- Design & Integration of Microsoft 365 services and Azure.
- PIM (Privileged Identity Management) and PAM (Privileged Access Management)
- Service/solution deployment on Azure.
- Proficient in Linux and Windows Operating system configurations and utilities.
- Understanding of Secure Kubernetes/Docker container and CI/CD pipeline deployments.
- Experienced as a Technical Lead for a Microsoft Partner on Security and Compliance, Mail Flow, Azure, and Exchange Online/Hybrid.
* Web Penetration tests and Security audits.
- UpstackCloud Security|M365|Azure|AWS|GCP|DevOps EngineerMay 2021 - Today (3 years and 9 months)• Implemented Security and Compliance, SIEM threat intelligence, and hunting.• Deployed Incident response in a timely and efficient manner.• Delivered 3rd party integration with Office 365 services.• Successfully Performed Penetration testing and security audits on Computer systems and Networks.• Planned, designed, and Created Procedures to provide step-by-step documentation of troubleshooting workflow infrastructure.• Served as a Project Lead for a team of 5 technicians responsible for on premises or cloud migrations.• Served as a project delivery engineer managing all Active Directory tasks and implementation of federation services either with Windows ADFS or other 3rd party IDP like OKTA.• Implemented and Managed Azure, Intune, Office 365 Security and Compliance, Exchange, Teams, SharePoint, and One drive to leverage its full capability.• Installed and managed VPN and Firewall configurations.• Installed and managed EDR\XDR, DLP, and Proxy configurations.• Installed and managed Cloud Infrastructure setup and design.• Installed and managed K8s cluster on GCP.• Deployed Webserver management (NGINX, Apache, and IIS)
- Wazuh, Inc.Information Security ConsultantJuly 2022 - January 2023 (6 months)
- UBA GroupCybersecurity & Forensic Audit, Team MemberAugust 2021 - February 2022 (6 months)Lagos, Nigeria• Installed and managed a mini digital forensics' lab on a virtualized Infrastructure.• Designed and implemented an automated malware analysis lab using the Cuckoo sandbox• Performed and Managed ISO 270001, SOC 2 audits and reviews• Analyzed SOC and SIEM alerts and created custom IOA's/IOC's rules.• Performed behavioral and threat analytics• Anchored white box penetration tests and Dynamic stress testing.• Created additional layers to the already existing Defense-in-Depth• strategy/architecture.• Performed memory and digital forensics on digital shreds of evidence collected.• Involved in UAT (user acceptance tests) and QA testing/evaluations.• Designed scripts for QA quality tests.• Experience working across business units and geographical boundaries to engage team members and stakeholders
- Master of Science in Cyber SecurityRobert Gordon UniversityMaster's degree, Cyber Security
- Master of Science in Cyber SecurityICSI (International CyberSecurity Institute), UK2021Micro Master's, Cyber Security/Computer Forensics
- Bachelor of ScienceBabcock University, Ilishan-Remo, NigeriaBachelor of Science - BS, Computer Technology/Computer Systems Technology