Albert Oloruntola

Manchester, Manchester

This professional is in active search of jobs

engineering Freelancer

About me:

Proactive and result driven Software Teste having a B.Sc. in Computer Science and M.Sc. in IT Security with a bias for cloud, automation and digital forensics.

• Good knowledge of vulnerability scanning and management platforms.

• In depth knowledge on malware analysis concepts and method

• Highly Proficient in Windows, Linux and Mac Functionality

• Ability to work as a team player with strong interpersonal and communication skills.

• Ability to quickly master new concepts and application

• Knowledge of Oriented Software Development Methodology

• Knowledge of ISO and CMM Process Implementation





ISTQB Certified

CompTIA- CompTIA Security +

Microsoft Azure AI Fundamentals

Microsoft Certified: Security, Compliance, and Identity Fundamentals




✓ Monitoring and detecting potential threats, triages the alerts, and appropriately escalates them.

✓ Incident Response and Notification.

✓ Making sure all critical Apps/Services configured to submit required security/apps logs to SIEM.

✓ Reviewing ISO policies.

✓ Review/Update an existing vulnerability processes and procedures.

✓ Helped Apps/Service owners to prepare and execute remediation plans or design and implement compensation controls to cover an existing vulnerability.

✓ Recommend the mitigation and navigate the recovery process.

✓ Assisted in penetration testing and vulnerability assessment.

✓ Interviewed stakeholders to know their challenges and benchmark where they are and give them recommendation.

✓ Made use of Nessus, Netsparker for VAPT.

✓ Prepared and document standard operating procedures for operational security controls.

✓ Develop and implement appropriate activities to take action regarding a detected cybersecurity incident.

✓ Develop and implement appropriate activities to identify the occurrence of a cybersecurity events.

✓ Develop and implement appropriate safeguards to ensure delivery of critical services. Identity Management and Access Control; Awareness and Training; Data Security; Information Protection Processes and Procedures; Maintenance; and Protective Technology.

0 external recommendations