Investigated computer security incidents as they occurred, analyzed root cause of incidents, documented findings and recommended corrective actions.
Worked closely with fellow security personnel to remedy and alleviate technology issues.
Mentored junior employees in departmental activities and procedures.
Analyzed security procedure violations and developed plans to prevent recurrence.
Investigated information security breaches to identify vulnerabilities and evaluate damage.
Collaborated with stakeholders to implement and update disaster recovery plans.
Reviewed security bulletins and vulnerability patch releases.
Analyzed system risk to identify and implement appropriate security countermeasures.
Developed and implemented security policies, procedures and standards to protect the organization's information systems from unauthorized access, modification and destruction.
Penetration Tester
Mikkado Plaza
06.2023 - 11.2024
Conducted manual and automated vulnerability assessments using industry standard tools such as Nessus, Metasploit, Nmap, Burp Suite.
Performed penetration tests on different types of networks using various toolsets such as Kali Linux, Backtrack.
Reviewed system logs to detect suspicious activity or unauthorized access attempts.
Demonstrated advanced understanding of business processes, internal control risk management, IT controls and related standards.
Explored possible attack vectors in order to exploit vulnerable systems and networks.
Consulted with customers on how to improve security posture and delivered follow-up support during implementation.
Delivered recommendations for enhancements to IT security environments to prevent successful attacks.
Applied knowledge of operating systems, networking protocols and security best practices to identify potential threats.
Designed and delivered innovative security solutions across cyber security functions with focus on threat detection and network security.
Provided technical guidance to development teams during the software development life cycle.
Compiled detailed reports of results including remediation recommendations and risk mitigation strategies.
Assisted in developing policies related to data privacy and information security management systems.
Evaluated existing network infrastructure for weaknesses and developed countermeasures to protect against malicious attacks.
Analyzed application source code for potential vulnerabilities by utilizing static code analysis tools such as Fortify SCA.
Identified security flaws in web applications through manual testing techniques like Cross-site Scripting, SQL Injection.
Developed tools and resources to augment and improve testing process and configured existing tools and resources to perform more securely.
Trained personnel on effective use of security measures including password protection techniques.
Communicated findings and strategy to stakeholders, technical staff and executive leadership.
Performed network, application, system and mobile penetration testing across company's product suite.
Wrote custom scripts to automate tasks related to finding new vulnerabilities and enhanced toolkits and processes.
Monitored security alerts from intrusion detection, prevention systems for any suspicious activities or events.
Investigated incidents involving compromised accounts or other security breaches.
Researched new technologies related to cyber defense mechanisms and provided feedback accordingly.
Maintained a library of known exploits and kept it up-to-date with the latest developments in cybersecurity field.
Recommended secure solutions based on customer requirements while ensuring compliance with industry standards such as PCI DSS, HIPAA.
Identified and evaluated complex business and technology risks, internal controls to mitigate risks and related opportunities for internal control improvement.
Developed test plans, identified risks and reported findings to stakeholders.
Introduced process efficiencies into existing methodologies and recommended improvements to testing workflows.
Cybersecurity Intern
Cyber Security Ghana
10.2022 - 11.2022
Made recommendations to improve security procedures and systems.
Analyzed system risk to identify and implement appropriate security countermeasures.
Engaged in the encryption of sensitive information to protect against unauthorized access.
Assisted in the evaluation and recommendation of new security technologies and tools.
Worked closely with fellow security personnel to remedy and alleviate technology issues.
Participated in IT and cybersecurity meetings and provided input on security matters.
Developed and implemented security protocols to protect corporate networks and systems.
Collaborated with IT teams to ensure data integrity across multiple platforms.
Investigated information security breaches to identify vulnerabilities and evaluate damage.
Monitored network traffic for suspicious activities and potential threats, reporting findings to senior staff.
Performed regular system scans to detect potential cyber-attacks and intrusions.
Assisted in developing and delivering cybersecurity awareness training for employees.
Evaluated the effectiveness of existing security infrastructure by running penetration tests.
Provided technical advice on cyber defense strategies, tools, and technologies.
Conducted risk assessments of existing information systems.
Collaborated with stakeholders to implement and update disaster recovery plans.
Collaborated with IT team to ensure the security of software applications and databases.
Supported the audit of systems and security measures for effectiveness and compliance.
Configured firewalls to protect against external attacks and malware infections.
Designed, implemented, and maintained security systems and controls.
Implemented software patches to address identified system vulnerabilities.
Analyzed security procedure violations and developed plans to prevent recurrence.
Investigated new methods of authentication such as biometrics or two-factor authentication.
Documented processes for responding to cyber threats in accordance with industry standards.
Built firewalls and encrypted data to secure confidential information.