Adekunle Ologere
Details
Banking and Financial Support Services
Lagos State University
2009 :
• Develops and maintains information security policies, procedures, and control techniques in accordance with FISMA.
• Schedule and run weekly vulnerability scans from Qualys console
• Evaluate vulnerability and compliance scans and collaborate with engineering to define remediations plans.
• Review proposed new systems, networks, and software designs for potential security risks; recommend mitigation or counter measures and resolve integration issues related to the implementation of new systems within the existing infrastructure.
• Participate in the decision process for making recommendations to mitigate vulnerabilities, discovered weaknesses; analyzed and determine risk mitigation processes.
• Examine and evaluate Security and Privacy controls for Federal Information in accordance with NIST SP 800-53, FIP 200 to determine if security controls are meeting organizational policies.
• Participate in team/project meetings and technical meetings appropriate for the content and ensure assigned tasks and projects are completed on schedule.
• Develop long-range plans for IT security systems that anticipate, identify, evaluate, mitigate, and minimize risks associated with IT systems vulnerabilities.
• Implement security requirements, integrate security programs, and define the scope and level of detail for security plans and policies.
2019 : Present
Accenture
Information Security Analyst
2018 : 2022
Accenture
Cyber Security Analyst
2015 : 2018
Cybersoft Technologies
Cyber Security Analyst
2013 : 2015
Linksource Consultants
Network Secuirty Analyst
Skills
Amazon Web Services (AWS), Application Security, Cloud Security, Cyber Defense, Cybersecurity, Cyber Threat Intelligence (CTI), Data Security, Ethical Hacking, Firewalls, Incident Response, Information Security, Information Security Management, Information Security Standards, Integration, ISO 27001, IT Audit, IT Risk Management, IT Security Assessments, IT Security Best Practices, IT Security Operations, IT Security Policies, IT Security Policies & Procedures, Network Security, NIST, Payment Card Industry Data Security Standard (PCI DSS), Penetration Testing, Security, Security Architecture Design, Security Audits, Security Awareness, Security Incident Response, Security Operations Center, SEIM, Software Development Life Cycle (SDLC), Splunk Enterprise Security, Tenable Nessus, Threat & Vulnerability Management, Troubleshooting, U.S. Federal Information Security Management Act (FISMA), Vulnerability, Vulnerability Assessment, Vulnerability Management, Vulnerability Scanning, Web Application Security, • ArcSight, • Development of POAM, • Qualys guard, • Vulnerability Assessment, • Xacta/IACS and RSA
About
Experienced IT Security Analyst Providing oversight and guidance to support IT Security Program by applying the Risk Management Framework (RMF) as it applies to Federal Information Systems, NIST Publications, FISMA guidelines and system security monitoring practices. Experienced in developing security authorization packages such as System Security Plan (SSP), Security Assessment Report (SAR), Plan of Action &Milestone (POA&M) in compliance with NIST SP 800-53A. Ability to maintain Company’s Authorization to Operate (ATO), detecting and mitigating IT security threats and vulnerabilities and provide recommendations for mitigating organizational risk.