Brampton Ontario, Canada
Phone: xxx-xxx-xxxx
Email: xxx@xxxx.xxx
Looking For: system architect, IT GRC
Occupation: IT and Math
Degree: Bachelor's Degree
Career Level: Fully Competent
Languages: English
Highlights:
Skills:soft skill, communication skill, technical, Security, cyber security
IT Security Analyst 09/2021 - current
NTTDATA, HALIFAX, Outside U.S Canada
Industry: IT Consulting
Maintain and update security architecture, policies, procedures and standards that enable the enterprise architecture roadmaps to exceed customer’s security and privacy expectations
• Provides advice, counsel and support on information security matters and recommends solutions to business leaders on principles, frameworks, programs, approaches, trends, legislation and regulatory requirements including interpretation of policy and identification and management of risk.
• Implement and adhere to OWASP guidelines and best practices throughout the software development lifecycle.
• Conduct risk assessments as per requirements within industry leading standards and frameworks (such as NIST CSF), identify gaps and assist in coordination of activities among other information security functions to resolve the gaps.
• Use analytical thinking and problem-solving skills to gain greater efficiencies in the Security Operations processes and procedures or other business processes to impact the SOC team.
• Assist in conducting risk assessments to evaluate the effectiveness of existing controls and determine the impact of proposed changes to business processes, applications and systems.
• Reviewing documented architectural patterns and all other key artifacts for implementing security controls for solutions hosted in the multi-cloud and on-premises platforms and those that support the cyber security program.
• Ensure stakeholder security requirements to protect the client mission and business processes are adequately addressed in all aspects of the enterprise cyber security architecture such as reference models, segments, solution architecture and the resulting systems supporting the business processes and mission while delivering stakeholders across the enterprise to deliver security work program objectives.--
IT Infrastructure Analyst 02/2017 - 07/2021
IBM Canada, Edmonton, Alberta Canada
Industry: IT
Threat hunt across thousands of customer environments, identifying threats and observables and contribute to content management and threat intelligence activities.
• Implement and monitor Identity and Access Management (IAM) technologies such as CyberArk and other platforms to ensure control effectiveness in accordance with applicable policies, standards and procedures.
• Utilize Nessus Vulnerability Management solutions to conduct system and web application vulnerability assessment, testing and interpreting the results utilizing CVE scoring tool.
• Document and communicate findings, including detailed reports on vulnerabilities, exploitation methods, and recommended remediation steps.
• Broad and deep knowledge of various Cisco products and solutions, including Firewalls, email content and Spam filtering (CES), Web filtering (Cisco Umbrella), secure remote access solutions (VPN, SSO & MFA), end-point patch management, DMZs, anti-virus, pen tests and vulnerability assessments and securing O365 internally and externally.
• Dig into newly identified malware or vulnerabilities to provide customers with the appropriate details to remediate and leverage the knowledge gained for future automation.
• Provide guidance in the design and support technology partners as they deliver security solutions in the cloud: Azure, AWS or GCP.
• Effectively communicate and collaborate with a global team and across multiple departments to identify improvements to the customer experience and to maximize operational efficiencies.
• Conduct vulnerability assessment activities to understand security posture deficiencies and ensure remedial action and mitigation measures are implemented.--
IT Analyst 11/2015 - 10/2016
Microserve, Edmonton , Alberta Canada
Industry: IT Consulting
Work with internal stakeholders to develop strategies and implementation plans to enforce Information Security requirements and address identified risks.
• Implement new initiatives to simplify, standardize and optimize threat supervising operations methods and tools to reduce analysis and reporting times and increase security, availability, and service agility.
• Understood and articulated emerging threats and incidents to different audiences, including technical, operations management, senior management and executives.
• Define and/or improve the security assessment processes on Studios / Networks / Applications / Pipelines / Services scope.
• Monitor all security infrastructure EDR solutions for efficient and appropriate operations.
• Management of Vulnerability and Application Scanning performed by external vendors and ensuring actions are being followed up.
• Provide network administration and support for on premise and Azure cloud infrastructure.--
IT Analyst 03/2014 - 08/2015
HP Canada/Shell Canada, Fort McMurray, Alberta Canada
Industry: IT
Support network infrastructure administration by helping ensure servers, applications, backup and network are efficient, stable, robust and current.
• Perform vulnerability assessments on a recurring and ad hoc basis, evaluate compliance of product against the Common Criteria standard and perform functional and penetration testing.
• Take proactive steps to mitigate potential security issues; maintains an effective cybersecurity monitoring and alerting framework.
• Participate in various cyber security program initiatives including phishing exercises, vishing, vulnerability scans, configuration and patch management.
• Continually examine and understand Access Management technologies such as CyberArk, practices, and processes within the firm, identifying areas of improvement or opportunity.
• Perform network performance evaluation through analysis of reports from monitoring tools and device logs and make recommendations/configuration changes as required.
• Assist with answering of client’s security questionnaires and evaluating compliance with contractual requirements.
• Assist in implementation of requirements defined within Cybersecurity related policies and procedures throughout the organization.
• Conduct threat-hunting activities which include IOC reviews, discovery and detection actions using the firms security toolsets such as Kali-Linux.--
University of Benin 05/2004 - 09/2008
Benin city, Edo state, Nigeria
Degree: Bachelor's Degree
Major:Computer Science
Minor:Computer Science
Graduated with 2:2 Hons
Login to view resume: IT Security Analyst - System Architect