Judith Adebajo
Details
Biology/Biological Sciences, General
Tai sholarin University of Education
2005 : 2010
• Security implementation : Proficient in implementing security solutions, including access controls, encryption, firewalls, intrusion detection/prevention systems, and security incident response protocols.
• Risk assessment : Experienced in conducting comprehensive risk assessments to identify vulnerabilities, threats, and potential security breaches, and recommending mitigation strategies
• Experience in gathering and documenting client requirements
• Incident response : Skilled in incident detection, investigation, and response, including managing security incidents, conducting forensic analysis, and developing incident response plans.
• Experience in implementing security controls to ensure compliance
• Extensive knowledge of Scrum & Agile methodology
• Experience in driven issues to closure and working well within a deadline-drive environment
• Strong client interfacing skills, highly motivated, excellent communication and interpersonal skills.
• Experience in working closely with stakeholders to access data and analytics needs; recommences strategies, methods, and analyses to improve decision making
• Extensive knowledge of MS Office including Visio, Project, Word, Excel, PowerPoint, use case, process
mapping, mockup, workflow analysis and design, business process reengineering, user interface
design, process flow modeling, regression testing & System Integration
• Basic configuration of Service Catalog categories and variables/variable sets, order guide, UI policies,
email notifications, user accounts, etc.
2022 : Present
NXT
Cybersecurity Governance Risk and Compliance Specialist
• Assisted in conducting risk assessments and vulnerability scans.
• Researched emerging cyber threats and assisted in developing mitigation strategies.
• Contributed to the development and maintenance of security documentation and policies.
• Functioned as the point of contact between business/process stakeholders and technical teams in application development on the ServiceNow platform.
• Continuously monitoring the security platforms for any signs of suspicious or malicious activities. When security incidents occur, involved in the incident response process, investigating the incident and taking appropriate actions to mitigate the impact.
• Implemented and enforced security policies across the organization's IT systems to maintain compliance and reduce the risk of security breaches.
• Kept detailed records of security platform configurations, incidents, and any changes made to the environment.
• Stayed up to date with the latest security threats, vulnerabilities, and technologies to improve the organization's security posture.
• Conducted vulnerability assessments to identify weaknesses in the organization's infrastructure and worked with the team to remediate those vulnerabilities.
2019 : 2022
Nightlight
Information Security Analyst
• Assisted the project team in defining, collecting, and documenting the client's business and technical
• requirements ensuring accuracy while maintaining flexibility in responding to priority.
• Supported the creation of user stories and ensured they meet the criteria required to deliver a successful product
• Collaborated with the developers and other technical staff to translate business requirements to system design.
• Created requirements documentation, test plans, and test cases and conduct functional testing, as needed
• Worked with ServiceNow Architect and Developer in conducting testing to ensure the quality of new software releases
• Performed requirements gathering with ITSM stakeholders to improve processes and procedures in ServiceNow for productivity through automation
• Planned and supported User Acceptance Testing (UAT) including the development of scripts and conducting UAT with end users
• Involved in gathering the Business Requirements and interacted with the stakeholders to understand the existing functionality, current state processes, and tools to get a better view of the Business Processes and functionality to document, support and configure the ServiceNow Platform
• Worked with the Business Team to come up with the business stories and translate the same into technical requirements as required.
• assessing vulnerabilities.
2018 : 2019
Global Imaging Technology
Business Analyst
Skills
Access control concept, Adaptability, Agile Methodologies, Business Analysis, Business Change management, Business Continuity concept, Business Process, Business Process Improvement, Business Requirements, Communication, Cyber Forensics, Disaster Recovery, Disaster recovery (DR) concept, Document Drafting, Firewall configuration, General Data Protection Regulation (GDPR), Incident Response, Incident Response Concepts, Information Relationship management, ITIL CSI, IT Security Operations, IT Security Policies & Procedures, ITSM, malware identification, Meeting Facilitation, Microsoft Office, Microsoft PowerPoint, Microsoft Word, monday.com, Network Security, NIST 800-53, Requirements Analysis, Requirements Gathering, Risk Assessment, Scrum & agile methodology, scrum process , Security Controls, Security gaps, Security principles, Skilled Multi-tasker, Software Development, Standard Operating Procedure (SOP), Technical Requirements Gathering, Testing, Test Planning, Threat Analysis, Ticketing Systems, Training Documentation, U.S. Health Insurance Portability and Accountability Act (HIPAA), UAT
About
GRC/ Risk assessment/ Network Security
- Led security team to implement security controls on customer information systems (ServiceNow and Google Workspace).
- I identified and analyzed security gaps. maintained metrics to report security risks and responded to alerts.
- Performed comprehensive security assessments, identifying vulnerabilities, threats, and risks, and recommended and implemented security controls to mitigate risks.
- I helped develop and implement security policies, procedures, and standards to ensure compliance with relevant regulations and company policies.
- Creates, edits, and maintains compliance and implementation documentation for current and future platforms. (IRP, BCP, SSP, CP).
- I enhanced security solutions following NIST 800-53, ISO27001.
Identified vulnerabilities and areas of non-compliance and coordinated security risk remediation.
- Led security admins in managing access control for privileged and non-privileged accounts.
- Created policies/processes for provisioning and de-provisioning of users' accounts.
- Developed SOPs for 70 critical controls for Google Workspace.
- Helped develop an automated process for monitoring Network Diagram.
- Assisted in configuring CIS Benchmarks to protect information systems against threats more confidently.