INFORMATION TECHNOLOGY SOLUTION EXPERT
Multi-certified Expert in Enterprise IT and Security Strategies
A decade of Professional experience in value-added National and Global reaching
projects. Innovative and resourceful IT and Security Operations Manager with expertise
leading national/international large-scale deployments and operations. Offers
professionalism, flexibility, self-proficiency and creativity, fostering productive
relationships at all levels.
An ambitious and hardworking individual. M y significant tenures at highly respected
companies are testament to my commitment and ability. I handle multiple tasks on a daily
basis competently, working well under the pressure. Frequent acknowledgment of m y
contribution from senior management illustrates still further my potential value to your
company
seeking an engagement with the Information Technology department, so as to use
defensive hacking expertise to protect the I.T infrastructure. and Cyber forensics
and Incident response expertise to addressing and managing the aftermath of a
security breach or attack (incident). The goal is to handle the situation in a
way that limits damage and reduces recovery time and costs.
Overview
20
20
years of professional experience
5
5
years of post-secondary education
31
31
Certificates
Work History
Team Lead
FCMB NIGERIA
11.2022 - Current
Development of DevSecOps famework for migrating the bank’s DevOps
to DevSecOps
Implementing SASTs and DAST tools at the CI/CD Pipeline: the shift-left
of security throughout the workflow
Coordinating the periodic internal and external security assessment of
the bank’s critical applications
Cross-functional team co-ordination, communication and reporting
Ensure compliance to SLA, process adherence and process
improvisation
Experience in vendor management and third-party risk assessment
Lead investigations and response teams to assist in containing and
remediating incidents.
Myriad View Limited CEO/MD
01.2011 - Current
Information Security
Management System
(In view), Leading Information Infrastructure
Deployment and Security Consulting)
Conducting penetration test by assessing the vulnerabilities of enterprise ICT
Infrastructure and developing a security improvement plan to address these
vulnerabilities in order to ensure security, reliability and availability of the
Network
Planning security assessment by obtaining a sufficient understanding of
organisation's related operating environment, identifying and evaluating
related internal controls, assessing risks, detailing the assessment scope and
objectives based on the risk assessment,developing testing and sampling
methodologies, and creating a vulnerability assessment and penetration test
program maps
Delivering infrastructure, continuous testing ,Mobile and web app testing both
remotely and onsite Providing remediation advice in meetings and conference
calls
Assisting with the development of cutting-edge training material for internal
and external delivery
Performing the assessment including gathering and documenting sufficient,
competent, relevant and useful evidence to indicate whether adequate controls are
in place and functioning as intended
Analyze and review the network
infrastructure including but not limited to perimeter security, Internet facing web
applications, assessing the vulnerabilities, threats and risks to the communications,
security, network, wireless devices and other enterprise digital equipment
Reporting security and vulnerability issues (findings) identified, including
recommendations to address weaknesses noted
Replicating actions of an attacker with an adversarial intent to gain unauthorized
access to portions of enterprise's network i.e., any device that has a network
address or is accessible to any other device from the perspective of a trusted user
and adversary from inside, remote and outside
Encouraging a positive, proactive and solution-oriented approach among team
members
Delivering targeted research and development in line with direction of the business
Undertaking online/internet investigations and preparing digital forensics report
using forensic software programmes
Tracing malicious activities of insiders/internal employees and undertaking e-mail
tracing during investigations
Performing basic forensic analysis of digital devices using both open source and
proprietary tools (Encase) :Using open source and commercial tools/programs to
crack password
Assisting with pre/post sales activities as required and providing technical
mentoring to colleagues
Deployment of both SIEM and FIM solutions
Essential General
Willing to travel to
deliver onsite work
as required
Conducting
penetration testing
work out of normal
office hours on
occasion
Client facing, able to
confidently and
professionally
represent the
company
Self-motivated and
able to work in an
independent manner
as well as part of a
team
Excellent written and
oral communications
skills
Positive,
collaborative and
enthusiastic
Digital Forensic Investigator
CMJ Solutions
01.2004 - 01.2008
Deployment of Tripwire and Arcsight solutions that:
Rapidly detect and reconcile IT configuration changes and proactively
assess, validate and remediate IT infrastructure configurations
Automatically query changes detects against changes expected in change
management
Query SIEM for security information to make risk-based decisions and Useful
for Incident and Problem processes
Critical for security forensics after a breach
Intelligently filter for changes of
interest against defined reconciliation policy and Correlate against
CyberCrime Library
Maintain & prove continuous compliance, Real-time alerting for non-stop
security and reduce audit costs with rich reporting
Implementation and training on tracks inspector: a digital forensics solution
for non-technical detectives that analyses Smartphones, tablets and
computers in close collaboration with law enforcement agencies
Executed extensive security infrastructure upgrades like firewall/VPN
upgrades, intrusion detection, token-based authentication and remote
management, eID PKI (Electronic Identity Public Key Infrastructure), Active
Directory and network segregation) for various midsize and large
companies/organization
Coordinated deployment of server clustering, load balancing and teaming to
provide highly availability/redundancy, scalable, resilient, and reliable
services
Protected valuable information and improve businesses by following detailed
Security Risk Assessments methodology (ISO 27001 & 22301), followed by
Impact Analysis, Risk Treatment plan, incident management, Business
Continuity and Disaster Recovery
Guided cross-functional teams in the design, validation, acceptance testing
and implementation of secure, networked communications across remote
sites for several key clients in compliance with various industry Security
Standards
Directing Vulnerability assessment, remediation and change management
Information Security Auditing and Assurance
Assisting with the development of cutting-edge training material for internal
and external delivery.
Team Lead
Rhythex Consulting
01.2008 - 01.2011
Corporate Trainings for CEH, CHFI, ECSA, LTP
To gain an understanding of a client’s business and IT processes and procedures
and perform test therein to identify risks associated with the processes
To Evaluate the IT general control environment and effectiveness management
oversight over IT processes
To Review and evaluate the adequacy of existing IT policies and procedures
To perform review and tests to obtain sufficient and relevant assurance of
effectiveness and efficiency IT process
To identify opportunities for internal control and process improvements
Review the infrastructure (database, Application systems, Operating systems
platforms, Hardware architecture, WAN/LAN, physical facilities including server
room security and controls, business continuity plan and DRP) according to best
practices and standards
Conduct security awareness trainings for staff at all levels
Delivering infrastructure, continuous testing , Mobile and web app testing both
remotely and onsite Providing remediation advice in meetings and conference calls
Conducting penetration test by assessing the vulnerabilities of enterprise ICT
Infrastructure and developing a security improvement plan to address these
vulnerabilities in order to ensure security, reliability and availability of the
Network.
ECcouncil Instructor
NewHorizons
Lagos
01.2009 - Current
Corporate Trainings for CEH, CHFI, ECSA, LTP)
Facilitator
AJSilicon
Lagos
01.2008 - Current
Preparing candidates for the CISA Examination
CISA Boot camps
Cybersecurity Instructor
Elev8 Education Centre Limited
01.2021 - Current
Conduct IT training and executive programs to companies and individuals
Develop curriculum and training materials around current cybersecurity trends.
Contract and Procurement Officer at Alpha Mead Facilities and Management Services LtdContract and Procurement Officer at Alpha Mead Facilities and Management Services Ltd