Geoffrey is a professional IT engineer with very strong interpersonal and social skills, posses a structured IT support and Information Security experience spanning over 10 years. Providing the expertise needed for the design and implementation of complex identity and access management with many of the largest organizations in the world. Providing value through a set of services that include IAM (Identity and Access Management, Privileged Access Management, IDaaS (Identity as a Service). Experience of managing complex deployments including CyberArk and CA PAM. Acquired very strong experience and solid IT Security / infrastructure support skills. Dedicated to maintaining high quality standards in the workplace and willing to learn new technologies; with proficiency in planning own schedules as well as working with others as part of a team.  Have a natural ability to quickly grasp complex business issues and to come up with solutions.

    20190404_094144_edited.jpg

    Geoffrey Ogambo BSc, CISM, CCNA

    I&AM - PAM (Privileged Access Management) SME

     

    Phone:

    +447795259609

     

    Email:

    ogambob@gmail.com 

     

    Address:

    168 Harehills Avenue

    Leeds, LS8 4ET

    EXPERIENCE
     
    04/2019-Date

    Information Security-Privileged Access Management (PAM) SME

    TNT FEDEX

    *Ensuring the business adheres to policies and controls which include: Define/maintain/control IAM policies and procedures
    *Contribute to policies/definitions for maintenance and control of Role Based Access
    Automation of IAM processes, reviews and controls.
    *Assist in Implementation of Privileged Access Management solution working with multiple large and small business units to facilitate IAM deployment and improvement projects.
    *Working with a dynamic SOX Compliance team to deliver an IAM solution to ensure SOX compliance.
    *Work with IT, Infosec and Privacy experts.
    *Lead analysis meetings for requirements gathering.
    *Manage scope and requirements traceability.
    *Define and document business needs and assess capability gaps.
    *Define and document use case scenarios and technical requirements.
    *Define and document test case scenarios, which properly exercise the client IAM implementation scenario.
    *Assist the business, define Segregation Of Duties (SOD), which align with SOX and business needs.
    *Perform reviews and testing on IAM to ensure quality
    *Support the organisation in safeguarding consistency and compliance on usage of tooling and terminology across the security teams
    *Deliver effective communications, and where applicable training, on the processes and enforce/ the process requirements to ensure high quality results and wide spread participation.
    *Help drive execution of key initiatives and maintain responsibility, understand applications in scope and functionality
    *Develop an in-depth understanding of all in-scope IAM delivery teams/processes to support the ability to provide status reporting including detailed requirements reviews and inclusion of appropriate resources as needed

    05/2016-03/2019

    Information Security–I&AM - Infrastructure Access Control & Automation

    LLOYDS BANKING GROUP

    *Setting up shared drives with NTFS permissions using RBAC

    *Privileged Access Management - Creating Standard, Privileged and Service Accounts across multiple domains and provisioning accesses - CyberArk

    *Administer Identity and Security Accesses for human and functional accounts across multiple systems and applications. This includes on-boarding/off-boarding, incident/problem management associated with access entitlements and terminations as well as Emergency & Privileged Access Management.

    *Raising and managing Change records on PDSM (ServiceNow)

    *Working with Project Managers on large and critical projects, tracking and reporting of progress / workload.

    *Identifying, assessing and advising on risks to the successful delivery of projects

    *Dealing with and resolving live multi projects support issues on very sensitive business systems whilst paying full regard to both internal and external standards such as SOX and ITEC

    EDUCATION
     
    2014

    BSc. (Hons)Computing

    LEEDS BECKETT UNIVERSITY

    2017

    CISM

    2007

    CCNA

    CYBRARY

    LEEDS COLLEGE OF TECHNOLOGY ( Network Academy) 

    TRAINING
    CLIENTS
     
    lloyds.png
    RBS.png
    halifax.jpg
    FedEx-TNT.jpg
    SKILLS
     

    ITIL V3

    Information Governance

    Identity & Access Management

    Privileged Access Management

    Process Driven Service Management (PDSM)

    CyberArk (Defender)

    CA PIM (Control Minder)

    Oracle Identity Manager (OIM)

    Risk Assessment, Analysis & Mitigation

    Penetration Testing (Kali)