Oseloka Obiora work email
- Valid
- Valid
Oseloka Obiora personal email
Oseloka Obiora phone numbers
RiverSafe provides expertise across our three practices: Cyber Security, Application Security, and DevOps. As CTO and Co-founder, I lead our technology vision, making sure we deliver the services our clients need to solve their most complex challenges and maximise the impact of their technology investments. My role is to ensure our solutions are not only effective but forward-looking, so our clients stay resilient in a rapidly evolving digital landscape.While my background is in large-scale network security, threat management, and SOC (Security Operations Centre) maturity, my focus as CTO is much broader. I work closely with our team across all our practice areas—cybersecurity, application security, and DevOps—to ensure our services align with clients' real-world needs, creating lasting value and supporting their long-term success.Both my co-founder, Suid, and I believe that people are our most important asset. I’m passionate about investing in the growth and development of our team and it’s incredibly rewarding to see individuals progress in their careers, deepen their expertise, and make a positive impact—wherever their journey takes them.Sustainability is also central to my approach, and I’m committed to the role technology and business play in building a sustainable future.
-
Chief Technology OfficerRiversafe Limited Aug 2022 - PresentLondon, London, Gb -
Director Of OperationsRiversafe Limited Jul 2016 - Aug 2022London, London, Gb -
Founder And Principal Security ConsultantRiversafe Limited Aug 2008 - Jul 2016London, London, GbRiverSafe is an Information Security Consultancy that specializes in Network Security, Threat and Vulnerability Management, Security Event Information Management and Big IT Data Analysis solutions. We work in a variety of environments (Financial Services, Telecommunications, Oil & Gas, Healthcare & Consumer Lifestyle, Education, Utilities, Government), implementing solutions for large Data Centres, Process Control Networks (SCADA), and highly critical financial transaction data networks. We pride ourselves in our ability to configure each one of these technologies to present security event information in a manner that is highly relevant to clients. Our goal is to create accurate threat monitoring in the most efficient and cost effective manner possible.Through careful consultancy we help organisations build and mature their security operations and realise effective protection against cyber threats real to their business.We take pains to understand the business, applications and services of our clients, and we work closely with Risk Management bodies to translate their efforts into active monitoring. We ensure that any proposed technology is fit for purpose and that it satisfies not just security requirements but operational and process requirements as well.Our team of high skilled consultants come from diverse backgrounds in the Information Security space and together we offer a rich perspective and delivery capability. -
Security Architect Sintel ProgrammePhilips Mar 2014 - Jul 2014Amsterdam, Noord-Holland, NlI was responsible for the development of the logging and monitoring architecture for the Security Intelligence Programme. I also lead the development of the technical requirements, processes and principles Logging as a service and SIEM as a service initiatives. Building out the RFP and conducting the workshops with vendors bidding for this work. I supported the Enterprise Security Architect in developing the roadmap for SINTEL programme -
Threat ExpertDeutsche Bank May 2012 - Mar 2014Frankfurt Am Main, Hessen, DeI was responsible for developing the threat detection standard for the E-Commerce, staff browsing, extranet, and remote access perimeters. I provided consultancy for a number of work streams for the migration of services from the Managed Security Service to the newly created in-house SOC. In addition to this I was responsible for creating the use cases for the SOC SIEM. I also developed the roadmap for further enhancing Network Security monitoring. -
Threat SpecialistBetfair Feb 2012 - May 2012London, England, GbMy role here was to deliver threat analysis on the output of core monitoring tools, in the Network Behaviour Anomaly and NIDS space. Malware analysis and remediations. Provide guidance on optimising the overall approach to threat analysis. Ad hoc training for junior analysts. -
Security ArchitectRoyal Bank Of Scotland Gbm Jun 2009 - Dec 2011Gogarburn, Gb- Design and implementation of the Enterprise Threat Management platform- Consulting on network security monitoring for infrastructure changes and growth.- Creating standards for threat monitoring and deployment of the platform- Translating compliance standards into real-time monitoring configurations -
Threat Management ConsultantRoyal Bank Of Scotland Gbm Jan 2009 - Jun 2009Gogarburn, Gb -
AssociateHp Information Security 2009 - 2011
-
Information Security ConsultantBp Aug 2004 - Sep 2008London, England, GbMy core roles consisted of the architecture and implementation of the global IPS and Passive Vulnerability scanning solution, the development of the global Vulnerability Management, Penetration testing platform and of the Security Event Information Management platform. I was also responsible for developing the network leakage detection solution (with rogue wireless AP detection), and the Community Defence Initiative subscription. -
Security EngineerReuters 2003 - 2004Toronto, On, CaDuring this time my main responsibilities included the design and implementation of networks and the accompanying network security infrastructure for a number of environments, Disaster Recovery implementations, a review of the security management architecture as well as Firewall technology evaluations. I was also responsible for developing Network Security Standards and my worked formed part of the risk assessment process for new applications/environments. -
Senior Information Security AnalystIbm Global Business Process Services Apr 2001 - Mar 2003Security Architecture - Designed a number of security solutions ranging from Internet Gateway clusters, Third-Party access (token based authentication), VPN and Extranet development, website security, content filtering and AVCorporate Security Standards for platform security (NT and Solaris).Enterprise Firewall Management - Firewall management consolidation with redundancy.Intrusion Detection - Designed and deployed NTL’s first ever enterprise IDS utilising Snort with ACID console. Other Open Source tools developmentOS Hardening and host-based firewalls and setting up computer forensics with Tripwire.VPN Management
Oseloka Obiora Skills
Oseloka Obiora Education Details
-
Information Security Consortium (Isc)2Information Security -
Global Information Assurance Consortium (Giac)Information Security And Incident Response -
Cisco (Ccna)Interconnecting Cisco Network Devices -
Azlan (Ccse)Network Security -
University Students CareersMechanical Engineering
Frequently Asked Questions about Oseloka Obiora
What company does Oseloka Obiora work for?
Oseloka Obiora works for Riversafe Limited
What is Oseloka Obiora's role at the current company?
Oseloka Obiora's current role is Co-Founder & CTO at RiverSafe Limited.
What is Oseloka Obiora's email address?
Oseloka Obiora's email address is oo****@****e.co.uk
What is Oseloka Obiora's direct phone number?
Oseloka Obiora's direct phone number is +4420363*****
What schools did Oseloka Obiora attend?
Oseloka Obiora attended Information Security Consortium (Isc)2, Global Information Assurance Consortium (Giac), Cisco (Ccna), Azlan (Ccse), University Students Careers.
What skills is Oseloka Obiora known for?
Oseloka Obiora has skills like Information Security, Network Security, Security, Firewalls, Penetration Testing, Computer Security, Siem, Ids, Vulnerability Assessment, Vulnerability Management, Ips, Information Security Management.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial