Ajayi