AGUNBIADE ADEDIRAN PAUL

Cyber Security Engineer
Lagos, NG.

About

Highly accomplished Cyber Security Engineer with over 5 years of experience specializing in developing robust IT security policies, conducting comprehensive risk assessments, and implementing advanced application security measures to safeguard organizational assets. Proven ability to significantly reduce Mean Time to Detect (MTTD) and Mean Time to Respond (MTTR) through efficient monitoring and incident response workflows. Adept at enhancing organizational security posture, managing complex incident investigations, and collaborating cross-functionally to deploy strategic security solutions that ensure data integrity and regulatory compliance (ISO 27001, GDPR).

Work

Vechtron Technologies Ltd
|

Cyber Security Analyst

London, England, United Kingdom of Great Britain and Northern Ireland

Summary

Currently performs comprehensive security assessments and implements advanced security solutions to identify vulnerabilities and ensure regulatory compliance for organizational systems.

Highlights

Executed comprehensive security assessments across systems, networks, and applications, proactively identifying critical vulnerabilities and potential risks to strengthen overall security posture.

Led vulnerability assessments and penetration testing initiatives, resulting in the identification and mitigation of high-priority security risks across critical infrastructure.

Managed the implementation and maintenance of advanced security systems, including firewalls, antivirus, and IDPS, ensuring continuous protection against evolving cyber threats and maintaining 99.9% system uptime.

Developed and enforced robust security protocols and best practices, enhancing organizational adherence to security standards and reducing compliance gaps by 15%.

Collaborated cross-functionally with IT and compliance teams to integrate security controls, achieving 100% regulatory alignment with ISO 27001 and GDPR standards.

Infinion Technologies
|

Cybersecurity Engineer

Lagos, Nigeria, Nigeria

Summary

Developed and enforced IT security policies, conducted risk assessments, and implemented application security measures to safeguard organizational information and technology resources.

Highlights

Developed and rigorously enforced IT security policies, standards, and procedures, enhancing data protection and compliance across all organizational information and technology resources.

Executed regular risk assessments and comprehensive vulnerability analyses, proactively identifying and mitigating critical security weaknesses before exploitation.

Designed and implemented robust application security measures, fortifying organizational systems and sensitive data against emerging threats and reducing attack surface by 20%.

Leveraged Microsoft Sentinel to continuously monitor network and system activities, achieving a 30% reduction in Mean Time to Detect (MTTD) and expediting incident response.

Configured and managed Single Sign-On (SSO) and Multi-Factor Authentication (MFA) solutions, enhancing user access security by 40% and streamlining authentication processes for over 500 users.

Implemented and optimized Advanced Threat Protection (ATP) and Information Protection solutions, including Data Loss Prevention (DLP) policies and Extended Detection and Response (XDR), significantly strengthening security posture and reducing cyber threats by 25%.

Bird Cyber Security
|

Cyber Security Analyst

US

Summary

Performed comprehensive security assessments, utilized advanced monitoring tools, and integrated security controls to protect client systems and data.

Highlights

Executed comprehensive security assessments across diverse systems, networks, and applications, identifying critical vulnerabilities and potential risks to fortify client environments.

Utilized advanced security monitoring tools to detect and analyze a wide range of security incidents, including intrusion attempts and malware infections, reducing detection time by 10%.

Implemented and maintained critical security systems, including firewalls, IDPS, and SIEM platforms, ensuring robust defense mechanisms and continuous threat monitoring.

Conducted regular security audits to evaluate system, network, and process compliance with industry standards and regulatory requirements, ensuring adherence for 95% of audited systems.

Collaborated effectively with IT teams, network administrators, and stakeholders to seamlessly integrate security controls into new and existing system designs, enhancing security from inception.

LampnetS
|

Cyber Security Analyst/Soc Analyst

Summary

Monitored security alerts, analyzed threats, and coordinated incident response activities to enhance organizational security posture.

Highlights

Monitored and analyzed security alerts, threats, and incidents, leading to the timely investigation and resolution of over 50 critical security events.

Coordinated rapid incident response activities, meticulously documenting actions and post-incident analyses to improve future security protocols and reduce recurrence by 15%.

Performed routine vulnerability assessments and scans, identifying and reporting security weaknesses across network infrastructure and applications.

Contributed to the development and maintenance of organizational security policies, ensuring alignment with industry best practices and regulatory mandates.

Participated actively in security awareness training and compliance efforts, contributing to a 5% increase in organizational security posture and employee adherence.

Education

Ladoke Akintola University of Technology
Ogbomoso, Oyo State, Nigeria

Bachelor of Technology

Earth Science

Ladoke Akintola University of Technology
Ogbomoso, Oyo State, Nigeria

Diploma

ICT

Skills

Security Expertise Core Competencies

Vulnerability Assessment, Penetration Testing Risk Assessment, Vulnerability Analysis, Incident Management, Intrusion Detection, Threat Analysis.

Cloud & Regulatory Compliance

Cloud Security (Azure), Regulatory Compliance, OWASP Top 10.

Security Frameworks

IT Security Policy Development, Compliance Monitoring, Regulatory Adherence.

Security Tools

Microsoft Sentinel, Microsoft Defender, Microsoft Intune, Nmap, Wireshark, AWS (IAM, EC2, S3), Splunk.

Programming & Operating Systems

Linux, Python.

Core Competencies

Security Architecture, Digital Initiatives, Vulnerability Assessment, Datacenter Security, IT Risk Assessment, Regulatory Compliance, Process Control, Information Security, Intrusion Detection.