Motivated IT professional delivering expert knowledge and skills for complex, business critical Identity & Access Management, Governance and Security solutions/products by supporting customer's... show more
Motivated IT professional delivering expert knowledge and skills for complex, business critical Identity & Access Management, Governance and Security solutions/products by supporting customer's complete scope of a solution, from vendor-supplied products to customized applications with strong adherence to IT compliance in keeping data and network secured. Olutayo implements triad of security; CIA in diverse ways to protect information and end users from every form of cyber & physical attacks. Also, has profound insight to layered security applying reliable network solutions in order to protect both data and the users with his good security acumen. I have experience working with data from different category of industries e.g Entertainment, Finance, Law firm, Health Center, Schools, Aviation, Transportation etc.
Praises help jobseekers showcase strengths and stand out to employers.
Developed a strategic plan for information security identifying security objectives, following industry best practices and regulatory requirements for companies and end users.
Maintained different SIEMs solutions including Splunk, RSA SA, IBM QRadar, SumoLogic and McAfee ESM. Performed Health-check as well.
Resolved assigned tickets within an approved time-frame and updating tickets with notes on resolution.
Followed an established process for the purposes of collecting relevant data and performing the necessary level of analysis/investigation on the collected data. Investigation done using system logs, EDR solutions, IDS/IPS, SIEM technology etc., to determine if there was incident.
Trend, managed and tune security monitoring, policies and alerting solutions for standardized remediation against network or data attack. This process requires atimes editing scripts for security analysis tasks and control integrations.
Investigated IOCs and executed up-to-date knowledge of information technology related trends, external threats, current vulnerabilities, attacks, and countermeasures as they are published from organizations such as ICS-CERT.
Provided security research, analysis and design for all client computing system and the network infrastructure.
Conducted risk assessment of current computing environment and provides recommended actions in order to reduce the risk of loss to confidential data. Also engaged with best practices for Data Loss Prevention (DLP).
Provided quick response during security incidence with timely disaster recovery and business continuity for business restoration.
Managed and educated client about privileged access management tools like CyberArk, Thycotic Secret Server etc.
Deployed IDS systems to protect global hosting facilities, along with the implementation of End point protection solutions e.g Crowdstrike Falcon, Symantec EP, FireEye, Tanium etc.
Monitored, administered, and tuned security systems, such as advanced threat protection, IDS/IPS, SIEM, antivirus, EDR, etc.
Developed, implemented, and operate access management technology and processes as part of an enterprise cyber security program.
Managed and maintained a large number of network security appliances.
Served as the major link between the end users and, IT engineering and security operations as a technical resource to implement resolution provided as a recommendation by ITSec.
Tested patches using virtualization platform, and installed tested patches as they are available for all required applications.
Provided expert architecture advice and cyber security direction to the Enterprise Identity and Access Management System programs for organization/companies in the Greater Toronto area.
Configured new computer systems for end users, and ensures that the Antivirus is properly maintained and that all enterprise computers and devices have proper protection, signatures, and revisions.
Troubleshoot devices with connectivity issues. Examples are: routers, printers, computers etc.
Developed new web platform on Wordpress and helped to install new applications.
Provided technical assistance and support for incoming queries and issues related to computer systems, software, and hardware.
Configured new system/computers for end users and install necessary applications/softwares with security in mind.
Resolved technical problems with Local Area Networks (LAN), Wide Area Networks (WAN), and other systems.
Assisted in opening and maintaining customer accounts by recording account detail information on the company database.
Ensured delivery of excellent customer service through fast and accurate processing of orders, communication, and coordinating with other departments to resolve inquiries.
Maintained financial accounts by processing customer adjustments.
Handled complaints, provided appropriate solutions and alternatives within the time limits and follow up to ensure resolution.
Responded to technical issues reported by the customer and helped to troubleshoot their device remotely.
Managed large amounts of incoming calls.
Accepted payment information and other pertinent information such as addresses and phone numbers, and other sensitive information.
Setup and maintained users account for client staff. Also, installed and test computer-related equipments.
Managed the configuration and operation of client-based computer operating systems.
Monitored systems daily and respond immediately to security or usability concern that may arise.
Updated system as soon as new version of OS and application software comes out onsite and remotely for our clients.
Created and verified backups of data especially web-base database.
Manage staff and user credentials and frameworks
Quickly arranged repair for hardware in occasion of hardware failure.
Developed a brand new website for client with up-to-date applications been deployed as need be.
- Endpoint Detection and Response Solutions
- Layered Security
- Data Analysis
- Incident Investigation
- Priviledge Access Management
- Digital Forensic
- SIEMS operation
- Scripting Language
- Risk assesment
- OS- Linux,Windos,MacOs
Implement safe wifi connectivity, firewall policy configuration and AV configuration in order to build a safe network environment.
Upgrade and update web content whenever there is need.
Implement safe web connectivity using WAF that is capable of controlling traffic on the website.
Provide technical support for their online services and application.
Motivated IT professional delivering expert knowledge and skills for complex, business critical Identity & Access Management, Governance and Security solutions/products by supporting customer's complete scope of a solution, from vendor-supplied products to customized applications with strong adherence to IT compliance in keeping data and network secured.
Comparison of Security Onions with Splunk (01/2016 – 04/2017)
Configured two separate Systems with Security Onions and Splunk respectively to detect anomalies on both networks.
In the case of Splunk-based system, splunk forwarder was deployed on each client machine with snort as IDS. Also, the universal forwarder was configured to send logs collected from IDS and system logs to the Indexer which was setup on another network. This project was carried out using different operating system (unix and Windows).
In the case of Security Onions, different IDS were configured to detect anomalies based on the set rules and policies. The collected data/logs were analyzed using Sguil and ELSA. Security Onion is a Linux distro for intrusion detection, network security monitoring, and log management. It contains Snort, Suricata, Bro, OSSEC, Sguil, ELSA and many other security tools.
This project used pfsense as the firewall to control the traffic into and out each dedicated servers. The pfsense was also configured as the router.
The aim of this project was in training security analyst on how to implement layered security and what to look for while collected data are being analyzed and investigated.