Profiles search
Motunrayo Jaji, M.S., CEH
Experienced Industrial Control Systems Cybersecurity Leader
Ft. Washington, MD, United States
Details
Experience:
2022 : Present
Deloitte
Cyber Defense Engineer Manager - Global Cybersecurity
2022 : 2023
Deloitte
Manager - Cyber Risk Services
2018 : 2022
Deloitte
Senior Consultant, Cyber Risk
+ Proactively research emerging cyber risks and vulnerabilities; produce and disseminate Information Systems Vulnerability Management (ISVM) notices to all components and stakeholders based upon the common vulnerability scoring system (CVSS) in to order to identify, address, and rectify instances of security vulnerability within the network.
+ Maintain situational awareness of cyber activity in the Information Technology (IT) industry by reviewing open unclassified source reporting for new vulnerabilities, malware, or other threats that have the potential to impact the infrastructure.
+ Collaborate with leadership throughout each shift, providing prompt and comprehensive responses to tasking and keeping them fully aware of all aspects of operations
+ Plan, detect, investigate, and remediate security incidents, breaches, and compromises in a timely manner.
+ Develop and maintain information security Standard Operating Procedures (SOPs) on vulnerability management based on FISMA and NIST compliance.
+ Perform FISMA compliance assessments, utilizing approved vulnerability assessment scanning tools, to assess enterprise networks.
+ Review weekly network vulnerability scan results to identify critical vulnerabilities and provided remediation strategy to Information Systems Security Officers (ISSOs).
+ Audit network devices to ensure they are FISMA compliance.
2017 : 2018
Leidos
Vulnerabilty Assessor
+ Performed cyber threat analysis and reporting by leveraging unclassified internal and external intelligence sources.
+ Researched the impacts of cyber incidents on critical DHS infrastructures.
+ Leveraged aggregated cyber threat intelligence, logs, network flow, PCAP analysis, and anomaly data for analysis, research and the identification of potential compromise.
+ Performed ongoing monitoring and threat analysis using Splunk and ArcSight to analyze and evaluate security log data to detect and remediate security incidents.
+ Facilitated Enterprise Security Operation Center (ESOC) Working Group for information sharing amongst the DHS components.
+ Provided continuous monitoring that includes software compliance and assurance, and vulnerability assessments.
+ Collaborated with government leadership throughout each shift, providing prompt and comprehensive responses to tasking and keeping them fully aware of all aspects of operations.
+ Coordinated fully with all relevant stakeholders across the ESOC floor and across the DHS.
+ Proactively researched emerging cyber threats and vulnerabilities; produce and disseminate Information Systems Vulnerability Management (ISVM) notices to all components and stakeholders within DHS based upon the common vulnerability scoring system (CVSS) in to order to identify, address, and rectify instances of security vulnerability within the DHS network.
+ Maintained situational awareness of cyber activity in the Information Technology (IT) industry by reviewing open unclassified source reporting for new vulnerabilities, malware, or other threats that have the potential to impact DHS.
2017 : 2017
U.S. Department of Homeland Security
Secretary's Honors Program Cyber Security Apprentice
Deloitte
Cyber Defense Engineer Manager - Global Cybersecurity
2022 : 2023
Deloitte
Manager - Cyber Risk Services
2018 : 2022
Deloitte
Senior Consultant, Cyber Risk
+ Proactively research emerging cyber risks and vulnerabilities; produce and disseminate Information Systems Vulnerability Management (ISVM) notices to all components and stakeholders based upon the common vulnerability scoring system (CVSS) in to order to identify, address, and rectify instances of security vulnerability within the network.
+ Maintain situational awareness of cyber activity in the Information Technology (IT) industry by reviewing open unclassified source reporting for new vulnerabilities, malware, or other threats that have the potential to impact the infrastructure.
+ Collaborate with leadership throughout each shift, providing prompt and comprehensive responses to tasking and keeping them fully aware of all aspects of operations
+ Plan, detect, investigate, and remediate security incidents, breaches, and compromises in a timely manner.
+ Develop and maintain information security Standard Operating Procedures (SOPs) on vulnerability management based on FISMA and NIST compliance.
+ Perform FISMA compliance assessments, utilizing approved vulnerability assessment scanning tools, to assess enterprise networks.
+ Review weekly network vulnerability scan results to identify critical vulnerabilities and provided remediation strategy to Information Systems Security Officers (ISSOs).
+ Audit network devices to ensure they are FISMA compliance.
2017 : 2018
Leidos
Vulnerabilty Assessor
+ Performed cyber threat analysis and reporting by leveraging unclassified internal and external intelligence sources.
+ Researched the impacts of cyber incidents on critical DHS infrastructures.
+ Leveraged aggregated cyber threat intelligence, logs, network flow, PCAP analysis, and anomaly data for analysis, research and the identification of potential compromise.
+ Performed ongoing monitoring and threat analysis using Splunk and ArcSight to analyze and evaluate security log data to detect and remediate security incidents.
+ Facilitated Enterprise Security Operation Center (ESOC) Working Group for information sharing amongst the DHS components.
+ Provided continuous monitoring that includes software compliance and assurance, and vulnerability assessments.
+ Collaborated with government leadership throughout each shift, providing prompt and comprehensive responses to tasking and keeping them fully aware of all aspects of operations.
+ Coordinated fully with all relevant stakeholders across the ESOC floor and across the DHS.
+ Proactively researched emerging cyber threats and vulnerabilities; produce and disseminate Information Systems Vulnerability Management (ISVM) notices to all components and stakeholders within DHS based upon the common vulnerability scoring system (CVSS) in to order to identify, address, and rectify instances of security vulnerability within the DHS network.
+ Maintained situational awareness of cyber activity in the Information Technology (IT) industry by reviewing open unclassified source reporting for new vulnerabilities, malware, or other threats that have the potential to impact DHS.
2017 : 2017
U.S. Department of Homeland Security
Secretary's Honors Program Cyber Security Apprentice
Company:
Deloitte
Spoken Language:
English, Yoruba
About
Motunrayo is a driven, creative Cybersecurity professional with a “can-do” attitude and years of experience within the Information Technology space with a background in vulnerability management, e-commerce, and web development. She's passionate about using her skillset to provide innovative solutions to complex issues.