Adebowale Adebiyi personal email
- Valid
Adebowale Adebiyi phone numbers
Cyber Security engineer with over 15 years of experience, who has always achieved performance expectations and frequently exceeds them. Demonstrates performance at a very high level of quality in all areas, with a track record of excellence and recognized to be a great asset in every opportunity.A self starter, diligent, goal achiever that goes above and beyond to get the job done.
Consultant
-
Cyber Security EngineerConsultant Aug 2018 - Present•Hands-on management experience with endpoint security tools like CrowdStrike, Carbon Black, Tanium, Fidelis, Fire Eye, Microsoft Defender, Symantec, and Trend Micro.•Work as part of a collaborative, cross-functional, modern engineering team e.g., CSIRT and PSIRT•Deliver service and provide recommendations on Strategy and process design for continuous enhancement and deliverability. •Ability to configure, patch, and provide administration of Tanium/Endpoint Security•Understand and preferably leverage scripting or programming languages as needed for integration or automation.•Firewall management and security•Troubleshooting complex enterprise-level routing environments, TCPIP fundamentals, and network designing.•Perform advanced problem determination, resolution, and root cause analysis.•Created dashboards, alerts, scheduled searches, and onboard log sources on several SIEM applications eg, Splunk, Rapid7, ArcSight, QRadar, Exabeam, McAfee ESM, AlienVault, ELK, LogRhythm.
-
Information Security Engineer Soc L3Compucom Oct 2016 - Jul 2018Fort Mill, Sc, UsP• Performed log analysis, event management, reporting, and threat analysis using different security tools.• Designed, implemented, and maintained enterprise-level firewall solutions to protect critical network infrastructure, ensuring compliance with security policies and regulatory requirements.• Managed Intrusion Detection and Prevention Systems (IDS/IPS), continuously monitoring network traffic for suspicious activities and responding to security incidents promptly.• Conducted vulnerability assessments and penetration testing to identify security weaknesses, providing actionable recommendations for remediation to reduce risk exposure.• Administered AWS Identity and Access Management (IAM) to control user access and permissions in cloud environments, ensuring secure and compliant access to AWS resources.• Developed and enforced endpoint security policies, deploying antivirus, anti-malware, and encryption solutions to safeguard endpoints against threats.• Collaborated with cross-functional teams to implement security best practices and hardening measures, enhancing the overall security posture of the organization.• Implemented and managed security information and event management (SIEM) systems to centralize security event logging and facilitate real-time threat detection and analysis.• Conducted security awareness training for employees, educating them on best practices and maintaining a secure work environment.• Performed regular security audits and risk assessments, generating detailed reports and presenting findings to senior management.• Coordinated incident response efforts, leading investigations into security breaches and developing strategies to prevent future occurrences.• Developed and maintained comprehensive security documentation, including policies, procedures, and incident response plans, to ensure a structured approach to information security management. -
Network Security Analyst IiNec Corporation Oct 2015 - Oct 2016Tokyo, JpI created and managed role-based access control (RBAC) strategies to ensure appropriate access levels for users.Managed and maintained Active Directory infrastructure, including user accounts, groups, and organizational units (OUs).Implemented and enforced Group Policies to control user and computer configurations within the network.Generated detailed reports on endpoint security incidents and trends, providing actionable insights to management.Performed root cause analysis on EDR alerts to prevent future incidentsDeveloped and enforced security policies for endpoint protection, ensuring compliance with organizational standards.Conducted proactive threat hunting to identify and mitigate potential security threats using EDR data.Responded to security incidents detected by EDR, including containment, eradication, and recovery.Deployed and configured EDR solutions to monitor and respond to security threats on endpoints.Conducted regular network vulnerability assessments to identify and remediate security weaknesses.Utilized vulnerability scanning tools to assess the security posture of network devices and systems.Improved system performance and availability by fine-tuning SIEM configurations and optimizing system resourcesMaintained a working knowledge of emerging trends and technologies related to SIEM and machine data analytics.Provided technical support and troubleshooting for POS hardware and software issues, resolving problems quickly to maintain business continuity.Conducted regular updates and patches for POS software to ensure compliance with security standards and improve system performanceManaged the installation, configuration, and maintenance of POS systems across multiple retail locations, ensuring seamless operation and minimal downtime. -
Information Security Engineer Soc L1Compucom Aug 2013 - Jul 2015Deployed and managed intrusion detection and prevention systems to identify and block malicious activities.Orchestrated incident response procedures to swiftly address security incidents and minimize potential damage.Investigated security breaches, analyzed root causes, and recommended corrective actions.Monitored network traffic for anomalies and performed in-depth analysis to identify potential security threats.Implemented monitoring tools to enhance real-time visibility into network activities.Configured and maintained virtual private network (VPN) connections to ensure secure remote access.Created and maintained comprehensive documentation of firewall configurations, policies, and incident reports.Generated regular reports on security metrics, vulnerabilities, and incidents for management reviewImplemented and maintained firewall policies, rules, and access controls to secure network infrastructure.Troubleshoot and maintain all network devices and systems.Firewalls: Palo Altos, Checkpoint, Sophos, Juniper, Cisco and FortinetSIEM - ESM and SplunkMonitoring tools: Nagios, Snort and SolarWindsIDS/IPS: Cisco Sourcefire and FireEyeEDR: CarbonBlack Ticketing system: ServiceNowKnowledge areas: Network Basics, TCP/IP Protocols, Routing and Switching, IP Addressing, Network Security, Subnetting and Super netting, DNS, NAT, QOS, Wi-Fi and Wireless Networking, Network Troubleshooting and Network Virtualization.
-
Network Security AdminSurpass Investments May 2011 - Jul 2013• Open customer accounts by recording account information• Attract potential customers by answering product and service questions: suggesting information about other products and services• Maintain customer records by updating accounting information• Resolves product or service problems by clarifying the complaint: determining the cause of the problem, selecting and explaining the best solution to solve the problem; expediting correction or adjustment: following up to ensure resolution.• Maintain financial accounts by processing customer adjustments• Recommend potential products or services management by collecting customer information and analyzing customer needs• Prepare product or service reports by collection and analyzing customer information Provide thorough support and problem resolution for associates and field reps. • Setup multiple mobile devices that included software needed for the field reps. • Setup desktops and laptops for District Managers and Anderson Associates • Replace/Repair defective hardware and software. • Provide necessary documentation related to support and installations
-
Network Administrator/ LogisticsPonti & Co Italware Aug 2007 - Dec 2011• Efficient in troubleshooting network issues/problems (TCP/IP, Ethernet)• Ability to implement and configure VLAN’s and Subnets.• Solve complex IT issues and clearly define strategic and tactical IT solutions/recommendations• Installation and support LANs, WANs, network segments, Internet, and intranet systems • Network Communications/bandwidth usage• Directory services (AD, DNS, LDAP) • Basic knowledge of network hardware and Server 2008 and above• Implemented the knowledge of DNS, Active Directory, Exchange, NTFS file permissions, Remote Desktop, VPN, Network cabling, Network switching, Printers local and network• Troubleshoot routing loop, Asymmetric Routing and STP loop issues• Configuring/Troubleshooting Routing protocols – EIGRP, OSPF, BGP• Configuring/Troubleshooting Network Security – IPSec VPN, AAA Architecture, TACACS+, RADIUS• Overall Cisco Networking products (Router, Switches, Firewall, VOIP), Avaya communication products and Legacy network devices
Adebowale Adebiyi Skills
Adebowale Adebiyi Education Details
-
Olabisi Onabanjo UniversityComputer Science -
Dallas CollegeComputer Systems Networking And Telecommunications
Frequently Asked Questions about Adebowale Adebiyi
What company does Adebowale Adebiyi work for?
Adebowale Adebiyi works for Consultant
What is Adebowale Adebiyi's role at the current company?
Adebowale Adebiyi's current role is Cyber Security Engineer, CEH | Active Security Clearance| AWS Certified Security | CISA | CC | Security +.
What is Adebowale Adebiyi's email address?
Adebowale Adebiyi's email address is ad****@****hoo.com
What is Adebowale Adebiyi's direct phone number?
Adebowale Adebiyi's direct phone number is +168220*****
What schools did Adebowale Adebiyi attend?
Adebowale Adebiyi attended Olabisi Onabanjo University, Dallas College.
What skills is Adebowale Adebiyi known for?
Adebowale Adebiyi has skills like Microsoft Office, Microsoft Excel, Network Administration, Network Security, Tcp/ip, Dns, Dhcp, Troubleshooting, Security, Microsoft Sql Server, Javascript, Vmware.
Free Chrome Extension
Find emails, phones & company data instantly
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial