Geoffrey is a professional IT engineer with very strong interpersonal and social skills, posses a structured IT support and Information Security experience spanning over 10 years. Providing the expertise needed for the design and implementation of complex identity and access management with many of the largest organizations in the world. Providing value through a set of services that include IAM (Identity and Access Management, Privileged Access Management, IDaaS (Identity as a Service). Experience of managing complex deployments including CyberArk and CA PAM. Acquired very strong experience and solid IT Security / infrastructure support skills. Dedicated to maintaining high quality standards in the workplace and willing to learn new technologies; with proficiency in planning own schedules as well as working with others as part of a team. Have a natural ability to quickly grasp complex business issues and to come up with solutions.
Geoffrey Ogambo BSc, CISM, CCNA
I&AM - PAM (Privileged Access Management) SME
168 Harehills Avenue
Leeds, LS8 4ET
Information Security-Privileged Access Management (PAM) SME
*Ensuring the business adheres to policies and controls which include: Define/maintain/control IAM policies and procedures
*Contribute to policies/definitions for maintenance and control of Role Based Access
Automation of IAM processes, reviews and controls.
*Assist in Implementation of Privileged Access Management solution working with multiple large and small business units to facilitate IAM deployment and improvement projects.
*Working with a dynamic SOX Compliance team to deliver an IAM solution to ensure SOX compliance.
*Work with IT, Infosec and Privacy experts.
*Lead analysis meetings for requirements gathering.
*Manage scope and requirements traceability.
*Define and document business needs and assess capability gaps.
*Define and document use case scenarios and technical requirements.
*Define and document test case scenarios, which properly exercise the client IAM implementation scenario.
*Assist the business, define Segregation Of Duties (SOD), which align with SOX and business needs.
*Perform reviews and testing on IAM to ensure quality
*Support the organisation in safeguarding consistency and compliance on usage of tooling and terminology across the security teams
*Deliver effective communications, and where applicable training, on the processes and enforce/ the process requirements to ensure high quality results and wide spread participation.
*Help drive execution of key initiatives and maintain responsibility, understand applications in scope and functionality
*Develop an in-depth understanding of all in-scope IAM delivery teams/processes to support the ability to provide status reporting including detailed requirements reviews and inclusion of appropriate resources as needed
Information Security–I&AM - Infrastructure Access Control & Automation
LLOYDS BANKING GROUP
*Setting up shared drives with NTFS permissions using RBAC
*Privileged Access Management - Creating Standard, Privileged and Service Accounts across multiple domains and provisioning accesses - CyberArk
*Administer Identity and Security Accesses for human and functional accounts across multiple systems and applications. This includes on-boarding/off-boarding, incident/problem management associated with access entitlements and terminations as well as Emergency & Privileged Access Management.
*Raising and managing Change records on PDSM (ServiceNow)
*Working with Project Managers on large and critical projects, tracking and reporting of progress / workload.
*Identifying, assessing and advising on risks to the successful delivery of projects
*Dealing with and resolving live multi projects support issues on very sensitive business systems whilst paying full regard to both internal and external standards such as SOX and ITEC
LEEDS BECKETT UNIVERSITY
LEEDS COLLEGE OF TECHNOLOGY ( Network Academy)
Identity & Access Management
Privileged Access Management
Process Driven Service Management (PDSM)
CA PIM (Control Minder)
Oracle Identity Manager (OIM)
Risk Assessment, Analysis & Mitigation
Penetration Testing (Kali)