Summary
Overview
Work History
Education
Skills
Affiliations
Timeline
Certification
Work Preference
Work Availability
Open To Work
Hi, I’m

VICTOR AWOBAYIKU

Cybersecurity Architect
Marlborough,MA
VICTOR  AWOBAYIKU

Summary

Dedicated architect with several years of experience leading and collaborating with professional on extensive technical designs. Presents in-depth technological knowledge to satisfy up-to-date guidelines for project roadmapping, launch and provisioning. Resourceful expertise bolstering organization's it deployment performance. Organized approach to balancing project-management tasks.

Overview

15
years of professional experience
14
Certificate

Work History

Bell Techlogix
Westborough, MA

Cybersecurity Architect
02.2017 - Current

Job overview

  • I verified the architecture project roll-outs' compliance with security standards.
  • Assisting senior leadership in developing security policies, standards, and strategies.
  • Developed and integrated robust systems tailored to support corporate cybersecurity frameworks.
  • Experience with and understanding of compiled and interpreted programs, and the types of security issues possible in each; database systems, web servers, application servers, firewalls, routers, load balancers, switches, and different types of middleware.
  • Redesigned and deployed Palo Alto firewalls, ensuring PCI compliance, and enhancing network security.
  • Responsible for overall firewall configuration implementations and policy installations across all platforms during maintenance windows, including Juniper, Check Point, and Fortinet, for the major enterprise network.
  • Experience in solution design principles, practices, system development methodologies, and software life cycles, with experience in a combination of system and application architecture.
  • Performed regular maintenance of firewalls to ensure optimal performance.
  • SIEM Proficiency: Hands-on experience with a SIEM solution for alerting, monitoring, and investigative analysis.
  • Incident Response: Demonstrated ability to manage and respond to complex cybersecurity incidents. Networking: Strong understanding of TCP/IP, firewalls, VPNs, IDS/IPS, and common attack vectors.
  • Malware Analysis: A basic understanding of malware behavior and analysis techniques.
  • The ability to perform thorough investigative analysis of potentially compromised assets in a forensically sound manner.
  • Familiarity with investigative analysis and incident response, as they pertain to cloud environments, and hands-on experience with SOAR tools to automate incident response processes.
  • Experience working with threat intelligence platforms and feeds.
  • Experience in threat-hunting methodologies.
  • Familiarity with MITRE ATT&CK and other threat models.
  • Familiar with DLP toolsets and best practices from an incident response perspective.
  • Leveraging Cisco Technologies and Cloud Technologies for System protection.

Integrated Systems And Devices Ltd (ISDL)
, LA

Cybersecurity Architect
08.2010 - 02.2017

Job overview

  • Resolved system malfunctions through remote assistance or onsite analysis, ensuring minimal downtime.
  • Coordinated implementation of updated computer programs and systems to streamline operations.
  • Expanded systems with new features and structural components.
  • Maintained quality-focused performance benchmarks and schedules when directing project teams.
  • Created and implemented new troubleshooting processes, improving efficiency, customer satisfaction, and reducing costs.
  • Provided technical support to end users on a variety of computer software and hardware issues.
  • Assisted with network infrastructure design and implementation.
  • Performed troubleshooting to diagnose and resolve complex technical problems.
  • Managed daily backup processes for all servers using enterprise-level backup and recovery software solutions.
  • Resolved escalated customer service requests as needed, in order to ensure a successful resolution of customer complaints.
  • Utilized ticketing systems to track the status of help desk tickets throughout the resolution process.
  • Developed scripts to automate routine tasks related to system maintenance.
  • Configured routers and switches according to organizational specifications.
  • In the design and implementation of a secure infrastructure on major cloud platform providers, I have sound knowledge of cloud security controls, cloud security best practices, and industry security requirements.
  • In-depth knowledge of Identity and Access Management Systems and DevSecOps.
  • Monitoring and maintenance, security management, troubleshooting, documentation, and making sure compliances are up to date.
  • Managed IT/OT segmentation firewalls to enhance network security.
  • Optimized security measures for firewalls, routers, load balancers, and software infrastructures.
  • Deployed redesigned Palo Alto firewalls to boost network security and meet PCI compliance standards.
  • Optimized enterprise network protection through precise installation of security policies across diverse platforms.
  • Experienced in combining system and application architecture.
  • Performed regular maintenance of firewalls to ensure optimal performance.
  • Utilized Splunk to efficiently correlate various events.
  • Demonstrated expertise in leveraging SIEM solutions for effective alerting and monitoring.
  • Utilized expert knowledge in TCP/IP protocols, firewalls, VPNs, and intrusion detection/prevention systems to enhance network defenses.
  • Acquired basic skills in analyzing malicious software.
  • Conducted comprehensive investigative analysis of potentially compromised assets in a forensically sound manner.
  • Familiarity with investigative analysis and incident response, as they pertain to cloud environments, and hands-on experience with SOAR tools to automate incident response processes.
  • Experience working with threat intelligence platforms and feeds.
  • Experience in threat-hunting methodologies.
  • Developed expertise in understanding and applying threat analysis frameworks.
  • Developed proficiency in utilizing DLP solutions effectively for incident management.
  • Contributes to the development and execution of security plans and product security specifications.
  • Conducts vulnerability scans on software under the guidance of lead engineers to identify potential security issues before product release.
  • Aided in risk management activities related to cybersecurity.
  • Participates in design and code reviews to identify potential security vulnerabilities, making appropriate recommendations.
  • Facilitates preliminary security assessments and tests for new software-based product developments.
  • Integrated security measures into all product-related infrastructures.
  • Collaborates in the creation of product security documents for customers with MDS2 forms as part of the task.
  • Handled escalated security issues related to products within the engineering department.
  • Enhanced team's understanding of important security issues.
  • Assists in maintaining and updating facility-level procedures and work instructions for the cybersecurity program.
  • Contributed to mitigating lower-tier cybersecurity threats effectively.

Education

YABA COLLEGE OF TECHNOLOGY
LA

Bachelor of Science from Electrical, Electronics And Communications Engineering
05-2010

University Overview

Skills

  • Proficiency in cybersecurity frameworks and standards
  • Penetration testing
  • Secure Development Lifecycle (SDL)
  • Software Development LifeCycle (SDLC)
  • Firewall management
  • Incident response
  • Threat intelligence & Threat Modelling
  • Disaster recovery
  • Information security policies
  • Identity Management
  • Compliance monitoring
  • Cloud security
  • Cybersecurity frameworks
  • Data loss prevention
  • Vulnerability assessment
  • Excellent communication skills, capable of conveying complex security topics to technical and non-technical audiences
  • Ability to work both independently and as part of a team in high-pressure situations, a growth mindset oriented towards positivity, personal accountability, and excellence
  • Strong analytical and critical-thinking skills
  • Database security
  • Operating system security

Affiliations

Affiliations
  • Exploring new adventures
  • Travelling
  • Playing the Piano at free period or playing Computer Games
  • Reading

Timeline

Cybersecurity Architect
Bell Techlogix
02.2017 - Current
Cybersecurity Architect
Integrated Systems And Devices Ltd (ISDL)
08.2010 - 02.2017
YABA COLLEGE OF TECHNOLOGY
Bachelor of Science from Electrical, Electronics And Communications Engineering

Certification

  • University of Maryland (College Park): CyberSecurity For Everyone
  • Cybersecurity Architecture (IBM Certification)
  • Cybersecurity Assessment: CompTIA Security+ & CYSA+ (IBM Certification)
  • Introduction to Cybersecurity Tools & Cyberattacks
  • CISSP (Certified Information Systems Security Professional)
  • Cybersecurity Fundamentals (IBM)
  • Cybersecurity Essentials ( WITH HONORS) IBM
  • Cybfun.1.0:Cybersecurity Analyst

Work Preference

Work Type

Full Time

Location Preference

On-SiteHybridRemote
Availability
See my work availability
Not Available
Available
monday
tuesday
wednesday
thursday
friday
saturday
sunday
morning
afternoon
evening
swipe to browse
VICTOR AWOBAYIKUCybersecurity Architect