Ukoh Udombo
Cybersecurity Analyst | Ethical Hacker | Incident Responder | System Administrator
Uyo, NG.About
Highly dedicated and certified Cybersecurity Analyst with a robust background in IT security and incident response, seeking to leverage expertise in network security assessments, vulnerability management, and strategic policy enforcement to safeguard critical systems and drive operational resilience within a dynamic cybersecurity support role.
Work
Independent National Electoral Commission (INEC)
|Registration Area Technical Support (RATECH)
Uyo, Akwa Ibom State, Nigeria
→
Summary
Provided critical technical support for electoral operations, ensuring the seamless configuration and troubleshooting of essential systems for ad-hoc staff and personnel.
Highlights
Managed and resolved a high volume of technical complaints, escalating complex issues efficiently while adhering to established procedural guidelines.
Applied advanced troubleshooting techniques to rapidly identify, analyze, and resolve technical issues for ad-hoc staff and personnel, ensuring operational continuity during critical periods.
Successfully diagnosed and resolved diverse technical issues using a comprehensive suite of diagnostic tools, enhancing the reliability of electoral systems.
Configured and deployed all Biometric Voter Accreditation System (BVAS) devices for the election, ensuring flawless operation during critical electoral processes.
Created and managed user accounts, assigning access privileges based on individual requirements to maintain system integrity and security.
3S InfoTech Enterprises
|Cybersecurity Specialist
Uyo, Akwa Ibom State, Nigeria
→
Summary
Led comprehensive cybersecurity operations, specializing in vulnerability management, incident response, and security policy development to fortify organizational defenses.
Highlights
Conducted advanced network security assessments, proactively identifying and mitigating critical vulnerabilities to enhance system resilience.
Collaborated cross-functionally to develop and enforce robust security policies and procedures, significantly improving overall compliance and protection.
Performed in-depth threat analysis and actively contributed to incident response, minimizing the impact and recovery time of security breaches.
Trained and mentored personnel on cybersecurity awareness best practices, reducing human-factor risks and fostering a security-conscious culture.
Executed precise vulnerability assessments using industry-standard tools like Nessus and NMAP, identifying and addressing critical system weaknesses.
ParknBet
|IT Support Specialist
Uyo, Akwa Ibom State, Nigeria
→
Summary
Provided specialized IT support, focusing on software and hardware maintenance, network troubleshooting, and security policy enforcement to ensure robust end-user operations.
Highlights
Facilitated efficient end-user operations by assisting with the installation, configuration, and updates of software, operating systems, and drivers.
Performed routine maintenance on a wide range of hardware devices, including desktops, laptops, and peripherals, ensuring continuous functionality.
Resolved critical network-related issues, such as connectivity problems and VPN configurations, significantly reducing user downtime.
Strengthened organizational security by helping implement and enforce security policies, including antivirus deployment, data backup, and user education.
Masterly Systems Technologies
|IT Support Technician
Uyo, Akwa Ibom State, Nigeria
→
Summary
Delivered comprehensive IT support to end-users, ensuring secure and efficient computing environments and contributing to operational continuity.
Highlights
Resolved diverse technical issues for end-users, maintaining secure computing environments and minimizing downtime.
Assisted in implementing critical security best practices, including access controls and system hardening, to enhance data protection.
Contributed to a security-conscious culture by participating in and promoting security awareness training for employees.
Managed customer complaints and escalated complex technical issues, achieving timely resolution and improving user satisfaction.
Administered user accounts, managed passwords, and implemented access control policies to safeguard sensitive information.
Languages
English
Skills
Core Competencies
Threat Analysis, Incident Response, Security Assessment, Security Policies, Network Security, Firewall and VPNs, Risk Management, Compliance - The GRC Approach, Leadership, Time Management, Problem Solving.