-
Gideon Ananson
-
Professional Summary
Employment History
Dedicated and results-driven Cyber Security Professional with a proven track record
of safeguarding organizations against
evolving cyber threats. With 2yrs of experience in the field, I have honed a comprehensive skill set encompassing threat
analysis, risk assessment, incident response, and security architecture design.
My commitment to staying at the forefront
of emerging technologies and trends in the
cybersecurity landscape has enabled me to
implement robust defences and mitigate
vulnerabilities effectively.
2022 - Present
Present
Information Security Operations Analyst |
Consolidated Bank Ghana limited | Accra
I work with the Information security department as a Security Operations Center Analyst and responsible for performing information
security operations activities to ensure protection of the Bank’s
information assets from unauthorized access, use, disclosure, disruption, modification, or destruction to ensure the confidentiality,
integrity, and availability of the information assets always and some
of these responsibilities include:
• Monitor firewall, endpoint security, and network traffic for abnormal activity, and execute corrective actions in response to alerts
triggered.
• Perform regular security reviews of network and system changes
to meet functional requirements.
Skills
• Collaborate and coordinate with the IT Department in the resolution of security vulnerabilities identified via VAPT exercises.
• Communication Skills
• Review and investigate unauthorized and/or failed network connection attempts blocked by Network Access Control.
• Adaptability
• Conduct threat-hunting exercises as part of a proactive approach
toward security.
• Critical thinking and problem solving
• Ability to work in a team
• Perform controls assessment and develop advanced tools for
controls testing and analysis; Implement continuous controls monitoring.
• Team leadership
• Incident Management
• Operate threat intelligence program (including the coordination
and analysis of threat intelligence sources).
• Threat Intelligence and Management
• Look at future trends in business, technology, and regulation to
formulate proactive security strategies.
• Vulnerability Management
• Perform vulnerability checks to identify security weaknesses in all
layers of the network computing environment including operating
systems, databases, applications, and files.
• Penetration Testing
• Email Analysis
• Digital Forensics and Incident Re-
• Ensure periodic security updates are applied to all network devices.
• Malware Analysis
• Facilitate the performance of IT Risk assessment; Perform risk
assessment on IT infrastructure and
sponse
• Network Protocol Analysis
• Risk Analysis
• Compliance with security requirements
processes that underpin new banking products and services.
2019 - 2019
4 Months
SOC Analyst | Cyber-Hawk Limited | Accra
A cyber security service provider who provides security service to
clients, and as an analyst my duties was to respond to security
related issues as well.
Courses
• Correlated all reported events from various multiple systems and
network areas where potential security incident is identified; ensure
the situation is handled promptly and effectively by starting the
process of security incident response.
Practical Web Application Security
and Testing,
TCM Security
• Participated in the investigations being performed by the information security team.
Cybersecurity Analyst Professional,
IBM
• Assisted in compiling and producing reports on monthly issues
and trends for the enhancement of the functions of the Enterprise
Security and Support management.
Practical Windows Forensics,
TCM Security
• Positioned as an escalation point for all incidents relating to potential security.
The Definitive GRC Analyst Master
Class ,
TCM Security
• Collected, Researched, and Analysed potential security vulnerability related information from a variety of sources to identify and
evaluate risks, patterns, and trends.
• Consulted closely with the SOC manager and stakeholders on
issues related to systems security posture.
Python 101 for Hackers ,
TCM Security
Movement, Pivoting and Persistence ,
TCM Security
Practical API Hacking ,
TCM Security
• Interfaced with technical teams, stakeholders, and leadership
teams to translate security risk mitigation
plans into actionable items to mitigate risk.
2015 - 2019
IT Technician | SuperTech Limited | Accra
4 Years
The company is an IT service provider with many clients in Ghana
and around the world. My duties in this company were mainly based
at a client site.
Practical Malware Analysis &
Triage ,
TCM Security
• Monitored at the data center for availability, storage, and network
performance and to keep systems up and running.
Mobile Application Penetration
testing ,
TCM Security
• Configured computer networks, LANS with assistance from re-
• Troubleshoot network and computer-related issues with assistance from respective departments.
spective departments.
• Ensured regular updates and upgrades of systems with assistance
from respective departments.
Practical Ethical Hacking ,
TCM Security
• Clearly defined and escalated problems to Tier 2 (Customer Support helpdesk) on issues needing further investigation.
Network Security Associate ,
Fortinet
• Pro-actively monitored the production environment.
• Conducted proactive maintenance activities designed to ensure
optimal operation of the Data Canters.
Junior Cybersecurity Analyst ,
CISCO
Blue Team Analyst Junior ,
Security Blue Team
Security, Compliance, and Identity
Fundamentals ,
Microsoft
Networking Essentials plus,
Microsoft
Education
2019 - 2021
2 Years
2010 - 2014
4 Years
MSc Information Communication Engineering |
Jiangsu university of Science and Technology |
Zhenjiang, China
BSc Information Technology | Valley View University |
Accra, Ghana
CompTIA Hardware and Networking ,
IPMC
References
Links
LinkedIn
Hobbies
• Going to the gym
• Traveling
• Surfing the Internet • Reading
Mr Eric Sower Badger
Kingsley Albert Egyir
Consolidated Bank Ghana Limited
Consolidated Bank Ghana Limited
Phone : -
Email :-
Phone : -
Email :-
Prof. Li Xiaolong
Mr Nurideen Musah
Jinagsu University if Science and Tech- Bank of Ghana
nology
Phone : -
Phone : -
Email :-Email :-
Projects
2013 - 2014
Travel Ghana (Android App) | Accra, Ghana
1 Years
An android application was developed as proposed to fulfil my final
year project work for my bachelor’s degree to help tourist and users
tour Ghana easily. This app displays interesting tourism locations in
Ghana and has been embedded with google maps to locate users
to various tourist locations in the country. The app was developed
using android studio.
2020 - 2021
EEG Recorder for Detection of Depression |
Zhenjiang, China
1 Years
As part of my project work for my master’s degree program, I participated in a team to implement an EEG Recorder for detection
of depression. This EEG recorder is used to capture brain signals
from the human brain and further analysis is done to detect any
abnormally which indicates the presence of any medical disorder
associate with the brain like Seizure or depression. LabView was
used in this project.
Hard Skills
Software tools
• Microsoft 365 Defender
• Android Studio
• Rapid7 IDR
• Darktrace
• Rapid 7 VM
• Darktrace Email
• ImpervaDAM
• PineApp
• IBM QRadar/SIEM
• PhishER
• Nmap/Wireshark/Nessus
• JIRA
• Microsoft 356
• JIRA
• Adobe Photoshop
• Cisco ISE
• ImpervaWAF
• Microsoft 356
• NI LabView