Ebere Ani
Details
Chemistry
Nnamdi Azikiwe University
2004 : 2009
Managed the information security system;
Perform and analyze vulnerability scan and oversee complete remediation of vulnerabilities found;
Managed corporate information security awareness training, phishing campaign and newsletters;
Perform data and insider threat monitoring;
Create and maintain security documents;
Support both internal and clients' audits; etc.
2020 : Present
Imitor Group
Information Security Specialist
Created and managed security documents like SAP, SAR, POA&M, etc;
Supported A&A process;
Managed vulnerability scans and assessment;
Conducted Risk Assessment of various systems;
Supported both clients' and internal audits; etc.
2018 : 2020
Lambda IT Consult
Information Security Analyst
• Processed customers' transactions on the computer with high accuracy.
• Managed the ATMs by processing deposit settlement and cash replenishment.
• Solely managed the cash vault.
• Supervised the duties of part-time tellers.
2016 : 2018
Chase
Teller
Skills
Access Control, Business Continuity, CompTIA, Cryptography, Cyber, Data Security, Disaster Recovery, Disaster recovery planning, Incident Response, Information Security, Information Security Awareness, Information Technology, Insider Threat Detection, ISO 27001, Malware Detection, Malware identification, Mobile device security, Network Security, Risk Assessment, Risk Management, Security, Security Audits, Security configuration, Security Management, Security Operations, Security principles, Threat Analysis, Threat Detection, U.S. Federal Information Security Management Act (FISMA), Vulnerability Assessment, Vulnerability Management
About
Five years of experience performing risk assessments of internal controls over Information Technology (IT) under multiple frameworks including National Institute of Standards and Technology (NIST), International Organization for Standardization (ISO), Cyber Security Risk Assessments, and Security Assessment and Authorization; Vulnerability Scanning & Assessment, Continuous Information System monitoring; tracking and remediation of Plan of Action and Milestones (POA&M) and Corrective and Preventive Actions (CAPA); Developing security Policies & Procedures and Information Security Awareness training.