Olumuyide Omole


Location

Chicago, IL
Shorewood, IL
Education
    Northwestern University
    September 2017 - May 2019
    degree
    Master's
    major
    Information Technology (IT)
    Lagos State
Work Experience
    US Air Force Honor Guard
    Cybersecurity Specialist
    Chicago, IL, United States, 60642
    May 2024 - present
    company
    US Air Force Honor Guard
    title
    Cybersecurity Specialist
    overview
    Responsibilities: • Monitored and managed access control for secure facilities, ensuring compliance with Air Force and DoD security protocols to prevent unauthorized access. • Conducted regular security assessments, vulnerability analysis, and threat mitigation planning, protecting sensitive data and classified information from potential risks. • Collaborated with internal and external security teams to uphold Air Force standards in cybersecurity, physical security, and incident response, contributing to the protection of both personnel and information assets. Achievements: • Implemented an enhanced access control system, reducing security breach incidents by 20%. • Recognized for exceptional performance in maintaining facility security and operational integrity. • Played a key role in training team members on cybersecurity best practices, resulting in improved overall team awareness and a decrease in phishing incidents. Relevant Skills: • Physical Security: Skilled in managing and operating security screening and access systems. • Cybersecurity: Knowledgeable in data protection strategies, DoD cybersecurity policies, and secure communications within military networks. • Risk Management: Experienced in identifying and addressing security risks, with a focus on compliance with DoD and Air Force regulatory frameworks. • Incident Response: Proven ability to quickly and effectively respond to security incidents, conducting detailed analysis and reporting for upper command.
Skills
Acceptance TestingAccess ControlsActive Directory Federation ServicesAgile MethodologyAmazon Web ServicesAntivirus SoftwaresApple IOSApple Mac SystemsApplication Programming Interfaces (APIs)Architectural DesignArchitectureAuditing SkillsAudit TrailAutomationAutomation of TestsAzure Active DirectoryBenchmarking SkillsBusiness ContinuityBusiness ProcessesBusiness RequirementsCarrying out AssessmentsCertified Information Security ManagerCitrix SystemsClassified InformationCloud ComputingCloud Computing SecurityCloud Platform SystemCloud ServicesCode ReviewCommunications SecurityComputer ArchitectureComputer NetworksComputer SecurityConfidentialityConsultingContinuous IntegrationCoordination SkillsC++ (Programming Language)Creative StrategiesCryptographyC Sharp (Programming Language)Customer Relationship ManagementCyber WarfareDashboardsData AnalysisDatabasesData LossData ProtectionDdosDevOpsDevsecopsDomain Name System (DNS)Dynamic Application Security TestingElectrical SwitchesEnterprise ArchitectureEnterprise Data ManagementFederal Information Processing Standards (FIPS)Federal Information Security Management ActFile SystemsFirewalls (Computer Science)Gap AnalysisGoogle CloudGovernanceGraphic DesignHard Work and DedicationHealth Insurance Portability and Accountability Act ComplianceIdentity and Access ManagementIncident ResponseInformation SystemsInformation TechnologyInformation Technology AuditInfrastructure ManagementIntrusion Detection and PreventionISO/IEC 27001JavaScript (Programming Language)JIRAKanbanKnowledge of Electrical EngineeringKnowledge of EngineeringKnowledge of Standards ComplianceLeadershipLoad BalancingManagement of ChangesMicrosoft AzureMicrosoft WindowsMilitary ExperienceMitigating ControlMitre Att&ckMobile Application SoftwareMulesoftMultitier ArchitectureNational Institute of Standards and TechnologyNetwork ArchitectureNetworking SkillsNode.JsOktaOpen Source TechnologyOpen Web Application SecurityOperational Risk ManagementOperational SystemsOperations and Management PlatformOperations ManagementOperations SecurityOracle ApplicationsPCI Data Security StandardsPerformance ManagementPhishingPhysical SecurityPhysicsPostgreSQLPresentationsPrimary ResearchPrioritization of RequirementsProblem SolvingProduct DesignProduct LifecycleProduct ManagementProject ManagementPublishing SkillsPython (Programming Language)Query LanguagesReactJSRegulatory ComplianceResearch SkillsRisk AnalysisRisk ManagementRisk MatrixRSA (Cryptosystem)Safety PrinciplesScrum MethodologySecure CodingSecurity AdministrationSecurity Assertion Markup Language (SAML)Security AuditsSecurity ControlsSecurity EngineeringSecurity Information and Event ManagementSecurity ManagingSecurity PoliciesSecurity Requirements AnalysisSecurity StrategiesSecurity SystemsSecurity TestingSelf MotivationSingle Sign-OnSoftware DebuggingSoftware DeploymentSoftware SecuritySoftware System Penetration TestingSoftware SystemsSoftware TestablitySoftware Vulnerability ManagementSolution ArchitectureSonarQubeSplunkSQL DatabasesStakeholder ManagementStandardizationStandard Operating ProceduresStatic Application Security TestingStrategic ManagementStrategic ThinkingStrategies of TestingStreamlineSystem SafetySystems Development Life CycleSystem SoftwareTablet ComputersTechnical SupportTerraformTesting SkillsTraffic FlowTransport Layer SecurityTriageUser AccountsVeracodeVirtual Private Networks (VPN)VmwareVulnerabilityVulnerability AnalysisWaste ManagementWeb ApplicationsWindows MobileWireless Communications