
Marcus W. Johnson
Independent Security Consultant

Connect with Marcus W. Johnson to Send Message
Connect
Connect with Marcus W. Johnson to Send Message
ConnectTimeline
About me
1G |Cyber Threat Intelligence Engineer |MSc. Cybersecurity |SASE |SSE |ISC2 CC |ICS/OT Risks |MITRE ATT&CK Defender |Adversary Emulation & Detection Engineer |SOC/XDR |IAM|AI/ML |Security Controls Validation Engineer|
Education

Fortinet Network Security Institute
2018 -Certified Network Security Expert (NSE) Cyber Threat LandscapeActivities and Societies: The Evolution of Cyber Security & The Cyber Threat Landscape The Fortinet Network Security Expert (NSE) ProgramThe Fortinet Network Security Expert (NSE) is an eight-level certification program designed for technical professionals interested in independent validation of their network security skills and experience. The program includes a wide range of self-paced and instructor-led courses, as well as practical, experiential exercises that demonstrate mastery of complex network security concepts.To earn certification at each of the levels,… Show more The Fortinet Network Security Expert (NSE) ProgramThe Fortinet Network Security Expert (NSE) is an eight-level certification program designed for technical professionals interested in independent validation of their network security skills and experience. The program includes a wide range of self-paced and instructor-led courses, as well as practical, experiential exercises that demonstrate mastery of complex network security concepts.To earn certification at each of the levels, you must pass a series of quizzes or exams. For NSE 1-3, the quizzes are incorporated into the self-paced learning packages hosted in the NSE Institute portal. A third-party vendor, Pearson VUE, proctors the exams for NSE 4-8. You can register for these exams online. To become NSE 8 certified, you must pass the written exam hosted by Pearson VUE, plus a practical exam hosted by Fortinet.All NSE certification levels are valid for 2 years.https://training.fortinet.com/local/staticpage/view.php?page=nse Show less

NIIT GHANA INTERNATIONAL
2009 - 2011Honours Deploma in Network Engineering Microsoft Technologies MCSE,MCITShttps://www.niit-tech.com/about-usNIIT Technologies is a leading global IT solutions organization, enabling its clients to transform at the intersect of unparalleled domain expertise and emerging technologies to achieve real-world business impact. The Company focuses on three key verticals: Banking and financial services, Insurance, Travel and Transportation. This domain strength is combined with leading-edge capabilities in Data & Analytics, Automation, Cloud, and Digital.

BlueCrest University College
2017 - 2021Bachelors of Technology - BTech Computer/Information Technology Administration and Management 3.18Activities and Societies: Virtualization Technologies, Network Security, Cloud Technologies, Network Infrastructure Design Security.

National College of Ireland
2023 - 2024MSc. Cyber Security Network Security & Pen Testing, Forensic, Data Governance, AI/MLCybersecurity, Cloud Security 66.10Activities and Societies: Basketball, Vice President Student Tech-club * Project Title: Testing The Efficacy of Windows Defender Endpoint Security Control Using BAS Technology* Research Questions:- How do misconfigurations in IT systems contribute to data breaches, and what are the most effective strategies for mitigating these risks?- What is the effectiveness of Breach and Attack Simulation (BAS) systems in enhancing security control testing and reducing the risk of misconfigurations in complex IT environments?- How can continuous security… Show more * Project Title: Testing The Efficacy of Windows Defender Endpoint Security Control Using BAS Technology* Research Questions:- How do misconfigurations in IT systems contribute to data breaches, and what are the most effective strategies for mitigating these risks?- What is the effectiveness of Breach and Attack Simulation (BAS) systems in enhancing security control testing and reducing the risk of misconfigurations in complex IT environments?- How can continuous security validation be integrated into existing cybersecurity frameworks to improve organizational resilience against sophisticated attacks?- What are the limitations of conventional endpoint security assessment techniques, and how can modern approaches, such as BAS, address these challenges?* Project Objectives: - Examining past incidents to identify patterns and weaknesses in security solutions. Investigate the reasons behind security capabilities failures.Recommendations for enhancing security program performance. Show less
Experience

Freelance
Jun 2019 - nowIndependent Security Consultant
Licenses & Certifications
- View certificate

Exam & Certification
SOCRadar AcademySept 2024 
ICS Cybersecurity Risk
Cybersecurity and Infrastructure Security Agency & DHS- View certificate

Industrial Control Systems Cybersecurity Risk
Cybersecurity and Infrastructure Security Agency - View certificate

CRPO - Certified Ransomware Protection Officer
ICTTF - Cyber Security Community, Academy and EventsAug 2024 - View certificate

Cybersecurity Exam Development Volunteer
ISC2Jun 2024 - View certificate

Intermediate Purple Teaming
AttackIQMay 2024 - View certificate

Fundamentals of Dark Web
SOCRadar® Extended Threat IntelligenceMar 2024 - View certificate

Intermediate Breach & Attack Simulation
AttackIQMar 2024 - View certificate

PwC Switzerland - Cybersecurity Job Simulation
ForageFeb 2024 - View certificate

Mastercard - Cybersecurity Job Simulation
ForageJan 2024 - View certificate

Intermediate MITRE ATT&CK
AttackIQDec 2023 - View certificate

Top ATT&CK Techniques
AttackIQDec 2023 - View certificate

Agentless Threat Emulation with AttackIQ Flex
AttackIQNov 2023 - View certificate

Foundations of Operationalizing MITRE ATT&CK v13
AttackIQNov 2023 - View certificate

SASE Business Impact and Strategy
Cato NetworksApr 2023 - View certificate

SASE Business Impact and Strategy
Cato NetworksApr 2023 - View certificate

SASE Deployment and Management
Cato NetworksApr 2023 - View certificate

SSE Expert Certification
Cato NetworksApr 2023 
Xcitium OpenEDR Fundamental
XcitiumApr 2023- View certificate

SASE Advanced Security
Cato NetworksMar 2023 - View certificate

SASE Expert Level 1
Cato NetworksMar 2023 - View certificate

SASE Expert Level 2
Cato NetworksMar 2023 - View certificate

Extending ATT&CK with ATT&CK Workbench
AttackIQFeb 2023 - View certificate

Foundation Level Threat intelligence Analyst
ArcXFeb 2023 - View certificate

Cyber Threat Hunting Level 1
Active CountermeasuresOct 2022 - View certificate

Countering Ransomware with MITRE ATT&CK
AttackIQJun 2022 - View certificate

Beyond Atomic Testing with Attack Flows
AttackIQJul 2021 - View certificate

MenuPass Emulation Plan Execution
AttackIQJun 2021 - View certificate

Application of ATT&CK Navigator
AttackIQApr 2021 
Differences in Deployment of ICS
U.S. Department of Homeland Security, Office of Intelligence and Analysis, Private Sector EngagementMar 2021- View certificate

Uniting Threat and Risk Management with NIST 800-53 and MITRE ATT&CK
AttackIQMar 2021 - View certificate

Foundations of Breach & Attack Simulation
AttackIQDec 2020 - View certificate

Introduction to EASY Framework for Threat Intelligence
AttackIQNov 2020 - View certificate

Foundations of Purple Teaming
AttackIQSept 2020 - View certificate

Introduction To FIN6 Emulation Plans
AttackIQSept 2020 - View certificate

Cyber Security Fundamentals
CiscoAug 2020 - View certificate

Foundations of Operationalizing MITRE ATT&CK
AttackIQAug 2020 - View certificate
%2C%20UK.webp)
ICSI | CNSS Certified Network Security Specialist
ICSI (International CyberSecurity Institute), UKJun 2020 - View certificate

GDPR Compliance: Essential Training
LinkedInMay 2020 
Advanced Cisco Routing: RIPv2, EIGRP, and OSPF
LinkedInMar 2020- View certificate

Creating a High Performance Culture
LinkedInNov 2019 - View certificate

Flight Club: Drones and the Dawn of Personal Aerial Imaging
LinkedInNov 2019 - View certificate

Learning Kali Linux
LinkedInAug 2019 - View certificate
%C2%B2.webp)
Certified in Cybersecurity (CC)
(ISC)²May 2023 - View certificate

CSCSO Certification
ICTTF - Cyber Security Community, Academy and EventsAug 2024 - View certificate

Fortinet Certified Associate Cybersecurity
FortinetJan 2024 - View certificate

XM Cyber- Exposure Management Expert
XM CyberDec 2023 - View certificate

OPSWAT File Security Associate (OFSA)
OPSWATJun 2024 - View certificate

Proofpoint Certified DLP Specialist 2024
ProofpointOct 2024 - View certificate

Fortinet Certified Fundamentals Cybersecurity
FortinetJan 2024 - View certificate

Kali Linux on Windows 10 First Look
LinkedInJul 2019 - View certificate

Proofpoint Certified Identity Threat Specialist
ProofpointJan 2024 - View certificate
%C2%B2.webp)
(ISC)² Candidate
(ISC)²Feb 2023 - View certificate

Leadership Skills for Building a Successful Insider Risk Detection Program - Teramind Certification
TeramindDec 2024 - View certificate

Teramind Insider Threat Detection Course Certification
TeramindDec 2024 - View certificate

Teramind Administration Certification
TeramindDec 2024
Honors & Awards
- Awarded to Marcus W. JohnsonA Security Mirage Believed by Many Big Tech Companies AttackIQ Informed Defenders Jun 2022 An Article published by me on the state of security in Africa by Marcus W. Johnsonhttps://informeddefenders.attackiq.com/forum/t/blog-a-security-mirage-believed-by-many-big-tech-companies-in-africa-by-marcus-w-johnson/223
- Awarded to Marcus W. JohnsonThe Art of Invisibility Knowbe4 Aug 2020 Even more than technology, privacy is an issue involving mindsets and behaviours and these involve “in the moment” tradeoffs that neither humans nor corporations are goodat being rational about.
- Awarded to Marcus W. JohnsonThe Best Ways to Stop Malware & Ransomware Knowbe4 Aug 2020 Two Best Ways to Stop Malware• Step-by-Step Instructions• Live Malware & Defense Demonstration
- Awarded to Marcus W. JohnsonHow to combat the Fake News and Disinformation Knowbe4 Jun 2020 Fact checking misinformation and disinformation, knowing active measures that are deployed to target individuals, race, religion, country etc... using computation propaganda (agitprop), Gaslighting, Astroturfing, sockpuppet, Deep Fakes and many other distorting social media technologies!!
- Awarded to Marcus W. JohnsonBiggest Cyber Threat: 3.5 M Unfilled Cyber Jobs BrightTALK Feb 2020 The biggest cyber threat is 3.5M unfilled cyber jobs. Without job-ready cyber talent employers cannot prevent or recover effectively from cyber breaches and compliance gaps. Without cyber talent, employers cannot benefit from their cyber technology investments. Tested strategies for mitigating the growing cyber talent gap with job-ready, certified cyber practitioners.
- Awarded to Marcus W. JohnsonAI/ML and AR/VR Applications in Real Life BrightTalk Feb 2019 Certificate of Attendance
- Awarded to Marcus W. JohnsonDetecting Tomorrow’s Threats Today with Mature AI & Machine Learning BrightTalk Jan 2019 Certificate of Attendance
- Awarded to Marcus W. JohnsonHow Fortinet Enterprise Firewalls deliver a unique fabric-based architecture BrightTalk Jan 2019 Certificate of Attendance
- Awarded to Marcus W. JohnsonMasterclass: How To Address Risk and Master Security in 2019 BrightTalk Jan 2019 Certificate of Attendance
- Awarded to Marcus W. JohnsonThe Nastiest Malware of 2018 for SMBs BrightTalk Jan 2019 Certificate of Attendance
- Awarded to Marcus W. JohnsonTop Cybersecurity Trends for 2019 BrightTalk Jan 2019 Certificate of Attendance
- Awarded to Marcus W. JohnsonFinals of National ICT Quiz - NIIT Ghana Inter-Center ICT QUIZ NIIT Ghana International 2011 Certificate of Participation
Recommendations

Ahmed abdelghany
Environmental ManagerBlue Springs, Missouri, United States
Mike mandel
Assistant Vice President; Sr Business Control Specialist at Bank of AmericaMedia, Pennsylvania, United States
Arpit chittora
ReactJs | Python | NodeJS | Senior Software Engineer | M. Tech.Bijolia, Rajasthan, India
Olga ste
Senior Associate @ Infosys | React.JS Engineer | AI ProfessionalUnited Kingdom
Shannon waters
Senior Analyst, Group Risk & Finance Transformation, BlueScope SteelMelbourne, Victoria, Australia
N.d poonja
Director at Pharma ConsultancyBengaluru, Karnataka, India
Eduardo kawashita
Analista de suporte técnico na Proxxi TecnologiaSão Paulo, São Paulo, Brasil
Abderrahman rabhi
Responsable méthodes maintenance adjoint chez TERREALAngoulême, Nouvelle-Aquitaine, France
Omkar jagtap
Learning Data Science | Python, SQL, Tableau | Exploring Insights & Machine Learning | Operations An...Mumbai, Maharashtra, India
Annisa murataj bsn, rn
Registered Nurse at Long Island Jewish Medical CenterQueens, New York, United States
Emmanuel a.
UNFPA || Data Analyst || Full Stack Software Developer || Tech Entrepreneur || Actuary || TroberKøbenhavn, Region Hovedstaden, Danmark
Guido a orozco garzon
Mechanical Engineer with a relevant background executing and managing Diesel Generator Projects and ...Greer, South Carolina, United States
Charalampos avramidis
Country Lead Talent Acquisition EMEA 🌟 Co-Founder and CEO at Podiatry Medicare | Senior People Lead...Germany
Rupp santos s
Software Engineer II (SDE - 2) at Salesforce | Former Head at Festember Guest Lectures NIT TrichyCoimbatore, Tamil Nadu, India
Afolabi olutola
AccountantKwara State, Nigeria
Ganesh gopinathan nair
Senior Financial Accountant at Allianz CommercialGreater Munich Metropolitan Area
Cindy king
Manager, Environmental and Health & SafetyMississauga, Ontario, Canada
Florence haridan
Because choices matter!Metro Jacksonville
Shawna mcelroy
Human Resources Services Lead | Talent Acquisition Specialist | Connecting Top Talent with Opportuni...Grimsby, Ontario, Canada
Elizabeth alawiye
Business Psychologist | Operations | Leadership development and coachingFort Worth, Texas, United States
...