Summary
Overview
Work History
Education
Skills
Certification
Timeline
MASTER’S THESIS (2024)
Generic

FRANKLIN AKINDEJOYE

Berlin

Summary

Certified IT Governance and Information Security professional with proven experience in the banking sector, specializing in regulatory compliance, risk management, and audit leadership. Currently leading IT governance and compliance initiatives at Lloyds Bank, ensuring adherence to DORA, MaRisk, and internal frameworks while driving the rollout of new GRC systems and automation of compliance processes. Previously managed Solaris Bank’s ISMS in alignment with BAIT, ISO 27001, and GDPR, leading security audits, risk assessments, and third-party assurance programs. Skilled in developing robust IT controls, improving operational resilience, and fostering a strong culture of security and compliance across organizations. Holds advanced certifications, including CISSP, CISM, CISA, and ISO 27001 Lead Implementer, complemented by an M.Sc. in Computer Science.

Overview

6
6
years of professional experience
7
7
Certification

Work History

IT Governance & Compliance Analyst

Lloyds Bank
11.2023 - Current
  • Manage the rollout of internal IT policies, ensuring IT processes adherence to regulatory frameworks (DORA, MaRisk), as well as group and internal standards.
  • Manage IT risks and controls in accordance with the bank-wide risk management framework, and report key risk indicators (KRIs) to the Compliance Committee.
  • Collaborate with external IT suppliers to gain assurance on their processes and control environment, and assess their compliance.
  • Lead internal and external ICT audits, including coordinating remediation activities for identified audit findings.
  • Drive IT projects or work streams related to governance and compliance, such as the implementation of new regulations and the automation of compliance processes.
  • Oversee the compliant implementation of new IT systems and technologies to ensure operational resilience, security, and compliance, currently leading the implementation of a new GRC platform.


Information Security Manager

Solaris Bank
12.2021 - 10.2023
  • Developed, maintained, and continuously improved the Information Security Management System (ISMS) in compliance with BAIT, ISO 27001, GDPR, and BSI IT-Grundschutz.
  • Defined and enforced security policies, procedures, and controls; managed risk assessments, vulnerability management, access control, and incident response.
  • Conducted regular risk assessments and vendor security reviews, mitigating third-party risks and ensuring alignment with bank security standards.
  • Led internal and external audits (BaFin/BuBa, deposit protection fund, ISO 27001), consistently achieving positive results with minimal findings, and managed audit findings.
  • Delivered company-wide security awareness programs and training to strengthen employee security behavior and culture.
  • Implemented ISMS improvement initiatives, including the implementation of new security tools like Orca, 1Password, Knowbe4, etc., and drove cross-team security initiatives.

IT Support Specialist

Sennder GmbH
01.2021 - 11.2021
  • Maintained user accounts across Google Workspace, Azure Active Directory, Salesforce, Atlassian, Slack, and other tools.
  • Provided first and second-level IT support to over 800 employees.
  • Supported the planning, execution, and documentation of internal IT projects and processes in Confluence.
  • Managed access controls to ensure secure system usage.
  • Handled risk and incident management, including documentation and follow-up actions.

Intern IT Support Administrator

Krones AG
06.2020 - 12.2020
  • Administered and supported Windows 7, Windows 10, Office 365, and related business applications.
  • Provided first and second-level support, diagnosing and resolving hardware, software, and end-user issues.
  • Managed user authorizations, asset lifecycle, asset tracking, and end-of-life services.
  • Actively participated in ITIL processes, including Incident, Request, Problem, and Change Management.

IT Instructor and Administrator

Saint Paul's Catholic Seminary
11.2014 - 10.2015
  • Managed workstations, laptops, printers, applications, and network systems.
  • Trained students and employees in the effective use of tools and software.

Education

M.Sc. - Computer Science

University of Passau
Passau, Germany
02.2024

B.Sc. - Computer Engineering

Obafemi Awolowo University
Ile-Ife, Osun State, Nigeria
05.2014

Skills

  • Audit Management (Internal, External, BaFin/BuBa, ISO 27001)
  • IT Process Design & Optimization
  • Information Security Management (ISMS)
  • IT Governance & Compliance Management
  • Risk Management & Control Frameworks
  • Regulatory Compliance (DORA, MaRisk, GDPR, BSI IT-Grundschutz)
  • Security Awareness & Training Program Development
  • Access Control
  • Vulnerability Management
  • Incident Response Coordination

Certification

  • Certified Information Security Manager (CISM)
  • Certified Information Systems Auditor (CISA)
  • Certified Information Systems Security Professional (CISSP)
  • Systems Security Certified Practitioner (SSCP)
  • AWS Certified Solutions Architect Associate
  • TUV ISO 27001 Lead Implementer
  • ITIL Foundation Certificate in IT Service Management

Timeline

IT Governance & Compliance Analyst

Lloyds Bank
11.2023 - Current

Information Security Manager

Solaris Bank
12.2021 - 10.2023

IT Support Specialist

Sennder GmbH
01.2021 - 11.2021

Intern IT Support Administrator

Krones AG
06.2020 - 12.2020

IT Instructor and Administrator

Saint Paul's Catholic Seminary
11.2014 - 10.2015

B.Sc. - Computer Engineering

Obafemi Awolowo University

M.Sc. - Computer Science

University of Passau

MASTER’S THESIS (2024)

  • Topic: Federated Learning For Detecting Adversarial Memory Attacks
  • Summary: Artificial Intelligence (AI), particularly machine learning, can significantly help detect adversarial attacks on IoT devices. AI models can learn to distinguish between malicious and legitimate packets when properly trained. The thesis focused on training both centralized and federated learning models, enabling the differentiation of normal and adversarial traffic patterns related to memory attacks like buffer overflow on MQTT communication.
FRANKLIN AKINDEJOYE