Emmanuel Olusan

Cybersecurity Analyst
Not specified, Not specified.

About

Embarking on a career as a cybersecurity analyst, I bring a self-motivated and target-oriented approach, paired with a commitment to maintaining the highest standards of integrity and honesty. My strong problem-solving skills and attention to detail enable me to identify and address security vulnerabilities effectively. I thrive in high-pressure environments, leveraging both physical and mental alertness to anticipate and counteract cyber threats. I excel at fostering teamwork and collaborating within diverse professional settings to achieve common goals. My strong interpersonal and communication skills facilitate seamless interaction with colleagues, clients, and stakeholders. With a commitment to continuous learning and staying abreast of the latest cybersecurity trends and techniques, I am dedicated to protecting organizational assets and data. My initiative and active listening abilities further enhance my capacity to contribute to winning outcomes in the dynamic and ever-evolving field of cybersecurity.

Work

SpaceBlock Technology
|

SOC Analyst

Highlights

Monitor and respond to alerts from endpoint security tools solutions

Review and analyze logs from various sources (e.g., network devices, security, endpoints, applications) to identify potential security incidents.

Examine network traffic patterns and anomalies to identify potential threats

Analyze and respond to brute force attack, phishing attacks by identifying malicious emails, communicating with affected users, and blocking identified threats.

Review and monitor user access controls and permissions to ensure compliance with security policies.

Support the development and delivery of security awareness training programs for employees to improve their understanding of security best practices.

Examination of vulnerabilities in computer systems and networks.

Performing vulnerability assessments using tools like Nessus.

Conducting comprehensive penetration testing to identify network, endpoint, & application vulnerabilities.

Document and communicate security findings and recommendations effectively.

Collaborate with IT teams to ensure timely patching of systems and applications based on identified vulnerabilities and threat intelligence.

Monitor and enforce secure configurations of systems and applications, ensuring compliance with security policies and standards.

Support the implementation and monitoring of a Zero Trust security model within the organization.

Regularly review audit logs for suspicious activities and anomalies that may indicate a security threat

Communicate effectively with non-technical stakeholders, providing clear and concise updates on security incidents and response action.

Proficient in deploying, configuring, and managing Splunk Enterprise environments.

Expertise in creating advanced Splunk searches, reports, and dashboards for data analysis.

Setting up real-time alerts and automation using Splunk for proactive monitoring.

Experience in developing and customizing Splunk apps, add-ons, and modular inputs.

Knowledge of using Splunk for security monitoring, event correlation, and threat detection.

Ability to perform deep-dive data analysis and create insightful visualizations using Splunk.

Experience in deploying and managing Universal Forwarders and Heavy Forwarders for efficient data collection and forwarding.

Experience in integrating Splunk with security and IT operations tools, including apps for PaloAlto, Cisco,Azure,AWS,Microsoft,etc.

PostNet Brookly Dey
|

Branch Manager

Highlights

Develop goals and objectives that tend to growth and prosperity

Design and implement business plans and strategies to promote the attainment of goals.

Ensure that the company has the adequate and suitable resources to complete its activities.

Organize and coordinate operations in ways that ensure maximum productivity

Supervise the work of employees and provide feedback and counsel to improve efficiency and effectiveness.

Maintain relationships with partners/vendors/suppliers.

Gather, analyze and interpret external and internal data and write reports.

Assess overall company performance against objectives.

Represent the branch in events, conferences.

Ensure adherence to legal rules and guidelines.

Uptons Kodak Express
|

IT Support Technician

Highlights

Identify hardware and software solutions.

Troubleshoot technical issues

Diagnose and repair faults.

Resolve network issues

Install and configure hardware and Software

Speak to customers to quickly understand their problems

Provide timely and accurate customer feedback.

Guide customers through problem-solving steps.

Follow up with clients to ensure resolution

Replace or repair necessary parts

Support the roll-out of new applications

Create procedural documentation for support.

Manage multiple cases simultaneously

Test and evaluate new technologies

Conduct electrical safety checks on equipment.

ANZ Newzealand
|

Cybersecurity Management Virtual Internship

Highlights

Conducted security assessments and identified potential vulnerabilities and weaknesses in clients' systems.

Participated in multiple threat analysis and incident response activities.

Monitored and analyzed security-related data to identify potential security risks.

Assisted in the preparation of reports and presentations on cybersecurity initiatives and projects.

Collaborated with team members to ensure effective and efficient execution of cybersecurity tasks.

SAP Johannesburg
|

Cybersecurity Virtual Internship

Highlights

Actively participated in a variety of cybersecurity projects and tasks, gaining valuable experience under the mentorship of seasoned professionals.

Demonstrated an ability to apply cybersecurity concepts, techniques, and best practices to real-world scenarios, further enhancing knowledge and skills in the field.

Played a key role in security testing and evaluating security systems and technologies, contributing to the overall effectiveness and integrity of the organization's cybersecurity measures.

Collaborated closely with a dynamic team to proactively identify, report, and resolve cybersecurity threats and vulnerabilities, ensuring a robust and secure digital environment for the organization.

Education

Cybrary

Certification

Comptia Linux+ Certification

Cisco Network Academy

Certification

Certicate in NDG Linux Unhatched

Cybrary

Certification

Microsoft Certified Solution Associate Certification

Cybrary

Certification

System Security Certified Professional

Alison College

Diploma

Diploma in Standards Integrated Management System

Scholars International Institute of Technology, Denver USA

Diploma

Diploma in Comptia Network

SkillFront

Associate

ISO/IEC 2000 IT Service Management Associate

Salesforce

Certification

Certified Associate

ISEA

Certification

Certified Cyber Hygiene Practitioner, Ministry of Electronics and Information Technology (India)

The International Cyber Threat Task Force

Certification

Ransomware Uncovered Specialist Certificate

SkillFront

Associate

ISO/IEC 2000 IT Service Management Associate

Digital Skills Nigeria

HTML5 Application Development

IBM

Cybersecurity Analyst (Coursera)

Itronix Solutions

Certification

Certified Python Programming Professional Certification

ALX

Software Engineering (Back End Develpoment)

Google

Cybersecurity Certificate (Coursera)

Skills

Technical Tools

SIEM (3+ Years), Kali linux (2+ Years), Metasploit, Nmap (3+ Years), Nessus (2 + Years), OWASP ZAP (3+ years), Splunk Enterprise (3+Years), Cisco Packet Tracer (4+ years), Virus Total(3+Years), TCP view(3+ Years), Explorer (3+ Years).

Interests

Career Highlights

Experienced with EDR, SIEM, IDS/IPS, Threat Behavior Analytic systems, Experienced using host and network data to triage alerts and perform investigations, Experienced with regulatory requirement and standards such as NIST, MITRE ATT&CK framework, Malware Analysis, Network Security, System Security, Penetration Testing/Vulnerability Scanning, Experienced in creating reports to monitor remediation of IT findings and issues, Enterprise knowledge such as firewall/server/database – patching/encryption/access control and etc., Technical writing, Data Loss Prevention, End Point Protection, Threat Modeling, Advanced Threat Protection, CyberKill Chain, APT, Experienced with OWASP TOP 10 for Web Application & Mobile Application.

Area of Interest

SOC Analyst, Information Security Analyst, Vulnerability Management, Penetration Tester, Endpoint Security Engineer, Cybersecurity Facilitator.

Projects

Incident Response and Log Forensics
Splunk-based Threat Hunting Framework
Splunk IT Operations Monitoring