IT Security and Compliance Analyst | Identity and Access Management Engineer | SOC Analyst |
Dynamic and results-driven IT Security and Compliance with extensive expertise in Cybersecurity Risk Management, Third-Party Risk Management, Security Audits, Vulnerability Management, Identity and Access Management (IAM), and Data Security (DLP). Passionate about implementing advanced security solutions to safeguard organizations against various cyber threats. I seek to leverage my multidisciplinary skills to enhance organizational resilience, drive continuous security improvement, and proactively mitigate cyber risks.
Seeking to advance my expertise in Security Operations Center (SOC) management, Threat Hunting, Incident Response, and Red Teaming, with a focus on proactive defense strategies, adversary emulation, and enhancing organizational cybersecurity posture
Identity and Access Management Projects:
Domain | Project Title | Skills | Link |
---|---|---|---|
GRC/Identity and Access Management | Automating an Audit-Driven Identity and Access Management Framework in Active Directory with Enhanced Security and Compliance | IAM, Active Directory, SIEM, Splunk, Audit, PowerShell | https://github.com/Samuel-Adeola/GRC-Identity_Access_Management_Project |
Active Directory Management | Active Directory Domain Services (AD DS) Implementation and Management for Organizational User and Resource Structure Using Agile Methodology | Active Directory, PowerShell Automation, Project Management | https://github.com/Samuel-Adeola/IAM_ActiveDirectory_ProjectLabs- |
SIEM Projects:
Project Title | Skills | Link | |
---|---|---|---|
SOC Analyst Projects:
Project Title | Skills | Link | |
---|---|---|---|
Threat Hunting Projects:
Project Title | Skills | Link | |
---|---|---|---|
Cybersecurity HomeLab Set-up | CloudSecurity_AWS-Terraform_Lab | Automation, AWS Services, Terraform | https://github.com/Samuel-Adeola/CloudSecurity_AWS-Terraform_Lab- |
Threat Hunting and In-Depth Investigation | Threat Hunting and Investigation: Detecting Malicious Documents embedded with macro Using Sysmon Event Monitoring and Splunk Visualization for Real-Time Analysis | SIEM Implementation, log analysis, Threat Hunting, Splunk | https://github.com/Samuel-Adeola/ThreatHunting-MaliciousDocument |
Trainning | Focus Areas | Tools | Resource |
---|---|---|---|
Identity and Access Management | AD, Micosoft Entra ID, CIAM | AD, Micosoft Entra ID | https://www.udemy.com/course/sc-300-course-microsoft-identity-and-access-administrator/?couponCode=ST21MT30625G1, |
Information Security Specialist | Information security, Identity and Access Management, Risk management, Asset Management and Data Classification, Business Continuity Management, Security Audit and Testing | https://app.letsdefend.io/ | |
SIEM Engineer | Log monitoring and analyzing, Threat hunting, Network security, SOAR | Splunk, Wazuh, TheHive, IBM QRadar | https://app.letsdefend.io/ |
Security Operation Center (SOC) Analyst | Log Monitoring and Analysis, Threat Hunting, Vulnerability Management, Incident Detection and Response | ||
Certified Information Systems Auditor (CISA) | IT governance, Risk assessment, and Auditing principles, Data security, and resource planning | Sponsored by Manitoba Agricultural Services Corporation https://skillsetsonline.com | |
Governance, Risk, and Compliance (GRC) Mastery | Risk Management, Third-Party Risk Management, Security Audits, and Data Security (DLP), NIST framework, ISO/IEC 27001, CIS | (https://www.grcmastery.com) | |
Agile Methodology and Software Life Cycle Development, DevOps, and AWS Cloud Engineering | (www.mylandmarktech.com) | ||
