Joy Osianor Abu
Cyber Security Specialist | Data Analyst
Osun, Nigeria I - I-I LinkedIn
Profile Summary:
I am a dynamic cyber security professional with over 3 years of experience securing IT infrastructures,
networks, and applications. Expertise in risk assessment, incident response, and vulnerability management
using SIEM systems, penetration testing, and compliance frameworks (GDPR, HIPAA, ISO 27001), with a
proven track record of reducing security risks by up to 50% and enhancing operational efficiency through
innovative threat detection and policy enforcement. I am skilled in data analytics and AI-driven solutions,
blending technical proficiency with a passion for safeguarding organizations against evolving cyber threats.
Core Competence:
Cybersecurity: SIEM (Splunk, SolarWinds), Penetration Testing (Metasploit, Nessus), Incident
Response, Threat Hunting
Network Security: Firewalls (Palo Alto, Cisco ASA), IDS/IPS, VPN, Wireshark, Nmap
Cloud & Identity: AWS, Azure, IAM, Zero Trust Architecture, Encryption
Compliance: ISO 27001, GDPR, HIPAA, NIST, Security Audits
Automation: Python, PowerShell, Bash, Ansible
Data Analytics: Pricing Optimization, Threat Intelligence, AI Implementation
Professional Experience:
EC-Council | Technical Content Editor (Remote) | July 2024 – Present
Collaborate with cyber security experts to create and refine training materials aligned with
certification standards, achieving 100% technical accuracy and learner satisfaction.
Enhance content accessibility for global audiences, incorporating emerging trends to maintain
relevance.
Streamline editing processes, reducing production timelines by 15% while upholding quality
benchmarks.
NegloCyber Solutions, Osun Nigeria | System Analyst | November 2021 – Present
Deployed advanced security monitoring tools, cutting vulnerabilities by 30% and bolstering network
defenses.
Led incident response efforts, containing breaches to minimize downtime and protect sensitive
data, saving an estimated $50K in potential losses.
Reduced security risks by 50% through regular penetration testing and vulnerability remediation.
Developed GDPR- and ISO 27001-compliant security policies, training 50+ staff to reduce humanerror incidents by 25%.
His Mercy Technology, Osun, Nigeria | System Administrator | January 2021 – October 2021
Optimized server performance, reducing system downtime by 25% and improving operational
efficiency.
Implemented firewalls and automated backups, decreasing security incidents by 20%.
Provided technical support to 100+ users, resolving issues swiftly to maintain business continuity.
Education:
Nexford University, Washington, USA
M.S., Data Analytics | Expected December 2024
M.B.A., Major in Artificial Intelligence | December 2023
Miva Open University, Abuja, Nigeria
B.Sc., Cybersecurity | In Progress
Federal University of Technology, Akure, Nigeria
Postgraduate Diploma, Industrial Chemistry | November 2018
Auchi Polytechnic, Edo, Nigeria
Higher National Diploma, Polymer Technology | October 2007
Certifications:
Certified Ethical Hacker (CEH) – Cisco Network Academy
Certified in Cyber security (CC) – ISC2
Cyber Threat Management (CTM) – Cisco Networking Academy
Google Cloud Cybersecurity Certificate – Google
Project Management Professional – Astute Trainers
Data Science – 3MTT, Flexwork Nigeria Ltd
Certified | Cybersecurity Technician | EC-Council
Diploma Cyber Security | Digital Regenesys
Diploma in Ethical Hacking | Network walks
Extra Curricula
Mastercard | Cybersecurity Virtual Experience (Forage, Dec 2024)
Acted as an analyst on the Security Awareness Team, identifying phishing threats, assessing
business areas needing enhanced security training, and implementing targeted training courses and
procedures.
AIG | Shields Up | Cybersecurity Virtual Experience (Forage, Dec 2024)
Conducted a threat analysis simulation for the Cyber Defense Unit, leveraging CISA updates and
analytical skills to research vulnerabilities and draft concise remediation emails for teams.
Technical Skills Application: Utilized Python to develop an ethical hacking script, brute-forcing decryption
keys to bypass ransomware payments during the AIG simulation.
Technical Skills
Tools: Splunk, Nessus, Metasploit, Wireshark, Cisco Packet Tracer, Kali Linux
Platforms: AWS, Azure, Google Cloud, Windows Server, Linux (Ubuntu, Kali)
Languages: Python, PowerShell, Bash
Professional Affiliations
Institute of Information Management (IIM)
Cyber Security Experts Association of Nigeria (CSEAN)
International Information System Security Certification Consortium (ISC2)
References
Available upon request.