Summary
Overview
Work History
Education
Skills
Certification
Timeline
Generic

Adetunji Adeoje

Hilltop, Ikorodu Lagos

Summary

INFORMATION TECHNOLOGY SOLUTION EXPERT Multi-certified Expert in Enterprise IT and Security Strategies A decade of Professional experience in value-added National and Global reaching projects. Innovative and resourceful IT and Security Operations Manager with expertise leading national/international large-scale deployments and operations. Offers professionalism, flexibility, self-proficiency and creativity, fostering productive relationships at all levels. An ambitious and hardworking individual. M y significant tenures at highly respected companies are testament to my commitment and ability. I handle multiple tasks on a daily basis competently, working well under the pressure. Frequent acknowledgment of m y contribution from senior management illustrates still further my potential value to your company seeking an engagement with the Information Technology department, so as to use defensive hacking expertise to protect the I.T infrastructure. and Cyber forensics and Incident response expertise to addressing and managing the aftermath of a security breach or attack (incident). The goal is to handle the situation in a way that limits damage and reduces recovery time and costs.

Overview

20
20
years of professional experience
5
5
years of post-secondary education
31
31
Certificates

Work History

Team Lead

FCMB NIGERIA
11.2022 - Current
  • Development of DevSecOps famework for migrating the bank’s DevOps to DevSecOps
  • Implementing SASTs and DAST tools at the CI/CD Pipeline: the shift-left of security throughout the workflow
  • Coordinating the periodic internal and external security assessment of the bank’s critical applications
  • Cross-functional team co-ordination, communication and reporting
  • Ensure compliance to SLA, process adherence and process improvisation
  • Experience in vendor management and third-party risk assessment
  • Lead investigations and response teams to assist in containing and remediating incidents.

Myriad View Limited CEO/MD
01.2011 - Current
  • Information Security
  • Management System (In view), Leading Information Infrastructure
  • Deployment and Security Consulting) Conducting penetration test by assessing the vulnerabilities of enterprise ICT
  • Infrastructure and developing a security improvement plan to address these vulnerabilities in order to ensure security, reliability and availability of the
  • Network
  • Planning security assessment by obtaining a sufficient understanding of organisation's related operating environment, identifying and evaluating related internal controls, assessing risks, detailing the assessment scope and objectives based on the risk assessment,developing testing and sampling methodologies, and creating a vulnerability assessment and penetration test program maps
  • Delivering infrastructure, continuous testing ,Mobile and web app testing both remotely and onsite Providing remediation advice in meetings and conference calls
  • Assisting with the development of cutting-edge training material for internal and external delivery
  • Performing the assessment including gathering and documenting sufficient, competent, relevant and useful evidence to indicate whether adequate controls are in place and functioning as intended
  • Analyze and review the network infrastructure including but not limited to perimeter security, Internet facing web applications, assessing the vulnerabilities, threats and risks to the communications, security, network, wireless devices and other enterprise digital equipment
  • Reporting security and vulnerability issues (findings) identified, including recommendations to address weaknesses noted
  • Replicating actions of an attacker with an adversarial intent to gain unauthorized access to portions of enterprise's network i.e., any device that has a network address or is accessible to any other device from the perspective of a trusted user and adversary from inside, remote and outside
  • Encouraging a positive, proactive and solution-oriented approach among team members
  • Delivering targeted research and development in line with direction of the business
  • Undertaking online/internet investigations and preparing digital forensics report using forensic software programmes
  • Tracing malicious activities of insiders/internal employees and undertaking e-mail tracing during investigations
  • Performing basic forensic analysis of digital devices using both open source and proprietary tools (Encase) :Using open source and commercial tools/programs to crack password
  • Assisting with pre/post sales activities as required and providing technical mentoring to colleagues
  • Deployment of both SIEM and FIM solutions
  • Essential General Willing to travel to deliver onsite work as required
  • Conducting penetration testing work out of normal office hours on occasion
  • Client facing, able to confidently and professionally represent the company
  • Self-motivated and able to work in an independent manner as well as part of a team
  • Excellent written and oral communications skills
  • Positive, collaborative and enthusiastic

Digital Forensic Investigator

CMJ Solutions
01.2004 - 01.2008
  • Deployment of Tripwire and Arcsight solutions that: Rapidly detect and reconcile IT configuration changes and proactively assess, validate and remediate IT infrastructure configurations
  • Automatically query changes detects against changes expected in change management
  • Query SIEM for security information to make risk-based decisions and Useful for Incident and Problem processes
  • Critical for security forensics after a breach
  • Intelligently filter for changes of interest against defined reconciliation policy and Correlate against
  • CyberCrime Library
  • Maintain & prove continuous compliance, Real-time alerting for non-stop security and reduce audit costs with rich reporting
  • Implementation and training on tracks inspector: a digital forensics solution for non-technical detectives that analyses Smartphones, tablets and computers in close collaboration with law enforcement agencies
  • Executed extensive security infrastructure upgrades like firewall/VPN upgrades, intrusion detection, token-based authentication and remote management, eID PKI (Electronic Identity Public Key Infrastructure), Active
  • Directory and network segregation) for various midsize and large companies/organization
  • Coordinated deployment of server clustering, load balancing and teaming to provide highly availability/redundancy, scalable, resilient, and reliable services
  • Protected valuable information and improve businesses by following detailed
  • Security Risk Assessments methodology (ISO 27001 & 22301), followed by
  • Impact Analysis, Risk Treatment plan, incident management, Business
  • Continuity and Disaster Recovery
  • Guided cross-functional teams in the design, validation, acceptance testing and implementation of secure, networked communications across remote sites for several key clients in compliance with various industry Security
  • Standards
  • Directing Vulnerability assessment, remediation and change management
  • Information Security Auditing and Assurance
  • Assisting with the development of cutting-edge training material for internal and external delivery.

Team Lead

Rhythex Consulting
01.2008 - 01.2011
  • Corporate Trainings for CEH, CHFI, ECSA, LTP
  • To gain an understanding of a client’s business and IT processes and procedures and perform test therein to identify risks associated with the processes
  • To Evaluate the IT general control environment and effectiveness management oversight over IT processes
  • To Review and evaluate the adequacy of existing IT policies and procedures
  • To perform review and tests to obtain sufficient and relevant assurance of effectiveness and efficiency IT process
  • To identify opportunities for internal control and process improvements
  • Review the infrastructure (database, Application systems, Operating systems platforms, Hardware architecture, WAN/LAN, physical facilities including server room security and controls, business continuity plan and DRP) according to best practices and standards
  • Conduct security awareness trainings for staff at all levels
  • Delivering infrastructure, continuous testing , Mobile and web app testing both remotely and onsite Providing remediation advice in meetings and conference calls
  • Conducting penetration test by assessing the vulnerabilities of enterprise ICT
  • Infrastructure and developing a security improvement plan to address these vulnerabilities in order to ensure security, reliability and availability of the
  • Network.

ECcouncil Instructor

NewHorizons
Lagos
01.2009 - Current
  • Corporate Trainings for CEH, CHFI, ECSA, LTP)

Facilitator

AJSilicon
Lagos
01.2008 - Current
  • Preparing candidates for the CISA Examination
  • CISA Boot camps

Cybersecurity Instructor

Elev8 Education Centre Limited
01.2021 - Current
  • Conduct IT training and executive programs to companies and individuals
  • Develop curriculum and training materials around current cybersecurity trends.

Education

Post Graduate Program - Cloud Computing

University of Texas

Postgraduate Diploma - Analytical/Environmental Chemistry

Lagos State University

Higher National Diploma - Applied Chemistry

Federal Polytechnic
01.1995 - 01.1998

Ordinary National Diploma - Science Laboratory Technology

Federal Polytechnic
01.1992 - 01.1994

Skills

Proficient with a vastundefined

Certification

CISA, 2008

Timeline

Team Lead

FCMB NIGERIA
11.2022 - Current

Cybersecurity Instructor

Elev8 Education Centre Limited
01.2021 - Current

Myriad View Limited CEO/MD
01.2011 - Current

ECcouncil Instructor

NewHorizons
01.2009 - Current

Team Lead

Rhythex Consulting
01.2008 - 01.2011

Facilitator

AJSilicon
01.2008 - Current

Digital Forensic Investigator

CMJ Solutions
01.2004 - 01.2008

Higher National Diploma - Applied Chemistry

Federal Polytechnic
01.1995 - 01.1998

Ordinary National Diploma - Science Laboratory Technology

Federal Polytechnic
01.1992 - 01.1994

Post Graduate Program - Cloud Computing

University of Texas

Postgraduate Diploma - Analytical/Environmental Chemistry

Lagos State University
Adetunji Adeoje