EUGENE OSEI-ADJAPONG
PROFESSIONAL SUMMARY
Results-driven Cybersecurity professional with expertise in threat analysis, data modelling, and security compliance. Proficient in deploying
SIEM solutions like Splunk for real-time threat detection, leveraging machine learning, cryptographic protocols, and data-driven security
frameworks to protect organisations. Experienced in risk assessments, audits, and cross-functional collaboration to streamline security
processes. Passionate about applying analytical expertise to drive security innovation across diverse industries and driving operational
efficiency through technology.
EDUCATION:
MSc Cybersecurity
BSc Computer Engineering
University of The West of England
Kwame Nkrumah University of Science and Technology
WORK EXPEIRENCE
University of Bristol
•
•
•
•
End User Service Support Engineer
September 2025 - Present
Delivering high-quality 2nd line IT support across Faculties, Schools and Divisions, resolving hardware, software, and AV
issues
Utilising configuration management tools (Intune, SCCM, Group Policy, JAMF) to enhance service delivery and promote
continuous improvement.
Maintaining accurate and up-to-date support documentation
Provide expert advice on Windows, Linux, macOS, and mobile devices while supporting ITIL-aligned incident management
processes
Inside Travel Group | B Corp
Service Desk Analyst
March 2025 – May 2025
•
Providing first-line IT support and resolving technical issues to ensure a seamless user experience
•
•
•
Managing user onboarding/offboarding on Entra ID/Active Directory, asset inventory and desk setups across multiple teams
Administering Microsoft 365 E5 applications, supporting Exchange Online, Teams and Azure environments
Utilizing ITSM tools like Freshservice and created documentation to streamline incident resolution and service requests on
Notion
Hanson Education Recruitment UK
•
•
•
•
•
•
•
•
•
•
Product Analyst
November 2022 – October 2023
Collaborated with the development team to assist in requirements gathering, resource allocation, and project tracking using
Asana and MS Project, improving overall project efficiency by 20% and reducing timelines by 15%
Developed and tested data solutions, utilizing Python and SQL to improve project tracking and streamline resource allocation
Conducted quality assurance testing with Selenium, documented results to ensure software quality and compliance with
business requirements, resulting in a significant improvement in software reliability
Liaised with stakeholders to implement a digital remote onboarding portal, increasing client growth by 15% in the first 3 months,
and trained over 300 staff on the portal, enhancing user adoption and satisfaction
KB Consultancy Inc UK
•
January 2024 – July 2025
Delivered first-line IT Support, managed user accounts on Entra ID and maintained Microsoft 365 infrastructure
Streamlined SEND requirements and placements process through improved documentation, compliance tracking and data
management initiatives
Collaborate with school leaders, SEND coordinators, and multi-disciplinary teams to improve the delivery of SEND services.
Provided tailored support to students with EHCPs across multiple schools SEND schools ensuring inclusive education and
adherence to the SEND code of practice
Stanbic Bank
•
SEND Teaching Supervisor & IT Support
Software Engineer
August 2020 – September 2022
Cultivated and refined client requirements and specifications based on technical needs, project planning and setting
deliverables.
Wrote well designed, testable and efficient code by using best software development practices
Researched on techniques and created proof of concepts and prototypes
Worked on continued maintenance and development of bug fixes for existing web applications and maintained software
documentation
CERTIFICATIONS
• Certified Ethical Hacker (CEH) | EC Council
• Cisco Network Essentials | Cisco Networking Academy
SKILLS:
• Stakeholder Engagement: Ensuring effective communication with both technical and non-technical audiences.
• Cybersecurity Frameworks: ISO27001, NIST, PCI DSS, Cyber Essentials, Data Loss Prevention.
• Hands-on experience with virtualization platforms like Hyper-V and VMware.
• Security Auditing & Compliance: Vulnerability Management, Penetration Testing, Governance, Data Privacy, GDPR.
• Understanding of networking fundamentals (TCP/IP, VPN, DHCP/DNS, Firewalls)
• IT Infrastructure & Cloud Security: Active Directory, Entra ID, M365 Security, Azure, AWS
PROJECTS:
YER Tuition Services – Online Tuition & Booking Platform | Link to Github | Link to Site
Full-Stack Web Platform | JavaScript, Node.js, Express, MongoDB
• Designed and implemented a full-stack platform supporting tutor onboarding, student registration, session booking, and
enquiry management.
• Developed backend authentication and booking logic with persistent data storage in MongoDB.
• Built responsive, user-friendly front-end interfaces to improve accessibility and user experience.
• Applied secure coding practices, input validation, and access control to protect personal data
Research Paper: Analysis of V2X Communication Protocols in Self-Driving Vehicles
•
•
•
Investigated cybersecurity vulnerabilities in Vehicle-to-Everything (V2X) protocols used in autonomous vehicles.
Implemented ns-3 network simulations to measure the impact of cyberattacks on routing protocols and overall network
performance
Evaluated risks in DSRC and C-V2X identifying attack vectors such as spoofing, jamming, and blackhole attacks
Network Security & Traffic Analysis
•
•
Network Traffic Analysis and Anomaly Detection: Conducted packet captures using tcpdump and Wireshark Identifying
malicious traffic patterns.
VPN Tunneling and Secure Communication: Developed python-based TUN/TAP interface programs to simulate a secure
virtual private network
Threat Detection & Incident Response
•
•
•
•
Attack Simulation and Detection Using Splunk SIEM: Configured Splunk to detect simulated cyberattacks, aligning with
MITRE ATT&CK techniques.
Firewall Evasion: Developed and tested port evasion strategies to bypass IDS/IPS systems and demonstrated effective
mitigation tactics
Linux Privilege Escalation: Exploited SUID binaries, Kernel vulnerabilities and cron jobs to simulate real world attack scenarios
USB Rubber Ducky Exploitation: Designed malicious HID payloads using a raspberry pi configured as a USB rubber ducky
Malware Detection & Cyber Threat Intelligence
•
•
•
•
DGA Classification System for Malware Detection: Developed a machine learning based tool to classify malware families using
scikit-learn
Indicators of Compromise Analysis Using SRUM and AmCache: Extracted and analysed SRUM and AmCache artefacts to
detect malware activities.
Windows Artefact Analysis for incident Response: Investigated prefetch files, Event logs and SRUM to trace unauthorized
access attempts.
Browser Forensics and Network Investigations: Examined browser artefacts and analyzed command and control traffic for
malicious indicators.
Cloud Security and Compliance
•
•
Azure Cloud Security Implementation: Deployed secure virtual machine on azure, configured network security rules and
enforced RBAC policies.
Information Risk Management and Real-world Incident Analysis: Conducted risk analysis for financial institutions leveraging
GDPR, ISO27001 and FAIR methodologies