Seasoned Cyber Security Professional with a strong background in protecting enterprise systems and data from cyber threats. With 5 years of experience in the field, I have honed my expertise in threat detection, vulnerability management, and security operations. My proactive approach to security includes conducting comprehensive risk assessments, implementing effective security controls, and staying abreast of emerging threats and industry best practices. Skilled in incident response and digital forensics, I have successfully mitigated numerous security incidents, minimizing their impact on business operations. Collaborative by nature, I thrive in team environments where I can leverage my technical knowledge to drive security initiatives forward. I am committed to staying at the forefront of cyber security advancements and ensuring the confidentiality, integrity, and availability of critical assets for the organizations I serve. Demonstrated expertise in designing, implementing, and managing security frameworks and compliance with NIST, DoD, and other federal regulations. Eager to leverage my extensive background in policy development, risk assessment, and incident response to fortify True Anomaly's cybersecurity posture and compliance initiatives. Other relevant experience includes knowledge of Cybersecurity Frameworks such as NIST 800-53, PCI-DSS, HITRUST, COBIT and ISO-27001.
Rotvol Solutions
-
Cyber Security ConsultantRotvol Solutions Sep 2023 - PresentUnited States• Spearheaded adoption and compliance of NIST SP 800-171, 800-53, and latest Cybersecurity Maturity Model Certification, enhancing security of controlled unclassified information across non-federal systems.• Authored and operationalized over 30 comprehensive System Security Plans (SSPs) and Plans of Actions and Milestones (POA&Ms), resulting in a 40% improvement in audit readiness and risk mitigation.• Improved overall security posture by regularly updating antivirus software, firewalls, intrusion detection systems, and other protective measures as required.• Designed and implemented comprehensive cybersecurity policies and procedures, aligning with industry standards and frameworks to bolster client security postures.• Collaborated with cross-functional teams to ensure seamless adoption of security practices, driving awareness and compliance across client organizations.• Perform analysis of Qualys vulnerability and compliance scans based on criticality and compliancy and tracking all remediation effort.• Ensured regulatory compliance by conducting thorough audits of information systems and security controls.• Worked closely with Chief Information Security Officer (CISO) to develop and execute security initiatives and programs for effective risk management.• Collaborated with software development teams to integrate security best practices into the development lifecycle, reducing vulnerabilities by 30% and enhancing software resilience.
-
Information Security AnalystBeyondsoft Jan 2021 - Sep 2023United States• Monitor security event logs and alerts to identify and investigate potential security incidents.• Conduct thorough analysis of security events to determine the scope, impact, and root cause of incidents.• Coordinate incident response efforts, including containment, eradication, and recovery activities.• Document incident findings, response actions, and lessons learned for continuous improvement.• Assist in the development, implementation, and enforcement of information security policies, standards, and procedures.• Conduct periodic security audits and compliance assessments to ensure adherence to regulatory requirements and industry best practices.• Provide guidance and support to internal stakeholders on security-related matters, including data protection and access control.• Stay abreast of the latest cybersecurity threats, trends, and technologies through continuous monitoring and research. -
Soc AnalystXceedance Aug 2020 - Aug 2021• Analyzed phishing emails including email headers, malware, source code, act as a first responder to system attacks and compromises to determine threat vectors and provide initial remediation.• Escalated incidents when necessary, using policies and procedures, closely involved in developing, tuning, and implementing threat detection analytics.• Monitored security sensors and review logs to identify intrusions.• Conducted scheduled maintenance, upgrades, and patch updates.• Oversaw malware detection, containment, and remediation.• Monitor security alerts and events in real-time using SIEM tools to detect potential threats and incidents.
Ayo Ajayi Education Details
-
Cybersecurity -
Associate Of Arts And Sciences - Aas
Frequently Asked Questions about Ayo Ajayi
What company does Ayo Ajayi work for?
Ayo Ajayi works for Rotvol Solutions
What is Ayo Ajayi's role at the current company?
Ayo Ajayi's current role is Cybersecurity Analyst -GRC | IT Audit | Regulatory Compliance |SAR, SSP, POA&M | Vulnerability Management Incident Response | Security Control| AWS | Linux | QRadar | Python | Network Security | Threat Analysis |PenTest.
What schools did Ayo Ajayi attend?
Ayo Ajayi attended Western Governors University, Houston Community College, Chamberlain University.
Not the Ayo Ajayi you were looking for?
-
1gatesfoundation.org
-
1tesla.com
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial