Bringing over 14 years of experience in IT/OT services, controls, standards, and compliance, expertise in cybersecurity analysis and audit is offered. Specialization in enterprise security and risk assessments provides strategic guidance for business evaluations and performance enhancement. Proficiency in designing cost-effective audit procedures and internal controls ensures regulatory compliance and mitigates financial risks. Recognized for sound judgment and interpretation of policies, excellence is demonstrated in both collaborative and independent work environments. Skills facilitate sustainable growth, ROI enhancement, and fraud prevention for employers and clients.
Overview
16
16
years of professional experience
1
1
Certification
Work History
Audit Manager
Kanshe Infotech
01.2019 - 03.2024
Improved audit efficiency: Implemented new auditing software and streamlined processes, resulting in 20% increase in productivity,30% reduction in audit completion time.
Conducted thorough financial analysis: Resulted in a significant 25% reduction in financial discrepancies, achieved 15% improvement in financial accuracy.
Successfully managed auditors: Ensured accuracy and timely completion of audit projects resulted in 40% increase in team performance. Achieved 20% improvement in project outcomes.
Implemented risk-based auditing strategies:
Resulted in 35% increase in identification of potential issues.
Achieved 25% improvement in audit outcomes.
Utilized advanced analytical techniques: Identified trends and anomalies in financial data. Enabled proactive risk mitigation and fraud prevention measures. Resulted in 50% reduction in fraudulent activities and financial losses.
IT Security Analyst
Milestone Consultancy Ltd.
12.2015 - 12.2018
Conducted threat, attack, and vulnerability assessments using Qradar, Nessus, Tripwire, and Wireshark, identifying and addressing over 100 system weaknesses.
Detected system weaknesses and provided solutions for remediation, resulting in 30% reduction in cybersecurity vulnerabilities.
Designed system configurations and controls to strengthen cybersecurity defenses, leading to 25% decrease in successful cyber attacks.
Advised on optimal operating systems including Linux, Windows, Android, and Apple IOS, enhancing system security and compatibility.
Utilized technology-based tools like AWS IAM, IBM IAM, RSA Archer (GRC), and SailPoint for data analysis and access control, improving data security and compliance.
Implemented AD wireless security settings and public key infrastructure for enhanced security, reducing unauthorized access incidents by 40%.
Introduced web filtering techniques using firewalls and access control lists for efficiency, resulting in 50% reduction in malicious website access.
Ensured compliance with information security frameworks and standards such as ISO, COBIT, and NIST, reducing IT security risks by 30% and preventing malware incidents by 25%.
Secretary General
Association of Nigerian Community
04.2010 - 04.2016
Fostered organizational cohesion and promoted effectiveness in advancing harmonious socioeconomic relations with host nation.
Orchestrated regular meetings using systematic appraisal methodologies to ensure transparent governance and hierarchical coherence within community.
Maintained comprehensive records by meticulously recording minutes of general and executive emergency meetings to preserve community documentation.
Engaged in communication with Embassy and Consulates in China to address Nigerian welfare, proposing strategies for improving their conditions through periodic consultations with Chinese authorities to oversee statutory immigration incidents and controls, ensuring balanced approach.
IT Audit
National Ethics and Value Compliance Organization
05.2010 - 05.2015
Worked collaboratively with external auditors and HR department as required to ensure alignment and compliance with organizational standards.
Conducted audits of control configurations on UNIX and Linux operating systems and servers to ensure adherence to established protocols.
Utilized VMware technology to effectively manage organization's virtualized server environment, optimizing operational efficiency.
Contributed to ITGC Audits, focusing on access control management, password settings, access request and approval processes, and ongoing monitoring for compliance.
layed a pivotal role in the implementation and maintenance of wireless network environments, disaster recovery protocols, business continuity planning, and industry best practices, contributing to the successful deployment and management of over 50 wireless networks and ensuring adherence to disaster recovery protocols and business continuity plans.
Evaluated various aspects of access control, change management control, IT operations control, and IT application controls to identify areas for improvement and ensure regulatory compliance.
Implemented segregation of duties and access-based job functionalities to enhance security and operational integrity within the organization.
Set plans to manage crisis or compliance violation.
Cybersecurity Specialist
Hong Wealth and Investment Limited
01.2008 - 02.2010
Proficient in designing firewalls, monitoring data file usage, and ensuring network security against attacks.
Skilled in planning, developing, and executing vulnerability and policy compliance assessments.
Configured enterprise vulnerability assessment tools, conducted internal and external scans, analyzed detected vulnerabilities, and eliminated false positives through manual validation.
Assessed compliance processes using NIST 800-53, FIPPS 199/NIST SP 800-60 frameworks.
Configured, installed, and tested security measures including SSL visibility and network/data aggregation devices.
Step by step follow up on reviews about security plan, contingency plan, business impact analysis, plan of action, risk assessment and management in the entire FISMA, RMF, SA, and system control
Recognizing controls needed to meet stakeholders need.
Education
Bachelor of Science - International Relations
Aston University
Birmingham, United Kingdom
08.2009
Skills
Multilingual proficiency in French and Chinese languages
Expertise in process mapping and internal controls
Proficiency in investment management and performance improvement
Strong analytical, problem-solving, and critical thinking abilities
Effective communication with coaching and leadership skills
Proactive with exceptional organizational and time management skills
Adaptability to new environments and eagerness for continuous learning
Experience in audit management, corrective action implementation, and project management with focus on value-added control recommendations
Demonstrates coaching, leadership and project management skills
Performance Improvement
Audit management
Corrective Action Implementation
Demonstrates coaching, leadership and project management skills
Performance Improvement
Audit management
Corrective Action Implementation
Certification
CompTIA Sec+
Project Management Essentials
IT SOX
AWS Associate Developer
Certified Ethics Associate (CEA)
Certified Team Supervisor (CTS)
Scrum Master
Splunk 7.X Fundamentals
Certified Information System Auditor (CISA)
Additional Information
Experience in designing of firewalls, monitoring use of data file, staying up-to-date on current virus reports and protecting networks from attacks. Experience in planning, developing and executing vulnerability and policy compliance assessments. Configured enterprise vulnerability assessment tools, performed internal and external scans, analyzed detected vulnerabilities, identified the relevant threats and eliminated every false positive through manual validation. Assessment of compliance processes using NIST 500-53A, FIPPS 199/NIST SP 800-60. Configure, install and test security including SSL visibility and network/data aggregation devices. Step by step follow up on reviews about security plan, contingency plan, business impact analysis, plan of action, risk assessment and management in the entire FISMA, RMF, SA, and system control. Recognizing controls needed to meet stakeholders need.
Summary Qualifications
Perform IT SOX compliance testing
Cybersecurity Control TestingAccess Control
Vulnerability Management
Firewall Configuration
Disaster Recovery Planning
Cryptography and PKI
Data Security
PCI DSS
Professional Organization
Board Member-NEVACO, Nigeria
Member- ISACA, Houston Chapter
Member-Society of Corporate Compliance and Ethics
Non Professional Organization
Chairman - Nigeria's Christians and Muslims for Peace Foundation (CHAMUS)
Director - Diaspora Nigerians in South East Asia (DNSEA)
Ass. Diaspora CoordinatorStakeholders Consensus Forum (SCF)
Secretary - Nigerian Chinese Family Forum (NCFF)
Member - Association of Nigerian Community in China (ANCC)