Cyber Security Consultant Resume
5.00/5 (Submit Your Rating)
SUMMARY:
- More than 10 years’ experience of information security, cyber security and risk management best practices attained through participation on a number of projects spanning different sectors such as banking, telecommunication, non - governmental organisations and the education sector
- Structured and having good project management skills, self-driven, creative, and versatile, result-oriented, humorous and a team player
- Motivated through contribution to my work team and improving processes
- Strong respect for personal and cultural differences, as they should never compromise quality and achievement
Specialities
- Expertise: Network Security, Incident response, Regulatory Compliance, Cost Benefits Analysis, Policy Planning, Virtualization & Cloud Technologies, Disaster Recovery, Technical and functional Business Analysis,threat modeling, counterintelligence, critical infrastructure analysis and protection
- Security Management: Technical Consulting (IT Infrastructure reviews, Risk assessments, Business process reviews and mapping), Functional Consulting (Project management, IT system security hardening, IT system auditing and reviews, Security policy development and implementation, Vulnerability assessments)
- Frameworks and Standards: COBIT, CMMI, ITIL, NIST 800, ISO 27001, ISO 27002, ISO 27005, PCI-DSS, SOX, SSAE, OWASP, SCADA
- Networks and Databases: - IDS/IPS, ERPs, TCP/IP, Windows, macOS and Linux Operating systems, Oracle, MySQL
- Tools: Qualys, Wireshark, Archsight, Impreva, Rapid7, Symantec Endpoint Protection, McAfee, Remedy, OSINT, Spunk, Alienvault, Veracode, LogRhythm.
- Languages: MATLAB, C++, C, Java, HTML, VHDL, JavaScript, PHP
PROFESSIONAL EXPERIENCE:
Confidential
Cyber Security Consultant
- I actively engage small and medium-sized enterprises (SMEs) on the challenges and available countermeasures of the Man-in-the-Middle & Man-in-the-Browser vulnerabilities hence justifying the Return on Investment (ROI) and Total Cost of Ownership (TCO) for utilizing Confidential security products.
- I wisely turn Confidential client / sales leads into potential customers through well organized technical services that include though not limited to product awareness, proof of concept (POC), on-product training, product installation and configuration and 1 st level support.
Confidential
Lead Security Consultant
- Coordinated the overall Implementation of the security strategy and key performance Indicators using the industry best security practices of NIST 800 and ISO 2700 series for the MTN group, a regional telecommunication player in the African market.
- Negotiated with third party stakeholders and vendors highlighting the need to have a secure IT infrastructure and an audit ready software development process using the Microsoft Security Development life-cycle.
- Managed the creation of the Security Operations Centre (SOC) that enabled a unified view, monitoring and response of the security posture of the IT infrastructure and its respective assets.
Confidential
Test and Security Engineer
- Managed the creation of an incident response and remediation function that enabled support for threat intelligence, malware analysis, root cause analysis and containment of reported incidents all in support of the core business processes.
- Developed an automated security testing platform and plug-ins that enabled a more secure and timely mechanism for testing security deficiencies and code review in the Nokia wireless modem functionality.
Confidential
Research Engineering Assistant
- Researched and designed Anritsu proprietary security protocols used in the development of a Quality of service (QoS) telecommunication measuring probe prototype.
- Authored a number of security policies, procedures and guidelines in support of the IT service operations and regulatory compliance relevant to the overall security strategy of the organisation
NCR
IT Security Consultant
- Championed the implementation of Information Security Governance (ISG) committees for numerous customers including government, banks, educational institutions and nongovernmental organisations hence creating an alignment between the businesses processes, governance oversight and responsibility.
- Attained secure and functional Information and communication technology infrastructure for numerous customers through periodic review and hardening of networks, operating systems and databases