Uploaded File
add photo
205 White Drive Apartment 27B
Tallahassee, FL 32305
Cyber Security Analyst
11 years experience W2
Average rating
Profile views

  • Experienced Information Security Assurance Analyst with the cast skill in NIST-SP, FIPS, and Risk Management Framework (RMF), Federal Program Management Office (FERAMP), tasks concurrently with SDLC processes.
  • Knowledgeable in developing & review of Security Assessment Plan (SAP), System Security Plan (SSP), Security Assessment Report (SAR) Plan of Action and Milestone (POAM) and Splunk Ent. (SIEM).


  • NIST Special Publication (NIST SP) Series
  • FIPS 199/ FIPS 200
  • System Security Plan (SSP)
  • Security Assessment Reporting (SAR)
  • Continuous Monitoring (CM)
  • Configuration Management
  • Oracle SQL Server
  • Nessus Scan
  • Knowledge of Active Directory
  • Splunk Ent (SIEM)
  • Linux
  • SharePoint (Office 365 and SharePoint Server)
  • Plan of Action & Milestones (POAM)
  • Information Security Contingency Plan (ISCP).
  • Incident Response Planning (IRP)
  • Security Control Assessment (SCA)
  • Visio

Cyber Security Analyst
Information Technology
Nov 2017 - present
  • Created and updated the following documents: Risk Assessment Report, E-Authentication, Security Assessment Plan, System Security Plan, Contingency Plan, Contingency Plan Test, Security Assessment Report, Plan of Action and Milestone (POA&M).
  • Monitored compliance with information security policies by coaching others within the organization on acceptable uses of information technology and how to protect organization systems.
  • Worked with engineers and developers to incorporate the best security safeguard and practice on both production and Test &Development Lab (TDL) systems.
  • Developed POA&M (Plan of Action & Milestones) document to take corrective actions resulting from Security Assessment of systems controls.
  • Prepared and presented briefings to senior management officials on Information Assurance/Information Security principles to manage risks.
  • Coordinated internal compliance review and monitor activities for Network Operations, including periodic reviews of departments within the Network Operations functional unit and collaborate with Internal Audit.
  • Reviewed system audit log events and identifying any suspicious activities.
  • Conducted the IT risk assessment and documented key controls
  • Developed test plans testing procedures and documented test results and exceptions.
  • Conducted walk through formulated test plans, document gaps, test results, and exceptions and develop remediation plans for each area of testing.
  • Understood security risks and Monitor the security of data across their network
  • Identified active violations in data security and tracked users and network activity to identify the potential for security risks.
  • Monitored and assess risk at the user level and reconcile staffing and role with privacy policy
  • Established a regular security reporting and evaluation structure.
Compliance Cyber Security Data Security Information Security Risk Assessment Security Analyst Splunk
Remove Skill
Cyber Security Analyst and Design Professional
Information Technology
Jun 2016 - Jun 2016
  • March 217
  • Tracked report, manage progress on tasks against WBS and Gantt Charts.
  • Modified and delivered company and legacy cybersecurity system architecture ended infrastructures
  • Based on client security needs, industry requirements, and an understanding of security technology, architecture, infrastructure and engineering.
  • Developed and enhanced the cybersecurity of a client's or company's technology solution architecture and Infrastructure.
  • Applied extensive knowledge of the client's business and industry to gather and develop cybersecurity requirements specifications, designs and implementation plans.
  • Used the output of system architects to design and build a secure infrastructure.
  • Led the testing of cybersecurity solutions to ensure performance and quality.
  • Gave feedback to System Owners and ISSOs to address System Security Plans (SSP), Contingency Plans, Disaster Recovery Plans, Privacy Impact Assessments, and Configuration Management Plans.
  • Worked with a team of Information System Owners, Developers and System Engineers to select and implement tailored security controls in safeguarding system information.
  • Utilized Xacta tool to assess system for compliance and vulnerability.
  • Requested and reviewed vulnerability scans as well as monitored and tracked remediation progress in Risk Vision GRC tool.
  • Coordinated with Business Owners in the development of remediation plans and monitor to completion ensuring that all remediation plan activities are documented from identification until closure.
  • Advocated for cyber security program that promoted cooperation across business units.
  • Reviewed Information Security System policies and recommended changes to policies.
  • Provided Assessment, Authorization and Information Assurance support to include security test and evaluation (ST&E), security control assessment, vulnerability scanning, vulnerability assessment, POA&M management, IT security policies and procedure developments.
  • Documented and reviewed System Security Plan (SSP), Security Assessment Report (SAR), Security Plan of Action and Miles tones (POA&M), Authorization letter/memorandum (ATO).
  • Coordinated necessary activities to correct assessment findings and prepared/updated POA&M reports.
Compliance Cyber Security Information Security Security Analyst Vulnerability Assessments Splunk
Remove Skill
Information Security Intern
Information Technology
Oct 2014 - Dec 2015
  • Enrolled in master's degree program in information technology with distinction in Information security course which was completed two years.
  • Strong leadership, influencing, communication and interpersonal skills.
  • Provided frontline information technology support to all departments, faculties and over 250 staffs of the school.
  • Coordinated with vendors for equipment repairs and replacements.
  • Supported infrastructure, hardware, software, office systems, distribution, systems performance, technology integration and disaster recovery.
  • Maximized the development and efficient utilization of the department management information systems, including manual and electronic.
  • Strong contributor who wants to make an impact and strong business acumen and critical analytical skills
  • Installed antivirus on systems and swapped hard-drive on IBM, DELL, NCR and HP Servers and Desk-stop.
  • Ran network cables from the switches, router to the patches and imaging of data from old Hard-drive to new hard-drive and ability to troubleshoot network, faulty systems and Kiosks. Installed operating systems Windows 8, 7, XP, 2000, Vista.
Information Security
Remove Skill
Information Security Assistant
Information Technology
Apr 2011 - Aug 2013
  • Maintained and administered computer networks and related computing environments, including computer hardware, systems software, applications software, and all configurations.
  • Planned, coordinated, and implemented network security measures in order to protect data & hardware.
  • Operated master consoles in order to monitor the performance of computer systems and networks, and to coordinate computer network access and use.
  • Performed data backups and disaster recovery operations.
  • Performed routine network startup and shutdown procedures and maintain control records.
  • Conferred with network users about how to solve existing system problems.
  • Monitored network performance in order to determine whether adjustments need to be made, and to determine where changes will need to be made in the future.
  • Analyzed equipment performance records to determine the need for upgrade or replacement.
  • Maintained logs related to network functions, as well as maintenance/repair records.
  • Performed testing roadmaps and strategies for the optimal customer experience through innovations services such as call, web, and mobile.
  • Liaised between strategic business and InfoTech, successfully simplified intermediate technical term into business and customer friendly language.
  • Gathered, interpreted and summarized results of various vulnerability reports and data gathering efforts and determine the associated security risk.
  • Demonstrated a basic understanding of information risk and security standards and best practices in order to triage data gathering results based on pre-determined risk criteria.
Information Security Network Security
Remove Skill
Edit Skills
Non-cloudteam Skill
Master's in Information Technology
Concordia University 2015
Computer Science
Olabisi Onabanjo University Ogun State 2007
CCNA Certified
ITIL Certified
Scrum Master Certified
Project Management Institute (PMI) Member ID: 4959285
Information Security
Cyber Security
Data Security
Network Security
Risk Assessment
Security Analyst
MS Active Directory
Vulnerability Assessments