Profiles search
ADE' A
Microsoft Defender Security SME | M365D | MDE | MDI | MDO | MDA | Sentinel | Defender for Cloud | Active Directory analyst | Azure | IAM | Tenable/Nessus | Tessian | CyberSecurity Engineer
United States
Details
Education:
Bachelor of Technology - BTech
Computer Science
Federal University of Technology Akure
2002 : 2006
Computer Science
Federal University of Technology Akure
2002 : 2006
Experience:
2023 : Present
Shearman & Sterling LLP
Information Security Engineer
Microsoft Defender SME, assigned to Microsoft Corporation enterprise customers to assist in the configuration and implementation of Microsoft Defender workloads in order to help to automate, detect, identify, protect, respond and remediate from cyber incidents/threats by following best practices (recommendations) for securing organizations/enterprise data, accounts, users, applications, devices using Microsoft Cloud Security tools – MDE (MDATP), MDI (AzureATP), MDO (OATP) and MDA (MCAS)
● walking customers through the onboarding process of Microsoft Defender for Endpoint as core security solution for endpoints using different methods – Local Scripting, GPO, Intune and SCCM methods
● Following best practices, configuration of different policies in MDE that serves as the agents in endpoint that send telemetries to cloud instance when detected and identified threats and able to respond to remediate such threats.
● Assisting enterprise in Next-Gen Antivirus policy configurations for real-time threat protections, helped in the threats and alert auto investigations and remediation, configuring ASR policy reducing risks of threats
● Assisting customers through investigating incidents and alerts using Advanced Hunting KQL queries in Microsoft 365 Defender suites and also remediated such alerts
● Using Threats and Vulnerability Management to hunt and analyze threats and adopting Microsoft’s recommendations in order to increase the secure score thereby improving security of infrastructures.
● Helping customers in the process of deploying MDI and also walking them through identity threat detection and remediation
● Investigated suspicious logins, suspicious activities, failed logins, lateral movement path in sensitive users and creating policies in MCAS to block users, suspend users, require re-authentication or require MFA
● Led customer in configuring and implementing MDO to safeguard their organization against Phishing, spam, malwares, links and attachments
2021 : 2023
Microsoft
Microsoft 365 Defender SME (MDE, MDI, MDO & MCAS)
Undertook a role in the creation and management of user identities, access to resources, password expiration management including password lockouts.
Using the principle of least privilege, I was involved in assigning roles to users based on their activities.
Configured MFA for users, SSPR for
Worked as a team to set up MDM for devices in Intune for App deployments and Security policies.
A team member that is responsible for implementing different security policies (EOP, ATP, AIP, DLP) against threats of any kind and in protecting company data against malicious use
Team supports in the onboarding and administration of Microsoft Defender ATP solution for defending endpoints.
Tasked with configuring windows-joined devices for endpoint managements and attack surface reduction using Microsoft Defender ATP.
Actively involved in the periodic security review and implementations of the Microsoft recommended procedure to improve secure points.
Provided support for the Active Directory Domain Services managements.
Actively involved in the Users objects privileges, roles, and other Domain Objects Identity and Access Managements
Worked with group in the syncing of synching of identities to Azure-AD using Azure-AD Connect
Worked with the operations team to configure changes to the environment in preparation for any new technology.
Installing patches, updates, and Anti-malware to mitigate against vulnerabilities of any kind.
involved in the Installing, reimaging and configuring operating systems and firewalls.
Documented all changed activities, policies implemented on a files for reference purposes.
Trained new and existing users on the awareness of security in the environment.
2016 : 2021
DHC
System Admin/Network Admin
Play an active role in the messaging environment. Team member of Microsoft Exchange server migration. Involved in the proper implementation of organizational procedures in achieving greatness for excellence in the project.
2014 : 2016
Oscrop Group Nigeria
Exchange/System Administrator support
Responsible for all network related issues on projects. Responsible for troubleshooting network outages, network cable managements and installations.
Installed and integrate new server hardware and applications.
Installed and support LANs, WANs, network segments, internet and intranet systems
Monitored networks to ensure security and availability to users in the organization.
Administered servers, desktop computers, printers, switches, firewalls, phones personal and digital devices assistants, smartphones, software deployment, security updates and patches.
Monitored network performance (availability, utilization, throughput and latency) and test for weaknesses.
Proving experience in Access Control List in Firewalls, Internet VPN’s remote implementation, troubleshooting and problem resolution
Prepared and maintained documentations of network configurations and cabling layouts and managements.
Installed and configured windows server 2008 and promoted to the Domain Controller.
Created new computer accounts and join them to the directory services.
Involved in the creation, deletion and management of Domain Objects, i.e. local user accounts, password, groups, workstations, servers, printers, etc. in their OU hierarchy.
Group Policy Object (GPO) creation, troubleshooting, and management
Created new computer accounts and join to directory services.
Set up user accounts, permissions and passwords in the Domain Controller.
Resolve problems reported by end users.
Specify system requirements and design solutions.
Analyzed and monitor potential security holes and implemented a good approach to address them.
Documented all system failures and the procedures to get them fix for a future reference.
Train new and existing team members on new hardware and software.
Excellent knowledge of best practices around management, control, and monitoring of other organizations’ IT infrastructure
2012 : 2014
Macadams Telecommunications
Network Administrator
Shearman & Sterling LLP
Information Security Engineer
Microsoft Defender SME, assigned to Microsoft Corporation enterprise customers to assist in the configuration and implementation of Microsoft Defender workloads in order to help to automate, detect, identify, protect, respond and remediate from cyber incidents/threats by following best practices (recommendations) for securing organizations/enterprise data, accounts, users, applications, devices using Microsoft Cloud Security tools – MDE (MDATP), MDI (AzureATP), MDO (OATP) and MDA (MCAS)
● walking customers through the onboarding process of Microsoft Defender for Endpoint as core security solution for endpoints using different methods – Local Scripting, GPO, Intune and SCCM methods
● Following best practices, configuration of different policies in MDE that serves as the agents in endpoint that send telemetries to cloud instance when detected and identified threats and able to respond to remediate such threats.
● Assisting enterprise in Next-Gen Antivirus policy configurations for real-time threat protections, helped in the threats and alert auto investigations and remediation, configuring ASR policy reducing risks of threats
● Assisting customers through investigating incidents and alerts using Advanced Hunting KQL queries in Microsoft 365 Defender suites and also remediated such alerts
● Using Threats and Vulnerability Management to hunt and analyze threats and adopting Microsoft’s recommendations in order to increase the secure score thereby improving security of infrastructures.
● Helping customers in the process of deploying MDI and also walking them through identity threat detection and remediation
● Investigated suspicious logins, suspicious activities, failed logins, lateral movement path in sensitive users and creating policies in MCAS to block users, suspend users, require re-authentication or require MFA
● Led customer in configuring and implementing MDO to safeguard their organization against Phishing, spam, malwares, links and attachments
2021 : 2023
Microsoft
Microsoft 365 Defender SME (MDE, MDI, MDO & MCAS)
Undertook a role in the creation and management of user identities, access to resources, password expiration management including password lockouts.
Using the principle of least privilege, I was involved in assigning roles to users based on their activities.
Configured MFA for users, SSPR for
Worked as a team to set up MDM for devices in Intune for App deployments and Security policies.
A team member that is responsible for implementing different security policies (EOP, ATP, AIP, DLP) against threats of any kind and in protecting company data against malicious use
Team supports in the onboarding and administration of Microsoft Defender ATP solution for defending endpoints.
Tasked with configuring windows-joined devices for endpoint managements and attack surface reduction using Microsoft Defender ATP.
Actively involved in the periodic security review and implementations of the Microsoft recommended procedure to improve secure points.
Provided support for the Active Directory Domain Services managements.
Actively involved in the Users objects privileges, roles, and other Domain Objects Identity and Access Managements
Worked with group in the syncing of synching of identities to Azure-AD using Azure-AD Connect
Worked with the operations team to configure changes to the environment in preparation for any new technology.
Installing patches, updates, and Anti-malware to mitigate against vulnerabilities of any kind.
involved in the Installing, reimaging and configuring operating systems and firewalls.
Documented all changed activities, policies implemented on a files for reference purposes.
Trained new and existing users on the awareness of security in the environment.
2016 : 2021
DHC
System Admin/Network Admin
Play an active role in the messaging environment. Team member of Microsoft Exchange server migration. Involved in the proper implementation of organizational procedures in achieving greatness for excellence in the project.
2014 : 2016
Oscrop Group Nigeria
Exchange/System Administrator support
Responsible for all network related issues on projects. Responsible for troubleshooting network outages, network cable managements and installations.
Installed and integrate new server hardware and applications.
Installed and support LANs, WANs, network segments, internet and intranet systems
Monitored networks to ensure security and availability to users in the organization.
Administered servers, desktop computers, printers, switches, firewalls, phones personal and digital devices assistants, smartphones, software deployment, security updates and patches.
Monitored network performance (availability, utilization, throughput and latency) and test for weaknesses.
Proving experience in Access Control List in Firewalls, Internet VPN’s remote implementation, troubleshooting and problem resolution
Prepared and maintained documentations of network configurations and cabling layouts and managements.
Installed and configured windows server 2008 and promoted to the Domain Controller.
Created new computer accounts and join them to the directory services.
Involved in the creation, deletion and management of Domain Objects, i.e. local user accounts, password, groups, workstations, servers, printers, etc. in their OU hierarchy.
Group Policy Object (GPO) creation, troubleshooting, and management
Created new computer accounts and join to directory services.
Set up user accounts, permissions and passwords in the Domain Controller.
Resolve problems reported by end users.
Specify system requirements and design solutions.
Analyzed and monitor potential security holes and implemented a good approach to address them.
Documented all system failures and the procedures to get them fix for a future reference.
Train new and existing team members on new hardware and software.
Excellent knowledge of best practices around management, control, and monitoring of other organizations’ IT infrastructure
2012 : 2014
Macadams Telecommunications
Network Administrator
Company:
Shearman & Sterling LLP
Years of Experience:
15