Sylvia Worlali Azumah

Graduate Student Cordinator at School of Information Technology at the University of Cincinnati
  • Claim this Profile
Online Presence
Contact Information
Location
Cincinnati, Ohio, United States, US

Topline Score

Bio

Generated by
Topline AI

0

/5.0
/ Based on 0 ratings
  • (0)
  • (0)
  • (0)
  • (0)
  • (0)

Filter reviews by:

No reviews to display There are currently no reviews available.

0

/5.0
/ Based on 0 ratings
  • (0)
  • (0)
  • (0)
  • (0)
  • (0)

Filter reviews by:

No reviews to display There are currently no reviews available.
You need to have a working account to view this content. Click here to join now

Experience

    • United States
    • Higher Education
    • 1 - 100 Employee
    • Graduate Student Cordinator
      • Aug 2021 - Present

      •Acting as a liaison between faculty and students with regard to admission, academic tracking and graduation. •Enhance graduate culture within departments. •Coordinate the distribution of department funds for graduate students.

    • Graduate Research Assistant
      • Aug 2020 - Aug 2021

      Cincinnati, Ohio, United States •Developing an anomaly detection model for IoT security that can function on a regular PC and a cloud system. •Supporting the Professor to research on current trends of cyber-attacks on IoT devices and also researching on the right anomaly detection algorithm to use in securing such attacks on IoT devices. •Study the current threat landscape and perform analysis of threat intel feeds.

    • United States
    • Software Development
    • 700 & Above Employee
    • Threat Intelligence and Hunt Intern
      • May 2023 - Sep 2023

      San Francisco Bay Area

    • United States
    • Entertainment Providers
    • 700 & Above Employee
    • Security & Threat Solution
      • May 2022 - Aug 2022

      Washington, District of Columbia, United States •Built reports and dashboards on several metrics factors to aid senior leadership in strategic decision-making. •Leverage a variety of research methods to understand IT trends that need to be adopted, leveraged, implemented, and combined with recommended approaches for TikTok. •Identify and analyze perceived, emerging, and disruptive trends in Cyber Security, and how these trends may dramatically alter these domains over the next 5-10 years. •Assess and develop the… Show more •Built reports and dashboards on several metrics factors to aid senior leadership in strategic decision-making. •Leverage a variety of research methods to understand IT trends that need to be adopted, leveraged, implemented, and combined with recommended approaches for TikTok. •Identify and analyze perceived, emerging, and disruptive trends in Cyber Security, and how these trends may dramatically alter these domains over the next 5-10 years. •Assess and develop the potential strategy recommendations the Global Security Organization should prepare for across people, process and technology, to help forecast and plan. •Utilized MITRE CVEs and CVSS scores in categorizing vulnerabilities to prioritize remediation. •Identify adversary tactics, techniques and procedures(TTPs) and present findings to aid in detection/mitigation. •Documented activities and actions performed during incidents and build out event timelines. Show less

    • United States
    • Software Development
    • 700 & Above Employee
    • Threat Hunt & Intelligence
      • Jun 2021 - Aug 2021

      San Francisco, California, United States Researched on advanced persistent threats and performed correlation of their TTPs. Monitored threat intel feeds to create actionable use cases for detections and response. Performed threat hunting across EDR and firewall logs for C2 and other malicious activity. Created SOPs, as a result of threat hunting, to facilitate detection/response of unapproved applications in the environment. Coordinated tabletop exercises for the detection/monitoring team and IR team, to test response… Show more Researched on advanced persistent threats and performed correlation of their TTPs. Monitored threat intel feeds to create actionable use cases for detections and response. Performed threat hunting across EDR and firewall logs for C2 and other malicious activity. Created SOPs, as a result of threat hunting, to facilitate detection/response of unapproved applications in the environment. Coordinated tabletop exercises for the detection/monitoring team and IR team, to test response policies and readiness. Extracted forensic artifacts from compromised hosts to assist in constructing timelines regarding intrusion incidents. Researched and analyzed latest threats, exploits to create actionable in-house intelligence feeds. Used various malware analysis techniques to analyze malware behavior in sandboxed environments. Show less

    • United States
    • Higher Education
    • 1 - 100 Employee
    • MCSI Remote Internship Programme
      • May 2020 - Jun 2021

      Australia I am currently interning with Mossé Cyber Security Institute in their Remote Internship Programme in order to develop and acquire the industry desired practical skills. The experience I gain through successfully completing their practical skills Internship Programme will provide me with professional confidence, acumen and experience to apply for any industry technology or security team position. This also positions me to provide the rigour to research and deliver appropriate technology… Show more I am currently interning with Mossé Cyber Security Institute in their Remote Internship Programme in order to develop and acquire the industry desired practical skills. The experience I gain through successfully completing their practical skills Internship Programme will provide me with professional confidence, acumen and experience to apply for any industry technology or security team position. This also positions me to provide the rigour to research and deliver appropriate technology solutions, thus becoming a valued member of the IT community. Some of the skills this remote internship programme imparts: Perform network vulnerability scans Exploit vulnerabilities with Metasploit Identify and exploit web application vulnerabilities without tools Write custom offensive security tools to aid Red Teaming operators Assess the security settings of Windows machines and harden them Hunt for malware using YARA Hunt for threat actors on Windows networks using Python Defend web applications against common vulnerabilities Track my progress by reviewing my online portfolio: https://students.mosse-institute.com/student/kCrdU30HT4anPwULvbedybXNsih2 MCSI’s motto: “Skills mastery win!” Show less

    • United States
    • Higher Education
    • 700 & Above Employee
    • Graduate Teaching Assistant
      • Aug 2019 - Aug 2020

      Cincinnati, Ohio • Assisting undergraduate students with their assignments and projects. • Supporting the instructor to grade and help students in the following courses: Fundamental of information technology, Fundamental of web development, Enterprise Application development.

    • Instructor
      • May 2020 - Jun 2020

      Cincinnati, Ohio, United States

    • Ghana
    • IT Services and IT Consulting
    • 1 - 100 Employee
    • Technical Associate
      • Feb 2019 - Jul 2019

      Kentinkrono- Nsenie, kumasi STEM Education for basic a Nd junior high schools ( kidsmakers project) 3D modeling and printing using TinkerCAD Web development Programming through gaming Science sets

    • Intern
      • Oct 2018 - Dec 2018

      Behind mizpah school , kentinkrono -Nsenie STEM EDUCATOR Teaching kids how to develop andriod apps using MIT APP INVENTOR

    • Utilities
    • 700 & Above Employee
    • National Service Person
      • Sep 2017 - Aug 2018

      Brong -Ahafo Region

    • Intern
      • Jun 2016 - Aug 2016

      P.o.box 5. Tamale -N/R General IT works (repairs,networking,software) Customer database updates

    • Intern
      • Jun 2015 - Aug 2015

      P.o.Box 767. Kumasi- A/R Networking Database update Repairs

Education

  • University of Cincinnati
    Doctor of Philosophy - PhD, Information Technology
    2021 - 2024
  • University of Cincinnati
    M.S Information Technology, Cyber security and forensics
    2019 - 2021
  • Ohio Cyber Range Institute
    Bootcamp, Cyber Security
    2020 - 2020
  • BlueCrest University College
    Bsc. Information Technology, Information Technology
    2013 - 2017

Community

You need to have a working account to view this content. Click here to join now