- Used Bash to examine user activity and file contents, manage, authenticate and authorize users and users groups
- Developed Python functions and algorithms to automate various cybersecurity tasks, enhancing efficiency and responsiveness in the security operations workflow
- Built search queries in Google Chronicle to analyze logs and investigate security events
- Built robust detection rules in Splunk to proactively identify potential threats, trigger alerts, and conduct in-depth
- Meticulously monitored network activities, using tcpdump to capture and analyze network packets, identifying and responding to potential malicious threats
- Examined network logs and signatures with Suricata to detect, send alerts, and block suspicious network traffic
F
Fordham University
Graduate Assistant
Bronx, NY, US
February 2023 - present
P
Polymorph Labs
Product Security Manager
Accra, GH
September 2021 - August 2022
U
University of Ghana Legon
IT Support Officer
Accra, GH
August 2020 - August 2021
Skills
Agile MethodologyAlgorithmsAntivirus SoftwaresAuditing SkillsAutomationBash ShellCloud Computing SecurityCompTIA Security+Computer NetworksComputer SecurityCoordination SkillsEmployee OnboardingFinancial Data AnalysisFirewalls (Computer Science)Hard Work and DedicationIBM System IImmigrationImpact AnalysisIncident ManagementIncident ResponseInformation SciencesInformation TechnologyIntrusion Detection and PreventionIssue Tracking SystemsKnowledge of CampaignsLinuxLog FilesMetasploitMetricsNational Institute of Standards and TechnologyNessusNetwork SecurityNmapOpen Web Application SecurityOperational SystemsPhishingPolicy DevelopmentProject ManagementPython (Programming Language)Regulatory ComplianceResearch SkillsRisk AnalysisRoot Cause AnalysisSafety PrinciplesScrum MethodologySecurity AuditsSecurity AwarenessSecurity Information and Event ManagementSecurity ManagingSecurity PoliciesSelf MotivationSoftware SecuritySplunkSumo Logic (Software)TcpdumpTechnical SupportUser AuthenticationVulnerabilityVulnerability AnalysisWeb Application SecurityWireshark