Summary
Overview
Work History
Education
Skills
Affiliations
Languages
Soft Skills
References
Timeline
Generic

Stanley Anuluoha

Leppington,NSW

Summary

Skilled in safeguarding information systems and networks from potential threats. Have experience implementing security measures, conducting vulnerability assessments, and managing incident response activities. Strengths include analytical problem-solving, teamwork, and effective communication skills. Contributed to enhancing system security posture and reducing incidents of data breaches in previous roles.

Overview

1
1
year of professional experience

Work History

Cybersecurity Analyst

Afford
LEPPINGTON, NSW
08.2024 - Current
  • Reviewed system logs regularly for suspicious activities or anomalies that may indicate an attempted breach.
  • Provided guidance on cyber security awareness training for employees at all levels of the organization.
  • Maintained up-to-date knowledge of cyber security trends and best practices.
  • Implemented firewalls, intrusion detection systems, anti-virus software and other related technology to protect organizational assets.
  • Performed security assessments on new technologies to identify potential threats and vulnerabilities in the system.
  • Analyzed malware samples using automated tools such as VirusTotal or Cuckoo Sandbox to determine its intent and possible methods of mitigation and prevention.
  • Performed vulnerability scans using automated tools such as Nessus or QualysGuard to detect any weaknesses in the system that could be exploited by attackers.
  • Created detailed reports outlining current cyber security measures in place across the organization.
  • Managed user accounts within Active Directory environment ensuring appropriate access rights are granted or removed when necessary.
  • Monitored network traffic for malicious activity, identified abnormal behavior, and responded accordingly.
  • Worked closely with other members of the IT team to ensure proper implementation of new hardware and software solutions into production environments is completed securely.
  • Investigated computer security incidents as they occurred, analyzed root cause of incidents, documented findings and recommended corrective actions.
  • Researched emerging technologies that can improve the overall level of protection against cyber attacks.
  • Learned about latest security threats from blogs and online publications.
  • Reviewed security bulletins and vulnerability patch releases.
  • Collaborated with stakeholders to implement and update disaster recovery plans.
  • Designed, implemented, and maintained security systems and controls.
  • Audited networks and security systems to identify vulnerabilities.
  • Conducted regular audits of IT systems to ensure compliance with corporate data security policies.
  • Developed and implemented security policies, procedures and standards to protect the organization's information systems from unauthorized access, modification and destruction.
  • Updated network systems to support confidential company operations and eliminate hacking.
  • Analyzed security procedure violations and developed plans to prevent recurrence.
  • Investigated information security breaches to identify vulnerabilities and evaluate damage.
  • Promoted security awareness among employees and clients to alleviate risks and breaches.
  • Worked closely with fellow security personnel to remedy and alleviate technology issues.
  • Coordinated security updates to avoid outages and downtime.
  • Made recommendations to improve security procedures and systems.
  • Assisted with developing strategies for responding to potential cyber attacks such as malware outbreaks, phishing campaigns, ransomware attacks.

Education

Master of Science - Petroleum Engineering

University of New South Wales
Sydney, NSW
11-2019

Bachelor of Technology - Industrial Chemistry

Federal University of Technology, Owerri
08-2009

Some College (No Degree) - Introduction To Cyber Security

Institute of Applied Technology

Skills

  • Incident response planning
  • Endpoint protection platforms
  • Threat modeling
  • Web application security
  • Zero trust architecture
  • Malware analysis
  • Data privacy regulations
  • Compliance auditing
  • User behavior analytics
  • Phishing awareness training
  • Vulnerability assessment
  • Application security
  • Multi-factor authentication
  • Software vulnerability scanning
  • Data loss prevention

Affiliations

  • Playing football
  • Hanging out with friends.
  • Spending time with family
  • Watching movies about tech.

Languages

English
Native/ Bilingual

Soft Skills

  • Problem-Solving & Analytical Thinking
  • Attention to Detail
  • Effective Communication
  • Team Collaboration
  • Adaptability & Continuous Learning

References

References available upon request.

Timeline

Cybersecurity Analyst

Afford
08.2024 - Current

Master of Science - Petroleum Engineering

University of New South Wales

Bachelor of Technology - Industrial Chemistry

Federal University of Technology, Owerri

Some College (No Degree) - Introduction To Cyber Security

Institute of Applied Technology
Stanley Anuluoha