$$
{{ $t($store.state.user.experience_value_in_dollars) }}
Junior
{{ $t($store.state.user.experience_search_name) }}
0
jobs
Cyber Security Specialist at Tight Tech consult
adedeji michael
,
Gateshead, United Kingdom
Experience
Other titles
Skills
I'm offering
My professional Summary,
Information Security Professional with broad experience in ensuring that organization meets
and maintains security compliance with regulatory government standards and guidelines, by
developing and executing security controls, defenses, and countermeasures in an effort to
minimize vulnerabilities, Intercept and prevent internal or external attacks or attempts to
infiltrate organization information asset or individual. Strong understanding of standards and
requirements outlined by FISMA, NIST, ISO 27001, GDPR, and other guidelines. Skilled in
preparing Authorization Package – SPP, SPAR, and POAM
Information Security Professional with broad experience in ensuring that organization meets
and maintains security compliance with regulatory government standards and guidelines, by
developing and executing security controls, defenses, and countermeasures in an effort to
minimize vulnerabilities, Intercept and prevent internal or external attacks or attempts to
infiltrate organization information asset or individual. Strong understanding of standards and
requirements outlined by FISMA, NIST, ISO 27001, GDPR, and other guidelines. Skilled in
preparing Authorization Package – SPP, SPAR, and POAM
Markets
United States
(Remote
only)
Canada
(Remote
only)
United Kingdom
Ireland
(Remote
only)
Lithuania
(Remote
only)
Rest of Euro area
(Remote
only)
Denmark
(Remote
only)
Norway
(Remote
only)
Sweden
(Remote
only)
Finland
(Remote
only)
Links for more
Once you have created a company account and a job, you can access the profiles links.
Industries
Language
English
Fluently
Ready for
Available
My experience
2020 - ?
job
Information Security and Risk Analyst
TighTech Consulting, MD USA.
Conduct Vulnerability and Compliance Assessments in order to identify
vulnerabilities; assess findings to determine residual risks and priority level.
● Support the preparation of system and security documentation in accordance with Federal Information Security Modernization/Management Act (FISMA) requirements
throughout the stages of the RMF.
● Conducted security assessment interviews to determine the Security posture of the System and to develop a Security Assessment Report (SAR)
● Recommend system enhancements or compensating controls to remediate security deficiencies.
● Research attempted or successful efforts to compromise systems security and design
countermeasures.
● Performed information security risk assessments and assist with the internal auditing
of information security processes. Assessed threats, risks, and vulnerabilities from emerging security issues and also identified mitigation requirements.
● Review and monitor real-time, daily, and historical logs generated from all organizational systems through various Security Information and Event Management
(SIEM) tools.
● Analyze and identify potential intrusions and security violations, both internally and externally.
● Coordinate with the Information Assurance Lead, System Owners, and Configuration
Control Board (CCB) and monitor configuration changes for unauthorized activity.
● Audit and collect evidence to prove compliance with Regulatory Standards. Research,
plan and implement solutions to remedy non-compliance with prescribed security
controls and regulations.
● Work closely with Information Assurance Lead, PMO, and business stakeholders in order to support compliance efforts for various programs.
● Reviewing, maintaining, and ensuring all Assessments and Authorizations (A&A) documentation are included in the system security package.
● Ensure Implementation of appropriate security control for Information System based
on NIST Special Publication 800-53 rev 4, FIPS 200, and System Categorization using
NIST 800-60, and FIPS 199.
● Collaborate with system administrators to remediate (POA&Ms) findings. Ensure
vulnerabilities and risks are efficiently mitigated in accordance with the organization's
continuous monitoring Plan.
● Monitor controls post-authorization to ensure continuous compliance with the security
requirements
vulnerabilities; assess findings to determine residual risks and priority level.
● Support the preparation of system and security documentation in accordance with Federal Information Security Modernization/Management Act (FISMA) requirements
throughout the stages of the RMF.
● Conducted security assessment interviews to determine the Security posture of the System and to develop a Security Assessment Report (SAR)
● Recommend system enhancements or compensating controls to remediate security deficiencies.
● Research attempted or successful efforts to compromise systems security and design
countermeasures.
● Performed information security risk assessments and assist with the internal auditing
of information security processes. Assessed threats, risks, and vulnerabilities from emerging security issues and also identified mitigation requirements.
● Review and monitor real-time, daily, and historical logs generated from all organizational systems through various Security Information and Event Management
(SIEM) tools.
● Analyze and identify potential intrusions and security violations, both internally and externally.
● Coordinate with the Information Assurance Lead, System Owners, and Configuration
Control Board (CCB) and monitor configuration changes for unauthorized activity.
● Audit and collect evidence to prove compliance with Regulatory Standards. Research,
plan and implement solutions to remedy non-compliance with prescribed security
controls and regulations.
● Work closely with Information Assurance Lead, PMO, and business stakeholders in order to support compliance efforts for various programs.
● Reviewing, maintaining, and ensuring all Assessments and Authorizations (A&A) documentation are included in the system security package.
● Ensure Implementation of appropriate security control for Information System based
on NIST Special Publication 800-53 rev 4, FIPS 200, and System Categorization using
NIST 800-60, and FIPS 199.
● Collaborate with system administrators to remediate (POA&Ms) findings. Ensure
vulnerabilities and risks are efficiently mitigated in accordance with the organization's
continuous monitoring Plan.
● Monitor controls post-authorization to ensure continuous compliance with the security
requirements
Compliance, Processes, Regulatory, Monitoring, Analyst, Assessment, Support, Implementation, Remedy, Design, Security, Security Assessment, Event, Management, PMO, Information Security, Audit, Research
2014 - 2019
job
System Support Analyst
Mikevicone Innovation, Nig Ltd.
Assign Issues to the appropriate support groups for thorough support and prompt
resolution.
● Identify, troubleshoot, research, support, and research customer IT issues.
● Cross-trained and provided backup for other IT support representatives when needed ●
Support users having network and connectivity issues.
● Provided base-level IT supports to both internal and external customers.
● Logged all complaints and informed customers about issue resolution progress.
● Assigned issues to appropriate support groups for thorough support and prompt resolution.
● Researched and analyzed Business, Technical, Functional, and User Interface requirements of a project.
● Created test scenarios, test conditions and expected results, and test cases.
● Executed test scripts and documented results.
● Logged defects and verify defect fixes.
● Supported users having data and network connectivity issues.
● Monitored network performance and troubleshot problem areas as needed.
● Provided first-level support to customers before escalation. ● Active Directory and Exchange user support ● Installed, configured, and troubleshoot software.
● Cross-trained and provided backup for other IT supports representatives when needed.
● Displayed exceptional telephone etiquette and professionalism in answering and resolving technical calls.
● IT maintenance service; configure, install, relocate, upgrade and repair computer
hardware, and peripherals.
● Working on a range of Printers, Computers and Servers by various manufacturers
● Fixing computer issues
● Following servicing schedules and highlighting potential issues which may arise;
● Supporting staff as required
● Review and recommend updates to procedures where appropriate to support users in operating IT equipment and software.
● Providing emergency support on alternate weekends and weekday evenings as/when needed
● Work collaboratively with colleagues to effectively monitor internal systems and network performance
resolution.
● Identify, troubleshoot, research, support, and research customer IT issues.
● Cross-trained and provided backup for other IT support representatives when needed ●
Support users having network and connectivity issues.
● Provided base-level IT supports to both internal and external customers.
● Logged all complaints and informed customers about issue resolution progress.
● Assigned issues to appropriate support groups for thorough support and prompt resolution.
● Researched and analyzed Business, Technical, Functional, and User Interface requirements of a project.
● Created test scenarios, test conditions and expected results, and test cases.
● Executed test scripts and documented results.
● Logged defects and verify defect fixes.
● Supported users having data and network connectivity issues.
● Monitored network performance and troubleshot problem areas as needed.
● Provided first-level support to customers before escalation. ● Active Directory and Exchange user support ● Installed, configured, and troubleshoot software.
● Cross-trained and provided backup for other IT supports representatives when needed.
● Displayed exceptional telephone etiquette and professionalism in answering and resolving technical calls.
● IT maintenance service; configure, install, relocate, upgrade and repair computer
hardware, and peripherals.
● Working on a range of Printers, Computers and Servers by various manufacturers
● Fixing computer issues
● Following servicing schedules and highlighting potential issues which may arise;
● Supporting staff as required
● Review and recommend updates to procedures where appropriate to support users in operating IT equipment and software.
● Providing emergency support on alternate weekends and weekday evenings as/when needed
● Work collaboratively with colleagues to effectively monitor internal systems and network performance
It support, Research, Active Directory, Exchange, Service, Test, Printers, Network, Test cases, It, Support, Hardware, Analyst, Backup, Software, Customer
My education
2021
-
2022
UNIVERSITY OF SUNDERLAND, MSC, Data Science
Protestant University of West Africa
BSc, Computer
BSc, Computer
adedeji's reviews
adedeji has not received any reviews on Worksome.
Contact adedeji michael
Worksome removes the expensive intermediaries and gives you direct contact with relevant talent.
Create a login and get the opportunity to write to adedeji directly in Worksome.
38000+ qualified freelancers
are ready to help you
Tell us what you need help with
and get specific bids from skilled talent in Denmark