Profiles search
OLUSOLA ADANIKIN
Lead Information Security Analyst at NIH.
Ft. Washington, MD, United States
Details
Education:
Bachelor of Engineering - (BE)
Electrical and Electronics Engineering
Federal University of Technology Akure
Master's degree
Cybersecurity
University of Maryland Global Campus
Electrical and Electronics Engineering
Federal University of Technology Akure
Master's degree
Cybersecurity
University of Maryland Global Campus
Experience:
Serves as a lead Information Security SME (Vulnerability Management/IT Security Continuous Monitoring).
▪ Maintain a comprehensive asset inventory list.
▪ Lead the Vulnerability Management Team (VMT) to ensure NBS Workstations and Servers vulnerabilities are remediated within the NIH remediation timeframes.
▪ Performs scans using Tenable.sc+ to detect vulnerabilities, non-compliant server configuration settings, and potential risks on single or multiple assets across the enterprise network.
▪ Coordinate scan results with the NIH Center for Information Technology (CIT), Operations and Maintenance team, Infrastructure team, Project team, and ISSO, and respond to DHS Binding Operational Directives (BOD).
▪ Review the Change Request (CR) and ensure the Requirements Traceability Matrix (RTM) captures all requirements proposed by the clients before approval.
▪ Performs security log reviews and systems audit work to verify all systems are configured properly and operating at the latest patch levels.
▪ Monitors and reviews Privileged users using Splunk Enterprise.
▪ Monitors Windows, Oracle Enterprise Linux (OEL), and Solaris servers to certify servers are up and running using EM7, BigFix, Splunk, etc.
▪ Monitors IT Security systems, appliance and technology performance, and health.
▪ Review logs, incident handling, alarm triage, and security tools monitoring.
▪ Document and track security issues using enterprise ticketing tools such as SharePoint and ServiceNow.
▪ Design dashboards to monitor and identify potential threats, suspicious activities, and failed log-on attempts using Splunk.
▪ Assist ISSO and Alt+ISSO in responding to ATO, FISCAM/A123 PBCs and provides any additional support as required.
2021 : Present
National Institutes of Health
Lead Information Security SME (Vulnerability Management/IT Security Continuous Monitoring)
Served as an Information Security SME (Vulnerability Management/Audit and Accountability). Coordinated scan results with the NIH Center for Information Technology (CIT), Operations and Maintenance team, Infrastructure team, and Project team.
▪ Daily Tenable reports are analyzed for new vulnerabilities and verified vulnerability remediation.
▪ Proactively reviewed NBS security tools such as Tenable.sc, Splunk, EM7, BigFix, and Carbon Black on a weekly basis.
▪ Performed security log reviews and systems audit work to verify all systems are configured properly and operating at the latest patch levels.
▪ Reviewed Privileged users using Tenable Log Correlation Engine (LCE).
2020 : 2021
National Institutes of Health
Information Security SME (Vulnerability Management/Audit & Accountability)
2015 : 2020
U.S. Army
U.S. Army Sergeant
2012 : 2015
U.S. Army
U.S. Army Specialist
Served as a Security Analyst, monitored network traffic, applications systems, databases, Intrusion Detection Systems (IDS), security events, and logs to identify intrusions, potential anomalies, or unauthorized network traffic patterns. Assessed security events to determine impact and implement corrective actions.
▪ Analyzed evidence of suspicious behavior and identified and reported events that occurred within the enterprise network.
▪ Monitored security sensors and reviewed Firewall logs, Wireless logs, dpids1& 2, azids, rvids1 & 2, and gtids1 to identify intrusions.
▪ Managed systems classification and categorization using risk management frameworks(RMF) processes to certify system confidentiality, integrity, and availability (CIA).
▪ Verified system alerts and reviewed Datawatch S2 security report.
▪ Conducted vulnerability assessments, system security evaluations, audits, and reviews.
▪ Documented and tracked security issues using an enterprise ticketing tool such as Jira.
▪ Developed dashboards using ELK to identify any suspicious activity.
2015 : 2020
DrFirst, Inc.
Security Analyst
▪ Maintain a comprehensive asset inventory list.
▪ Lead the Vulnerability Management Team (VMT) to ensure NBS Workstations and Servers vulnerabilities are remediated within the NIH remediation timeframes.
▪ Performs scans using Tenable.sc+ to detect vulnerabilities, non-compliant server configuration settings, and potential risks on single or multiple assets across the enterprise network.
▪ Coordinate scan results with the NIH Center for Information Technology (CIT), Operations and Maintenance team, Infrastructure team, Project team, and ISSO, and respond to DHS Binding Operational Directives (BOD).
▪ Review the Change Request (CR) and ensure the Requirements Traceability Matrix (RTM) captures all requirements proposed by the clients before approval.
▪ Performs security log reviews and systems audit work to verify all systems are configured properly and operating at the latest patch levels.
▪ Monitors and reviews Privileged users using Splunk Enterprise.
▪ Monitors Windows, Oracle Enterprise Linux (OEL), and Solaris servers to certify servers are up and running using EM7, BigFix, Splunk, etc.
▪ Monitors IT Security systems, appliance and technology performance, and health.
▪ Review logs, incident handling, alarm triage, and security tools monitoring.
▪ Document and track security issues using enterprise ticketing tools such as SharePoint and ServiceNow.
▪ Design dashboards to monitor and identify potential threats, suspicious activities, and failed log-on attempts using Splunk.
▪ Assist ISSO and Alt+ISSO in responding to ATO, FISCAM/A123 PBCs and provides any additional support as required.
2021 : Present
National Institutes of Health
Lead Information Security SME (Vulnerability Management/IT Security Continuous Monitoring)
Served as an Information Security SME (Vulnerability Management/Audit and Accountability). Coordinated scan results with the NIH Center for Information Technology (CIT), Operations and Maintenance team, Infrastructure team, and Project team.
▪ Daily Tenable reports are analyzed for new vulnerabilities and verified vulnerability remediation.
▪ Proactively reviewed NBS security tools such as Tenable.sc, Splunk, EM7, BigFix, and Carbon Black on a weekly basis.
▪ Performed security log reviews and systems audit work to verify all systems are configured properly and operating at the latest patch levels.
▪ Reviewed Privileged users using Tenable Log Correlation Engine (LCE).
2020 : 2021
National Institutes of Health
Information Security SME (Vulnerability Management/Audit & Accountability)
2015 : 2020
U.S. Army
U.S. Army Sergeant
2012 : 2015
U.S. Army
U.S. Army Specialist
Served as a Security Analyst, monitored network traffic, applications systems, databases, Intrusion Detection Systems (IDS), security events, and logs to identify intrusions, potential anomalies, or unauthorized network traffic patterns. Assessed security events to determine impact and implement corrective actions.
▪ Analyzed evidence of suspicious behavior and identified and reported events that occurred within the enterprise network.
▪ Monitored security sensors and reviewed Firewall logs, Wireless logs, dpids1& 2, azids, rvids1 & 2, and gtids1 to identify intrusions.
▪ Managed systems classification and categorization using risk management frameworks(RMF) processes to certify system confidentiality, integrity, and availability (CIA).
▪ Verified system alerts and reviewed Datawatch S2 security report.
▪ Conducted vulnerability assessments, system security evaluations, audits, and reviews.
▪ Documented and tracked security issues using an enterprise ticketing tool such as Jira.
▪ Developed dashboards using ELK to identify any suspicious activity.
2015 : 2020
DrFirst, Inc.
Security Analyst
Company:
National Institutes of Health
Years of Experience:
14
Skills
Application and Database Monitoring, Attention to Detail, Carbon black, Communication, Conduct vulnerability scans and recognize vulnerabilities in security systems, Cybersecurity, DLP, Em7, Gap Analysis, IBM BigFix, Information Security Analysis, Information Security Awareness, Jira, Linux, Presentations, Security Information and Event Management (SIEM), ServiceNow, SharePoint, Splunk, System Safety, Teamwork, Troubleshooting, Vulnerability, Vulnerability Assessment, Vulnerability Management, Vulnerability Scanning