Education
Skills
Timeline
Summary
Work History
Overview
Languages
Certification
CustomerServiceRepresentative

Segun Ladeji

Vaughan,ON

Education

Bachelor of Science - Computer Science

L.A University
Nigeria

Diploma - Health Information Technology

Trioss College
03-2023

Diploma - Cyber Security

Cdi College
Brampton, ON
09-2020

Skills

  • SIEM management
  • Endpoint security
  • Security policies
  • Access control
  • Data protection
  • Security architecture
  • Application security
  • Identity management
  • Incident response
  • Network security
  • Patch management
  • Cryptography
  • Business continuity
  • Ethical hacking
  • Security training
  • Firewall installation

Timeline

Senior Information Security Engineer

Mindbridge Analytics
05.2019 - 05.2025

Information Security Analyst

Royal Bank of Canada
05.2017 - 05.2019

Information Security Analyst

Home Trust Bank
01.2015 - 04.2017

Bachelor of Science - Computer Science

L.A University

Diploma - Health Information Technology

Trioss College

Diploma - Cyber Security

Cdi College

Summary

Security professional well-prepared for high-level responsibilities in protecting organizational assets. Proven track record in developing and implementing robust security strategies. Exceptional focus on team collaboration and adaptability to dynamic environments. Known for analytical problem-solving and proactive defense measures.

Work History

Senior Information Security Engineer

Mindbridge Analytics
05.2019 - 05.2025
  • Developed and implemented security policies and procedures to ensure the safety of company data.
  • Conducted forensic investigations on suspected breaches in security protocols and reported findings to management.
  • Operational Risk management experience.
  • Specialized in Endpoint defender, a professional comprehensive cloud-native endpoint security solution specialist that delivers visibility and AI-powered cyberthreat protection to help stop cyberattacks across Windows, macOS, Linux, Android, iOS, and IoT devices.
  • Specialized in security solutions that help organizations recognize and address potential security threats and vulnerabilities before they have a chance to disrupt business operations (SIEM), and highly proficient in handling and managing SIEM tools, i.e., Splunk Enterprise Security, Rapid 7, Exabeam, Logpoint.
  • Specialized in digital forensics and incident response (DFIR), focused on identifying, remediating, and investigating cybersecurity incidents.
  • Firewall Management.
  • Business Continuity, Disaster Recovery.
  • Information Security Management.
  • Monitored network traffic for suspicious activities and unauthorized access attempts.
  • Analyze security logs (SIEM, system, network) for actionable events (reports, alerts, tickets).
  • Execute penetration tests using a broad range of tools to discover and exploit possible vulnerabilities and weaknesses within cloud, on-premises, and hybrid environments.
  • Perform security monitoring, manage security cases and tickets, and conduct security incident analysis (SIEM, SOC, EDR).
  • Collaborate with Business Architects, Solution Architects, Operations, Maintenance, and Project Execution teams to gather requirements and support planning and scheduling of work.
  • Manage our audit of services and solutions against frameworks such as ISO 27001, SOC 2, GDPR, and CCPA.
  • Respond to incidents across endpoints and server systems (EDR).
  • Acted as team leader in group projects, delegating tasks, and providing feedback.
  • Performing penetration tests against the internal and/or external environment of different organizations, including networks, servers, workstations, applications, APIs, and online/cloud services.
  • Cyber Security Management.
  • Conduct network and application vulnerability assessments. Maintain up-to-date knowledge of security standards, e.g., OWASP, NIST, and other security standards, security testing, and technologies.
  • Conduct security reviews, risk analysis, and controls reviews (ISO, SOX, HIPAA) per policy.
  • Working on enterprise cloud services deployments (SaaS, PaaS, IaaS) and understanding security challenges involved in deploying cloud applications and server virtualization/container orchestration technologies.
  • Write reports including technical details, risk analysis, and providing remediation recommendations for identified issues.
  • Assisted in developing business continuity plans to ensure critical systems remained operational during emergency situations or disruptions.
  • Led efforts to achieve certification in various cybersecurity frameworks, demonstrating the organization''s commitment to securing its systems and data.
  • Performed network troubleshooting to isolate and diagnose common problems.
  • Developed security metrics and technical analysis to give insight into performance and trends.

Information Security Analyst

Royal Bank of Canada
05.2017 - 05.2019
  • Conduct Security Threat and Risk Assessments (TRAs) for third party vendors Products and provide risk report with recommendations
  • Lead risk assessments to measure risk exposures, identify internal control weaknesses, improve control environment and minimize risk of loss events.
  • Led day-to-day operational activities (e.g. Change Management, Vulnerability Management, Risk Management etc.) .
  • Threat Management
  • Control Assessments
  • Operational Risk mgmt experience. Problem Management
  • Business Continuity Disaster Recovery
  • Performed security design/architecture reviews, code reviews, and penetration tests of large applications, systems and/or networks.
  • Develop and maintain GRC programs and Information Security policies and procedures, and work with policy owners to update current policies and procedures to further improve data security .
  • Develop recommendations on effective control design and operational risk management best practices .
  • Support development of key performance and risk indicators for executive and board level dashboards and control maturity scorecards will be included within your mandate.
  • Support reviews conducted by Internal Audit and Compliance as well as external auditors and regulators .
  • Led Interface with client and external assessors to coordinate security audits and assessments.
  • Accountable for consultation and issue resolution as first point of inquiry/escalation and problem resolution for Access Manager provisioning/procurement related activities.
  • Support and maintain communication with Computer Security Incident Response Team (CSIRT) team members ensuring timely communication to all stakeholders regarding incident response activities.
  • Led develop and participate in development of Key Risk Indicators and monitor compliance .
  • Worked with various infrastructure teams to provide advisory services .
  • Respond to and remediate incidents as required; escalating when appropriate.
  • Developed strategies for responding to various types of attacks such as phishing emails or malicious websites.
  • Conducted internal audits to identify areas of improvement within the organization''s information security program.
  • Reduced vulnerabilities by performing thorough penetration testing on a regular basis.
  • Collaborated with IT teams to ensure seamless integration of security measures into existing infrastructure.
  • Championed a culture of continuous improvement through regular evaluations of existing security measures against established benchmarks and metrics.

Information Security Analyst

Home Trust Bank
01.2015 - 04.2017
  • Maintained up-to-date knowledge of emerging cyber threats, attack vectors, malware trends.
  • Coordinated security updates to avoid outages and downtime.
  • Educated individuals on complex computer terms using easy-to understand wording.
  • Alleviated leakage of company proprietary data to unauthorized resources and analyzed past performance data to enhance operations.
  • Made recommendations to improve security procedures and systems.
  • Promoted security awareness among employees and clients to alleviate risks and breaches.
  • Implemented access control measures to protect information assets.
  • Designed, implemented, and maintained security systems and controls. Updated computer security policies and procedures upon learning of new risks.
  • Built firewalls and encrypted data to secure confidential information. Analyzed system logs and identified potential threats or risks.
  • Designed and implemented plans to secure computer files against breach, destruction, or accidental modification.
  • Enhanced data integrity and availability by designing and implementing comprehensive backup and disaster recovery plans.
  • Guided IT teams in secure configuration of hardware and software, minimizing vulnerabilities and compliance issues.
  • Enhanced network security by implementing robust intrusion detection systems and conducting regular vulnerability assessments.
  • Customized and managed security information and event management (SIEM) systems for real-time threat detection and analysis.
  • Led cybersecurity awareness training sessions, increasing staff vigilance against phishing and social engineering attacks.

Overview

10
10
years of professional experience
3
3
Certificate

Languages

English
Full Professional

Certification

A+

NETWORK+

CEH







Segun Ladeji