From Business Analyst to Cybersecurity: Ololade Odunsi’s Inspiring Pivot Journey.

Ololade Odunsi.

Ololade Odunsi recently completed her graduate program at New Haven University, earning her master’s degree in Cybersecurity and Networks. During the graduation event, Ololade had the honor of delivering the commencement speech, addressing her fellow graduates with inspiring words and reflections on their collective journey.

Ololade’s path to this milestone has been marked by diverse experiences and a deep-seated passion for technology. She began her professional journey as a business analyst, where she honed her skills in understanding business processes and identifying technological solutions to enhance efficiency. Her interest in user experience led her to gain valuable experience in UI/UX design, allowing her to bridge the gap between technical implementation and user satisfaction.

In our conversation, Ololade shares her intriguing transition into the field of cybersecurity. She discusses the motivations behind her shift from business analysis and UI/UX to cybersecurity, highlighting the pivotal moments that sparked her interest in this critical domain. Ololade provides insights into the challenges she faced and the strategies she employed to overcome them, offering valuable advice for those considering a similar career change.

Can we get to know you?

My name is Ololade Odunsi, and I am a recent graduate who has made a significant career pivot into the field of Cybersecurity after spending five years working as a Business Analyst. My journey in the tech industry began with a strong foundation in business analysis, where I developed a keen eye for identifying business needs, optimizing processes, and implementing technological solutions that drive efficiency and growth.

How did your journey in Tech start?

It started roughly about four years ago when I began my career as an IT Business Analyst. At that time, my primary goal was to provide better solutions to organizations through process optimization and automation. I was driven by a desire to enhance business operations, improve efficiency, and ultimately contribute to the overall success of the companies I worked with. To achieve these objectives, I found myself working closely with IT professionals, gaining exposure to various aspects of technology and how it could be leveraged to solve business problems.

During my early years as an IT Business Analyst, I developed a deep understanding of business processes and how they intersect with technology. I was responsible for conducting thorough analyses of business needs, identifying areas for improvement, and proposing solutions that involved both process changes and the implementation of new technologies. This role required me to collaborate with a diverse range of stakeholders, from executives to end-users, to ensure that the solutions we developed were not only technically sound but also aligned with the strategic goals of the organization.

As I immersed myself in the world of IT, I became increasingly aware of the importance of data security and the potential risks associated with digital transformation. However, it wasn’t until two years ago that I truly discovered my passion for cybersecurity. This pivotal moment occurred while I was conducting a gap analysis for a client. The purpose of the analysis was to identify weaknesses and vulnerabilities in the client’s existing processes and systems and to recommend solutions to address these gaps.

Where do you work presently and your role?

I just graduated from my master’s program two weeks ago, earning my degree in Cybersecurity and Networks, and I am excited to have already secured an internship with Pitney Bowes as an IT Information Security Compliance Analyst, where I am eager to apply my newly acquired knowledge and skills in a practical, professional setting.

Did you have any role models who influenced your career path?

Yes, I did and I still do. Throughout my journey, I’ve always looked up to Confidence Staveley and Dr. Iretioluwa Akerele; I was astounded by the things they did, their depth of knowledge, and their commitment to community impact. Additionally, in recent times, I’ve had the privilege of meeting and being influenced by new inspiring individuals like Noureen Njoroge and Fabianna Rodriguez-Mercado, who continue to broaden my perspectives and drive my passion for making a difference.

Can you tell us about your educational background and any relevant certifications you have obtained so far?

I earned my Bachelor’s degree in Entrepreneurship Management from the Federal University of Technology, Akure. Recently, I completed my Master’s Degree in Cybersecurity and Networks from the University of New Haven, Connecticut. In addition to my academic pursuits, I participated in the Cybergirls Fellowship organized by Cybersafe Foundation and I am currently enrolled with Edureka to complete a Cybersecurity and Ethical Hacking course. While I haven’t acquired any Cybersecurity-specific certifications yet, I do hold compliance-related certifications such as the ISO 27001 certification.

What challenges did you face as you progressed in your tech career and how did you overcome them?

Navigating through the myriad options within the vast realm of Cybersecurity presented me with my greatest challenge. I found myself at a crossroads, torn between leveraging my existing strengths and delving into entirely new territories. As someone without a solid IT background, grappling with imposter syndrome was a constant battle, casting doubts on my capabilities. However, I persevered by seeking guidance from seasoned professionals and engaging in candid introspection sessions to discern my true aspirations and goals within the Cybersecurity domain. Through these efforts, I gradually gained clarity and confidence in forging my path forward.

You gave the commencement speech at your master’s graduation ceremony, how does that make you feel, and do you see yourself going for a PhD anytime soon?

It fills me with a profound sense of exhilaration and honor to have had the opportunity to impart words of encouragement to my peers, serving as a reminder that the apprehension and uncertainty they experience are universal sentiments. As I reflect on this experience, I’m humbled by the chance to connect with others on a deeper level and offer support during pivotal moments in their academic journey.

Ololade Odunsi Commencement Speech.

While the prospect of pursuing a Ph.D. remains a topic I’m actively contemplating, I have yet to reach a definitive decision, weighing various factors and considering how it aligns with my long-term aspirations and professional trajectory.

Can you share a moment from your graduate studies that was especially rewarding or transformative for you?

One of the most transformative experiences for me was stepping into the role of a Student Tutor at my university. It’s a common misconception that you truly understand a subject until you’re tasked with teaching it to others. As I navigated through this role, I found myself delving deeper into topics I thought I had mastered, uncovering nuances and complexities that had previously eluded me.

This journey of tutoring not only provided clarity on my academic and career path but also facilitated a profound enhancement of my own understanding of various concepts. Witnessing the joy and relief on students’ faces as they grasped challenging material and successfully passed their courses brought me immense fulfillment, reinforcing my passion for education and mentorship.

Can you describe a typical day or week at work for you?

Before graduating, my days were filled with reading, absorbing new concepts, refining delivery techniques, and tutoring fellow students. Now that I’ve transitioned into the workforce, my routine has evolved, and I’m still adjusting to the demands of my new role. I’d be happy to provide you with an update on my typical day at work next month once I’ve settled into my new professional environment.

Are there any emerging technologies or methodologies in cybersecurity that excite you?

Lately, I’ve developed a keen fascination for Cyber Threat Intelligence and Behavioral Analytics. I’ve delved into several case studies involving cyber attacks, employing Cyber Threat Intelligence Models to dissect them and devise robust mitigation plans and strategies. This exploration has been both engaging and rewarding, offering ample opportunities for in-depth research and analysis.

What are the most rewarding aspects of being a Cybersecurity Analyst?

Working in cybersecurity offers a dynamic landscape where new challenges arise daily, ensuring an environment free from monotony. Moreover, there’s a profound sense of significance in knowing that the work being done can make a tangible difference, potentially safeguarding the security and privacy of individuals. This combination of constant intellectual stimulation and meaningful impact is what makes the field so rewarding and fulfilling.

What career advice would you give to someone just starting out in Cybersecurity?

I would advise creating a comprehensive journey plan while remaining open to adjustments along the way. Expect to encounter varying and sometimes conflicting advice from different people; the key is to discern and apply what resonates with your goals. Additionally, seize every opportunity to network and acquire knowledge wherever possible. Lastly, consider seeking a mentor, but remain open-minded and receptive to guidance, embodying a teachable attitude.

As a woman in a tech-driven field, have you faced any specific challenges or advantages?

I consider myself fortunate and acknowledge the significant contributions of courageous women who have paved the way, making my journey smoother and opening doors for women in tech to thrive. Thanks to their efforts, I’ve had access to numerous events, grants, and conferences tailored for women in the tech industry, which has greatly facilitated my progress.

Finally, what resources (books, podcasts, networks, etc.) would you recommend to aspiring Cybersecurity Analysts?

I enjoy keeping up to date with the latest threats by visiting the Alienvault OTX website, as it provides valuable insights into recent threats and threat actors. Additionally, I found “Linux Basics for Hackers” to be quite helpful in enhancing my understanding of Linux usage. Occasionally, I tune in to CyberSecurity Headlines from CISO Series to stay informed about the latest cybersecurity news and developments.

It’s a pleasure talking to you Ololade.

It is a pleasure talking to you as well.

Total
0
Shares
Leave a Reply

Your email address will not be published. Required fields are marked *

Prev
MPOST launches digital e-P.O.Box system in Rwanda.

MPOST launches digital e-P.O.Box system in Rwanda.

East African digital postal service MPOST has officially launched its e-P

Next
Copia Kenya’s parent company enters administration after funding failure.

Copia Kenya’s parent company enters administration after funding failure.

B2C e-commerce company Copia Global, the parent company of Copia Kenya, has

You May Also Like
Total
0
Share