FA

Francisca A.

Tech Enthusiast | IT Professional | Program Coordinator

Lagos, Nigeria

ABOUT

I'm a tech enthusiast. A motivated individual seeking a position in an IT position that will use the professional and technical skills developed through past work experiences in this field. I have a systematic, customer-focused approach to work and a powerful drive to see things through to completion. I love to involve myself within the tech community.

SKILLS

Program ManagementProject ManagementTime Management and Organization Skills
HTMLCSS
Communication SkillsPresentation SkillsTechnical Writing
LinuxWindows
Governance Risk & ComplianceVulnerability AssessmentPenetration TestingInformation ProtectionData Loss Prevention (DLP)Data Lifecycle ManagementMicrosoft PurviewInsider Risk ManagementPrivacy RiskISO/IEC 27001ISMSNIST Cybersecurity FrameworkRMFCOBITMITRE ATT&CKVulnerability ManagementEndpoint SecurityNetwork SecurityOSINTWeb Application SecurityCloud Fundamentals

EXPERIENCE

Program Coordinator

2022-06 - Present

CyBlack • United Kingdom

Support planning and coordination of a program and its activities. Schedule and organize meetings/events and maintain agenda. Follow up on important actions and decisions from meetings. Coordinate the CyBlack Internship. Provide support to the community members on Telegram and Slack, as required. • Support planning and coordination of a program and its activities • Schedule and organize meetings/events and maintain agenda • Follow up on important actions and decisions from meetings • Coordinate the CyBlack Internship • Provide support to the community members on Telegram and Slack, as required

Governance Risk & Compliance

2023-03 - 2023-11

Cybersafe Foundation • Lagos, Nigeria

Implement information protection. Implement DLP. Implement data lifecycle and records management. Monitor and investigate data and activities by using Microsoft Purview. Manage insider and privacy risk in Microsoft 365. Understand Security Principles, Business Continuity (BC), Disaster Recovery (DR) & Incident Response Concepts, Access Controls Concepts, Network Security and Security Operations. Know the five different type of security tools for discovering vulnerabilities in various environments. Know how to classify and prioritize vulnerabilities based on real-world criticality measures and how to define the true risk of the vulnerabilities for a specific environment. Know how to create comprehensive, clear and easy-to-understand vulnerability assessment documentation, and how to go about keeping the vulnerability findings and scoring current. Obtain the necessary expertise to support an organization to implement an Information Security Management System that complies with ISO/IEC 27001. Understand the Information Security Management System implementation process. Provide continual prevention and assessments of threats within an organization. Understand the risk management process, controls, and compliance obligations. Acquire the necessary expertise to manage a team to implement an ISMS. Have the ability to support organizations in the continual improvement process of their Information Security Management System. Gain the necessary skills to audit organization's Information Security Management System. Build a basic understanding of NIST cybersecurity fundamentals. Know the RMF process and managing risk by identifying, assessing and responding to risk. Know how to use the framework to assess an organization's cybersecurity risk and the steps to implement or improve a cybersecurity program. Gain a more in-depth understanding of the COBIT framework. Understand the concepts, principles and methodologies used to establish, enhance and maintain a system for effective governance and management of enterprise information technology. Gain a thorough understanding of enterprise risk concepts, frameworks, reporting metrics, mitigation strategies and decision making. Understand a verity of administrative, technical and physical controls, such as audits, incident response, security policies and access controls. Have an in-depth understanding of enterprise risk and the controls needed to help keep organizations safe from cybercrime. • Implement information protection • Implement DLP • Implement data lifecycle and records management • Monitor and investigate data and activities by using Microsoft Purview • Manage insider and privacy risk in Microsoft 365 • Understand Security Principles, Business Continuity (BC), Disaster Recovery (DR) & Incident Response Concepts, Access Controls Concepts, Network Security and Security Operations • Know the five different type of security tools for discovering vulnerabilities in various environments • Know how to classify and prioritize vulnerabilities based on real-world criticality measures • and how to define the true risk of the vulnerabilities for a specific environment • Know how to create comprehensive, clear and easy-to-understand vulnerability assessment documentation, and how to go about keeping the vulnerability findings and scoring current • Obtain the necessary expertise to support an organization to implement an Information Security Management System that complies with ISO/IEC 27001 • Understand the Information Security Management System implementation process • Provide continual prevention and assessments of threats within an organization • Understand the risk management process, controls, and compliance obligations • Acquire the necessary expertise to manage a team to implement an ISMS • Have the ability to support organizations in the continual improvement process of their Information Security Management System • Gain the necessary skills to audit organization's Information Security Management System • Build a basic understanding of NIST cybersecurity fundamentals • Know the RMF process and managing risk by identifying, assessing and responding to risk • Know how to use the framework to assess an organization's cybersecurity risk and the steps to implement or improve a cybersecurity program • Gain a more in-depth understanding of the COBIT framework • Understand the concepts, principles and methodologies used to establish, enhance and maintain a system for effective governance and management of enterprise information technology • Gain a thorough understanding of enterprise risk concepts, frameworks, reporting metrics, mitigation strategies and decision making • Understand a verity of administrative, technical and physical controls, such as audits, incident response, security policies and access controls • Have an in-depth understanding of enterprise risk and the controls needed to help keep organizations safe from cybercrime

Vulnerability Assessment & Penetration Testing Intern

2023-07 - 2023-10

Digital Encode • Lagos, Nigeria

Conduct Network/ System Vulnerability Assessments, Penetration Testing using tools to evaluate attack vectors, identify system vulnerabilities, and provide appropriate remediation plans for mitigation of the identified vulnerabilities. Conduct Application vulnerability assessments, Penetration Testing for web applications, identify and report vulnerabilities, provide recommendations, and track closure of identified vulnerabilities. Abide by the project timelines and maintain project discipline. • Conduct Network/ System Vulnerability Assessments, Penetration Testing using tools to evaluate attack vectors, identify system vulnerabilities, and provide appropriate remediation plans for mitigation of the identified vulnerabilities • Conduct Application vulnerability assessments, Penetration Testing for web applications, identify and report vulnerabilities, provide recommendations, and track closure of identified vulnerabilities • Abide by the project timelines and maintain project discipline

Information Security Administrator

2022-09 - 2022-11

Virtually Testing Foundation • California, USA

MITRE ATT&CK. Vulnerability Management. Endpoint Security. Network Security. Virtualization Fundamentals. OSINT. Web Application Security. Cloud Fundamentals. • MITRE ATT&CK • Vulnerability Management • Endpoint Security • Network Security • Virtualization Fundamentals • OSINT • Web Application Security • Cloud Fundamentals

Program Manager

2020-01 - 2021-12

AfricaHacks

Plan and monitor program execution. Aligning and realigning deliverables with program outcomes. Enable developers to transform their hackathon projects into a startup by organizing guest speaking sessions, pitch days, and events. Increase community engagement by 30% by engaging the community by doing various activities. • Plan and monitor program execution • Aligning and realigning deliverables with program outcomes • Enable developers to transform their hackathon projects into a startup by organizing guest speaking sessions, pitch days, and events • Increase community engagement by 30% by engaging the community by doing various activities

Technical Writer

2020-07 - 2022-05

Section.io

Freelance technical writer. Link to my portfolio: http://bit.ly/3cNjyDj • Freelance technical writer • Link to my portfolio: http://bit.ly/3cNjyDj

EDUCATION

Yaba College of Technology

2015 - 2018

National Diploma in Computer Engineering