SlideShare a Scribd company logo
1 of 4
Carolyn Clarke
Carolynflower26@gmail.com 804-572-1228
 Clearance Level: Secret – TS Interim
 DoD 8570 compliant as a CNDSP Analyst & IAT Level II
PROFESSIONAL PROFILE
 Excellent hardware & software troubleshooting skills, strong communication and organization skills with expertise in
an Incident Management environment; conscientious attention to detail to prepare work performed.
 Expert customer service; identify clients and/orcustomer to access needs,provide information or assistance
interpreting, analyzing and applying operations and security guidance to resolve their problems or satisfy their
expectations.
 Accurately communicate information through oral presentation,identifying problems, problem solving, ascertains root
cause and impact, and providing recommendations for resolution.
 Result-driven with an excellent track record of cooperation among cross-integrated team members and other
organizational departments.
PROFESSIONAL EXPERIENCE
System Administrator Mid
Quantico, Virginia, United States
BAI, Inc.
June 2016 – Present
 Determines accuracy of information, uses sound judgment to generate and evaluate alternatives, and to make
recommendations
 Provide guidance and instruction to the service desk for handling standard Active Directory related incidents and
 service requests.
 Provide Active Directory Service Desk Resolution Reports documentation to the service desk on the procedures for
completing the task.
 Receive and satisfy requests Remedy Action Request System(ARS), Remedy Help Desk, Asset Manager and
other incident management console software to monitor, manage, escalate and resolve any issues for the
enterprise.
 Assist with troubleshooting network outages on the enterprise level.
 Assist all local Administrators with escalated issues on the enterprise domain
 Create documentation on troubleshooting network related issues
 Use RDP to remote into servers to manage issues related to AD DS database
 Assist cybersecurity team regarding possible network intrusions
 Microsoft exchange management console and shell
 Laptop and Desktop support – hardware and software
 Server configuration and support,add computers to domain
 Experience supporting Windows 7 and Windows 10 operating system
 Rebuild profiles, perform Registry fixes, using Symantec access disk and JRAVE
Cyber Security Analyst
Quantico, Virginia, United States
BAI, Inc.
August 2014 – June 2016
 Support 24/7 operations watch floor environment
 Monitor network-based IDS/IPS devices,correlate global actions and associated events into actionable/reportable
analysis that could lead to an intrusion on the Marine Corps Enterprise Network working closely with the Marine
Corps Network Operations Security Center (MCNOSC) on determining ‘real world’ events as they happen and also in
trend analysis to provide indications and warnings of future intrusion and attack incidents.
 Performed as Privileged System Administrator with access to systemcontrol, monitoring and administration functions
 Delivers network security monitoring by evaluating Real-Time and Historical intrusion detection analysis, manual and
automated event correlation, and event escalation activities.
 Monitor raw network traffic through the use of various enterprise tools such as McAfee Intrushield, McAfee
Enterprise Security Manager ESM (Nitro), HBSS ePolicy Orchestrator (EPO), Fortianalyzer, Belmanage, Ironport,
Interrogator, Bluecoat proxy, and Centaur with ability to assess and advise methods and procedures for systems and
applications.
 Document a systemfrom an IA perspective using Microsoft Office including MS Word, MS Excel, MS Visio and
other appropriate tools.
 Research and recommend logical and physical solutions that prevent, detect and correct the systemto be certified and
accredited.
 Trained new hires providing leadership and guidance in getting their accounts and providing guidance for
implementing the MCD database to create events.
 Develops/participates in the improvement of local IT policy and procedures supporting activities. Analyze incidents
and events captured in Intrushield, HBSS, NSM and other detection tools and correlate data for malicious trends,
patterns,or actionable information. Gather supporting evidence and authordetailed reports then enter to the MCD
(Marine Collection Database) for action.
 Knowledge of commonly applied principles, methodologies, operating characteristics and capabilities of and related
software systems,processes and procedures.
 .Monitor dedicated inbox for reporting of suspicious emails. Perform analysis to email header, routing, and content to
ascertain threat then respond to submitters with findings and recommendations.
 Recommend ACL, DNS, and/or SMTP blocks as needed to neutralize/mitigate threats from suspicious email.
 Analyze data packets, review signatures,analyze and interpret PCAP using Wireshark
 Create HBSS queries and disseminate to entire Watch Team for monitoring of ePos - On Access Scan and VSE
threat events.
 Assess enterprise risk to network assets and performance, as was well as,identify type of attack, estimate
impact while collecting evidence for reports (to include incidents, outages,threats/technicalvulnerabilities)
 Review and analyze findings that identify security issues on the system. Provide analysis for the Information
System Security Engineer (ISSE), SystemAdministrator (SA), and Project Manager (PM) for remediation and
informational purposes.
 Maintain current knowledge on immerging threats,malware, zero day exploits, APTs and apply information to
identify new threats to MCEN (Marine Corp Enterprise Network).
 Interpret incoming (classified and unclassified) Intel reports from various DOD agencies and take appropriate actions.
 Report MCEN Incidents to the Joint CERT Database for US Cyber Command.
 Coordinate with the Incident Responders and Senior Analysts to maintain situational awareness of issues within our
respective AORs.
 Provide technical support in identifying and specifying requirements and performing risk assessments
 Perform daily duties as a Liaison to the Battle Captain.
 Guidelines for creation of Remedy tickets for multiple purposes - ACL blocks, DNSBH, creating new accounts,
review of SPAM.
 Interpret incoming (classified and unclassified) Intel reports from various DOD agencies and take appropriate actions.
 Demonstrated ability to lead a team in performing day-to-day work and ensuring availability and functionality
while coordinating with appropriate process owners when additional resources are required.
 Perform duties ensuring compliance with all policies, instructions,SOPs and/or guidelines
 Ability to interpret, define and translate customer requirements in order to provide courses ofaction and
recommendations.
 Ability to interface with co-workers, superiors and third party vendors.
Act as liaison between IT Ops, CyberSecurity and Logistics to resolve any problems.
 Coordinate resolution of cross-division or cross-department issues.
 Familiar with Windows 7 & Windows 8 performing registry analysis on both.
Help Desk Administrator/Field Technician
Quantico, Virginia, United States
BAI, Inc
April 2014 – August 2014
 Received incoming calls from users in the National Capital Region (NCR) and determined the best resolution for
issues with software and hardware in the Enterprise Service Call Center.
 Maintain calendar conference rooms, schedule appointments,meetings, reserve conference rooms
 Created tickets in Remedy into ticket tracking database with 98% accuracy.
 Ensure timely attention to all incoming calls by responding to 95% of calls within 5 minutes.
 Ensure timely attention to all incoming emails by responding to all emails within 20 minutes.
 Maintain facilities management systems by documenting customer request activity.
 Front desk security checking in visitors for meetings, distributing parking passes,ensuring no electronic devices
were in their possession.Signed for Federal Express deliveries.
 Checked in new hires, checking JPASS to ensure they were on the roster.
 Liaison with senior civilian and military, flag level and distinguished visitors with the Department of Defense
and Defense Cyber Service Operations and their staff.
 Reset passwords on PKI systemfor CACs.
 Acted a Queue Managerdistributing trouble tickets to appropriate department for resolution.
 Performed follow up on all open tickets before resolving.
 User contact handling SAAR accounts,confirming they had necessary drives and email needed to perform their job
 Activate and tether software for Blackberry Accounts.
 Provide technical support to customers via telephone, email and through tickets analyzing , implementing,
troubleshooting and maintaining hardware and software.
software and hardware issues
 Help customers identify and resolve issues pertaining Lan/Wan connectivity,domain issues,BitLocker and Symantec
issues,including software updates,and Microsoft repairs.
 Maintained documentation of processes and tickets
 Configuration, of workstations, laptops and other peripherals.
Systems Technology Administrator
Spotsylvania County Schools, Spotsylvania, VA
August 2011 – April 2014
 Assist the schoolinstructional and administrative staff in the use of computers and related technology.
 Monitor the local network hardware and software, including servers,peripherals, switches and wiring.
 Provide support and train users on network usage (i.e. logging in, printing, file management, etc.)
 Responsible for performing network troubleshooting to isolate and diagnose network problems.
 Provide local workstation support for the students and staff,to include hardware setup,hardware moves, installation
of printers, and troubleshooting.
 Evaluate and resolve software and OS issues such as boot failure, application corruption, software failure, system
freezing, registry file corruption, device driver failure as well as troubleshooting on post image issues.
 Image laptops/desktops fornew assets,systemupgrades ofcurrent assets,including user profile and data migration
from their current to upgraded systems.
 Install approved applications and ghost when needed.
 Ability to interpret and execute a variety of instructions furnished in written, oral or schedule form.
 Image laptops/desktops fornew assets,systemupgrades ofcurrent assets,including user profile and data migration
from their current to upgraded systems.
 Maintain LAN security by reviewing log and audit trails to detect intrusion, virus or othermalicious activity and use
our provided virus tools for removal.
 Analyze LAN & WLAN network connectivity issues using TCP/IP tools to check for the IP Address,Hostname.
 Troubleshoot a variety of hardware issues stemming from components failure within workstations (hard drive,
memory etc.) to external peripherals, to printer issues (connectivity issues,jamming and component replacement).
 Use Active Directory for managing user accounts,as well adding and/ordeleting computer names to and from the
correct OU group within our domain.
 Provide network administration to include backups,add/delete/change users on network and email distribution lis ts,
console operations,virus protection, systemcleanup functions, such as purge files, directory, directory moves, etc.
 Monitors student use of technology resources,and reports irregularities to schooladministration.
 Function as liaison between schoolstaff and Central Office Technology Staff. Monitor an accurate inventory of all
computer hardware and software.
 Creates work orders for central support and track issues to resolution.
 LAN Admin for users such as the installation of personalcomputers and workstations onto the network, configuring
network interface cards and client software as well as configuring network printers
 Purchases technology supplies for school, as well as assists with developing and monitoring the school’s technology
budget.Serves as Channel 17 contact person.
EDUCATION
Ashford University - Masters Degree in Learning & Teaching with Technology - 2013
Ashford University - Bachelors Degree in Organizational Management - 2011
TRAINING
EC Council Certified Ethical Hacker – 2016
Remedy 8.1 Incident Management - 2016
Marine Corps Intrusion Detection Analysis Training – 2015
STIG Compliant – 2015
CompTIA Network+ CE - 2014
CompTIA Security+ CE - 2014
Microsoft Technical Associate Network Fundamentals – 2014
Microsoft Certified Professional - 2014

More Related Content

What's hot

Cst 610 Motivated Minds/newtonhelp.com
Cst 610 Motivated Minds/newtonhelp.comCst 610 Motivated Minds/newtonhelp.com
Cst 610 Motivated Minds/newtonhelp.comamaranthbeg53
 
E_BRZOZOWSKI_RESUME_JUNE_2015
E_BRZOZOWSKI_RESUME_JUNE_2015E_BRZOZOWSKI_RESUME_JUNE_2015
E_BRZOZOWSKI_RESUME_JUNE_2015Ed Brzozowski
 
Csec 610 Motivated Minds/newtonhelp.com
Csec 610 Motivated Minds/newtonhelp.comCsec 610 Motivated Minds/newtonhelp.com
Csec 610 Motivated Minds/newtonhelp.comamaranthbeg52
 
Cyb 610 Inspiring Innovation--tutorialrank.com
Cyb 610 Inspiring Innovation--tutorialrank.comCyb 610 Inspiring Innovation--tutorialrank.com
Cyb 610 Inspiring Innovation--tutorialrank.comPrescottLunt386
 
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and TechniquesPACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and TechniquesPace IT at Edmonds Community College
 
Cst 610 Enhance teaching / snaptutorial.com
Cst 610  Enhance teaching / snaptutorial.comCst 610  Enhance teaching / snaptutorial.com
Cst 610 Enhance teaching / snaptutorial.comBaileyabw
 
Raul Ruano's Resume 2014
Raul Ruano's Resume 2014Raul Ruano's Resume 2014
Raul Ruano's Resume 2014Raul Ruano
 
CST 610 RANK Redefined Education--cst610rank.com
CST 610 RANK Redefined Education--cst610rank.comCST 610 RANK Redefined Education--cst610rank.com
CST 610 RANK Redefined Education--cst610rank.comclaric240
 
M Kamens Iia Financial Services Presentation At Disney
M Kamens Iia Financial Services Presentation At DisneyM Kamens Iia Financial Services Presentation At Disney
M Kamens Iia Financial Services Presentation At Disneykamensm02
 
CST 610 Effective Communication/tutorialrank.com
CST 610 Effective Communication/tutorialrank.comCST 610 Effective Communication/tutorialrank.com
CST 610 Effective Communication/tutorialrank.comjonhson198
 
CST 610 RANK Achievement Education--cst610rank.com
CST 610 RANK Achievement Education--cst610rank.comCST 610 RANK Achievement Education--cst610rank.com
CST 610 RANK Achievement Education--cst610rank.comkopiko146
 
Csec 610 Enhance teaching / snaptutorial.com
Csec 610  Enhance teaching / snaptutorial.comCsec 610  Enhance teaching / snaptutorial.com
Csec 610 Enhance teaching / snaptutorial.comBaileyabv
 
CST 610 RANK Introduction Education--cst610rank.com
CST 610 RANK Introduction Education--cst610rank.comCST 610 RANK Introduction Education--cst610rank.com
CST 610 RANK Introduction Education--cst610rank.comagathachristie265
 
CSEC 610 Effective Communication/tutorialrank.com
 CSEC 610 Effective Communication/tutorialrank.com CSEC 610 Effective Communication/tutorialrank.com
CSEC 610 Effective Communication/tutorialrank.comjonhson198
 

What's hot (15)

Cst 610 Motivated Minds/newtonhelp.com
Cst 610 Motivated Minds/newtonhelp.comCst 610 Motivated Minds/newtonhelp.com
Cst 610 Motivated Minds/newtonhelp.com
 
PACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.7: Overview of Security Assessment ToolsPACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.7: Overview of Security Assessment Tools
 
E_BRZOZOWSKI_RESUME_JUNE_2015
E_BRZOZOWSKI_RESUME_JUNE_2015E_BRZOZOWSKI_RESUME_JUNE_2015
E_BRZOZOWSKI_RESUME_JUNE_2015
 
Csec 610 Motivated Minds/newtonhelp.com
Csec 610 Motivated Minds/newtonhelp.comCsec 610 Motivated Minds/newtonhelp.com
Csec 610 Motivated Minds/newtonhelp.com
 
Cyb 610 Inspiring Innovation--tutorialrank.com
Cyb 610 Inspiring Innovation--tutorialrank.comCyb 610 Inspiring Innovation--tutorialrank.com
Cyb 610 Inspiring Innovation--tutorialrank.com
 
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and TechniquesPACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
 
Cst 610 Enhance teaching / snaptutorial.com
Cst 610  Enhance teaching / snaptutorial.comCst 610  Enhance teaching / snaptutorial.com
Cst 610 Enhance teaching / snaptutorial.com
 
Raul Ruano's Resume 2014
Raul Ruano's Resume 2014Raul Ruano's Resume 2014
Raul Ruano's Resume 2014
 
CST 610 RANK Redefined Education--cst610rank.com
CST 610 RANK Redefined Education--cst610rank.comCST 610 RANK Redefined Education--cst610rank.com
CST 610 RANK Redefined Education--cst610rank.com
 
M Kamens Iia Financial Services Presentation At Disney
M Kamens Iia Financial Services Presentation At DisneyM Kamens Iia Financial Services Presentation At Disney
M Kamens Iia Financial Services Presentation At Disney
 
CST 610 Effective Communication/tutorialrank.com
CST 610 Effective Communication/tutorialrank.comCST 610 Effective Communication/tutorialrank.com
CST 610 Effective Communication/tutorialrank.com
 
CST 610 RANK Achievement Education--cst610rank.com
CST 610 RANK Achievement Education--cst610rank.comCST 610 RANK Achievement Education--cst610rank.com
CST 610 RANK Achievement Education--cst610rank.com
 
Csec 610 Enhance teaching / snaptutorial.com
Csec 610  Enhance teaching / snaptutorial.comCsec 610  Enhance teaching / snaptutorial.com
Csec 610 Enhance teaching / snaptutorial.com
 
CST 610 RANK Introduction Education--cst610rank.com
CST 610 RANK Introduction Education--cst610rank.comCST 610 RANK Introduction Education--cst610rank.com
CST 610 RANK Introduction Education--cst610rank.com
 
CSEC 610 Effective Communication/tutorialrank.com
 CSEC 610 Effective Communication/tutorialrank.com CSEC 610 Effective Communication/tutorialrank.com
CSEC 610 Effective Communication/tutorialrank.com
 

Viewers also liked

Antecedentes sobre proyecto de desmunicipalizacion de la educacion
Antecedentes sobre proyecto de desmunicipalizacion de la educacionAntecedentes sobre proyecto de desmunicipalizacion de la educacion
Antecedentes sobre proyecto de desmunicipalizacion de la educacionvidasindical
 
El sernam que queremos marzo 2014 2 (1)
El sernam que queremos marzo 2014 2 (1)El sernam que queremos marzo 2014 2 (1)
El sernam que queremos marzo 2014 2 (1)vidasindical
 
economic survey 2015-16
economic survey 2015-16 economic survey 2015-16
economic survey 2015-16 Hafsa Memon
 
REVISTA QUIMICA-MENTE Impacto ambiental y humano de los compuestos químicos.
REVISTA QUIMICA-MENTE Impacto ambiental y humano de los compuestos químicos.REVISTA QUIMICA-MENTE Impacto ambiental y humano de los compuestos químicos.
REVISTA QUIMICA-MENTE Impacto ambiental y humano de los compuestos químicos.Rossana Jimenez
 
Por el derecho a una vejez digna
Por el derecho a una vejez dignaPor el derecho a una vejez digna
Por el derecho a una vejez dignavidasindical
 
Investigación segunda unidad LAS TICS EN LA EDUCACIÓN
Investigación segunda unidad LAS TICS EN LA EDUCACIÓNInvestigación segunda unidad LAS TICS EN LA EDUCACIÓN
Investigación segunda unidad LAS TICS EN LA EDUCACIÓNKarla Lopez Espinosa
 
Métricas para Startups y Técnicas de Crecimiento
Métricas para Startups y Técnicas de CrecimientoMétricas para Startups y Técnicas de Crecimiento
Métricas para Startups y Técnicas de CrecimientoMiguel Ángel Cervera
 
Parcela de La Florida AET Provincial Santiago
Parcela de La Florida AET Provincial SantiagoParcela de La Florida AET Provincial Santiago
Parcela de La Florida AET Provincial Santiagovidasindical
 

Viewers also liked (17)

Enterobacterias
EnterobacteriasEnterobacterias
Enterobacterias
 
Antecedentes sobre proyecto de desmunicipalizacion de la educacion
Antecedentes sobre proyecto de desmunicipalizacion de la educacionAntecedentes sobre proyecto de desmunicipalizacion de la educacion
Antecedentes sobre proyecto de desmunicipalizacion de la educacion
 
El sernam que queremos marzo 2014 2 (1)
El sernam que queremos marzo 2014 2 (1)El sernam que queremos marzo 2014 2 (1)
El sernam que queremos marzo 2014 2 (1)
 
Brain-based Learning
Brain-based LearningBrain-based Learning
Brain-based Learning
 
Historia del internet
Historia del internetHistoria del internet
Historia del internet
 
Glass
GlassGlass
Glass
 
Tema 11
Tema 11Tema 11
Tema 11
 
economic survey 2015-16
economic survey 2015-16 economic survey 2015-16
economic survey 2015-16
 
REVISTA QUIMICA-MENTE Impacto ambiental y humano de los compuestos químicos.
REVISTA QUIMICA-MENTE Impacto ambiental y humano de los compuestos químicos.REVISTA QUIMICA-MENTE Impacto ambiental y humano de los compuestos químicos.
REVISTA QUIMICA-MENTE Impacto ambiental y humano de los compuestos químicos.
 
Proyecto: El rincon de la ciencia
Proyecto: El rincon de la cienciaProyecto: El rincon de la ciencia
Proyecto: El rincon de la ciencia
 
Prueba presentacion con sonido
Prueba presentacion con sonidoPrueba presentacion con sonido
Prueba presentacion con sonido
 
Por el derecho a una vejez digna
Por el derecho a una vejez dignaPor el derecho a una vejez digna
Por el derecho a una vejez digna
 
Act2 mgm
Act2  mgmAct2  mgm
Act2 mgm
 
Sílabo
SílaboSílabo
Sílabo
 
Investigación segunda unidad LAS TICS EN LA EDUCACIÓN
Investigación segunda unidad LAS TICS EN LA EDUCACIÓNInvestigación segunda unidad LAS TICS EN LA EDUCACIÓN
Investigación segunda unidad LAS TICS EN LA EDUCACIÓN
 
Métricas para Startups y Técnicas de Crecimiento
Métricas para Startups y Técnicas de CrecimientoMétricas para Startups y Técnicas de Crecimiento
Métricas para Startups y Técnicas de Crecimiento
 
Parcela de La Florida AET Provincial Santiago
Parcela de La Florida AET Provincial SantiagoParcela de La Florida AET Provincial Santiago
Parcela de La Florida AET Provincial Santiago
 

Similar to Recentresume_Dec2016

Michael L Sawall INFOSEC
Michael L Sawall INFOSECMichael L Sawall INFOSEC
Michael L Sawall INFOSECMike Sawall
 
rafael_pabon_20160524
rafael_pabon_20160524rafael_pabon_20160524
rafael_pabon_20160524Rafael Pabon
 
Jacksons Resume_21March16
Jacksons Resume_21March16Jacksons Resume_21March16
Jacksons Resume_21March16Robert Jackson
 
Viera HR and IT Resume (2)
Viera HR and IT Resume (2)Viera HR and IT Resume (2)
Viera HR and IT Resume (2)EJaz VI
 
Robert donald resume iam 1
Robert donald resume iam 1Robert donald resume iam 1
Robert donald resume iam 1Robert Donald
 
Priscilla_Y_Thankudas Resume USAJOBS
Priscilla_Y_Thankudas Resume USAJOBSPriscilla_Y_Thankudas Resume USAJOBS
Priscilla_Y_Thankudas Resume USAJOBSPriscilla Thakurdas
 
Kim Renee Lewis Resume
Kim Renee Lewis ResumeKim Renee Lewis Resume
Kim Renee Lewis ResumeKim Lewis
 
Information Systems Professional 1 (1)
Information Systems Professional 1 (1)Information Systems Professional 1 (1)
Information Systems Professional 1 (1)Charles Mann
 
Noel_De_Leon_Alvior_CV
Noel_De_Leon_Alvior_CVNoel_De_Leon_Alvior_CV
Noel_De_Leon_Alvior_CVNoel Alvior
 

Similar to Recentresume_Dec2016 (20)

2016
20162016
2016
 
Michael L Sawall INFOSEC
Michael L Sawall INFOSECMichael L Sawall INFOSEC
Michael L Sawall INFOSEC
 
rafael_pabon_20160524
rafael_pabon_20160524rafael_pabon_20160524
rafael_pabon_20160524
 
Jacksons Resume_21March16
Jacksons Resume_21March16Jacksons Resume_21March16
Jacksons Resume_21March16
 
Liberatore_Resume
Liberatore_ResumeLiberatore_Resume
Liberatore_Resume
 
Misha Resume Nov 2016
Misha Resume Nov 2016Misha Resume Nov 2016
Misha Resume Nov 2016
 
Resume 01-21-16
Resume 01-21-16Resume 01-21-16
Resume 01-21-16
 
Hayat resume 1
Hayat resume 1Hayat resume 1
Hayat resume 1
 
Williams_L_
Williams_L_Williams_L_
Williams_L_
 
Jessica-Pruitt (1)
Jessica-Pruitt (1)Jessica-Pruitt (1)
Jessica-Pruitt (1)
 
Viera HR and IT Resume (2)
Viera HR and IT Resume (2)Viera HR and IT Resume (2)
Viera HR and IT Resume (2)
 
Resume2011
Resume2011Resume2011
Resume2011
 
Cortnie Guerra
Cortnie GuerraCortnie Guerra
Cortnie Guerra
 
Jenkins_ Carlasha 2016 v1
Jenkins_ Carlasha 2016 v1Jenkins_ Carlasha 2016 v1
Jenkins_ Carlasha 2016 v1
 
Robert donald resume iam 1
Robert donald resume iam 1Robert donald resume iam 1
Robert donald resume iam 1
 
New jw resume
New jw resumeNew jw resume
New jw resume
 
Priscilla_Y_Thankudas Resume USAJOBS
Priscilla_Y_Thankudas Resume USAJOBSPriscilla_Y_Thankudas Resume USAJOBS
Priscilla_Y_Thankudas Resume USAJOBS
 
Kim Renee Lewis Resume
Kim Renee Lewis ResumeKim Renee Lewis Resume
Kim Renee Lewis Resume
 
Information Systems Professional 1 (1)
Information Systems Professional 1 (1)Information Systems Professional 1 (1)
Information Systems Professional 1 (1)
 
Noel_De_Leon_Alvior_CV
Noel_De_Leon_Alvior_CVNoel_De_Leon_Alvior_CV
Noel_De_Leon_Alvior_CV
 

Recentresume_Dec2016

  • 1. Carolyn Clarke Carolynflower26@gmail.com 804-572-1228  Clearance Level: Secret – TS Interim  DoD 8570 compliant as a CNDSP Analyst & IAT Level II PROFESSIONAL PROFILE  Excellent hardware & software troubleshooting skills, strong communication and organization skills with expertise in an Incident Management environment; conscientious attention to detail to prepare work performed.  Expert customer service; identify clients and/orcustomer to access needs,provide information or assistance interpreting, analyzing and applying operations and security guidance to resolve their problems or satisfy their expectations.  Accurately communicate information through oral presentation,identifying problems, problem solving, ascertains root cause and impact, and providing recommendations for resolution.  Result-driven with an excellent track record of cooperation among cross-integrated team members and other organizational departments. PROFESSIONAL EXPERIENCE System Administrator Mid Quantico, Virginia, United States BAI, Inc. June 2016 – Present  Determines accuracy of information, uses sound judgment to generate and evaluate alternatives, and to make recommendations  Provide guidance and instruction to the service desk for handling standard Active Directory related incidents and  service requests.  Provide Active Directory Service Desk Resolution Reports documentation to the service desk on the procedures for completing the task.  Receive and satisfy requests Remedy Action Request System(ARS), Remedy Help Desk, Asset Manager and other incident management console software to monitor, manage, escalate and resolve any issues for the enterprise.  Assist with troubleshooting network outages on the enterprise level.  Assist all local Administrators with escalated issues on the enterprise domain  Create documentation on troubleshooting network related issues  Use RDP to remote into servers to manage issues related to AD DS database  Assist cybersecurity team regarding possible network intrusions  Microsoft exchange management console and shell  Laptop and Desktop support – hardware and software  Server configuration and support,add computers to domain  Experience supporting Windows 7 and Windows 10 operating system  Rebuild profiles, perform Registry fixes, using Symantec access disk and JRAVE
  • 2. Cyber Security Analyst Quantico, Virginia, United States BAI, Inc. August 2014 – June 2016  Support 24/7 operations watch floor environment  Monitor network-based IDS/IPS devices,correlate global actions and associated events into actionable/reportable analysis that could lead to an intrusion on the Marine Corps Enterprise Network working closely with the Marine Corps Network Operations Security Center (MCNOSC) on determining ‘real world’ events as they happen and also in trend analysis to provide indications and warnings of future intrusion and attack incidents.  Performed as Privileged System Administrator with access to systemcontrol, monitoring and administration functions  Delivers network security monitoring by evaluating Real-Time and Historical intrusion detection analysis, manual and automated event correlation, and event escalation activities.  Monitor raw network traffic through the use of various enterprise tools such as McAfee Intrushield, McAfee Enterprise Security Manager ESM (Nitro), HBSS ePolicy Orchestrator (EPO), Fortianalyzer, Belmanage, Ironport, Interrogator, Bluecoat proxy, and Centaur with ability to assess and advise methods and procedures for systems and applications.  Document a systemfrom an IA perspective using Microsoft Office including MS Word, MS Excel, MS Visio and other appropriate tools.  Research and recommend logical and physical solutions that prevent, detect and correct the systemto be certified and accredited.  Trained new hires providing leadership and guidance in getting their accounts and providing guidance for implementing the MCD database to create events.  Develops/participates in the improvement of local IT policy and procedures supporting activities. Analyze incidents and events captured in Intrushield, HBSS, NSM and other detection tools and correlate data for malicious trends, patterns,or actionable information. Gather supporting evidence and authordetailed reports then enter to the MCD (Marine Collection Database) for action.  Knowledge of commonly applied principles, methodologies, operating characteristics and capabilities of and related software systems,processes and procedures.  .Monitor dedicated inbox for reporting of suspicious emails. Perform analysis to email header, routing, and content to ascertain threat then respond to submitters with findings and recommendations.  Recommend ACL, DNS, and/or SMTP blocks as needed to neutralize/mitigate threats from suspicious email.  Analyze data packets, review signatures,analyze and interpret PCAP using Wireshark  Create HBSS queries and disseminate to entire Watch Team for monitoring of ePos - On Access Scan and VSE threat events.  Assess enterprise risk to network assets and performance, as was well as,identify type of attack, estimate impact while collecting evidence for reports (to include incidents, outages,threats/technicalvulnerabilities)  Review and analyze findings that identify security issues on the system. Provide analysis for the Information System Security Engineer (ISSE), SystemAdministrator (SA), and Project Manager (PM) for remediation and informational purposes.  Maintain current knowledge on immerging threats,malware, zero day exploits, APTs and apply information to identify new threats to MCEN (Marine Corp Enterprise Network).  Interpret incoming (classified and unclassified) Intel reports from various DOD agencies and take appropriate actions.  Report MCEN Incidents to the Joint CERT Database for US Cyber Command.  Coordinate with the Incident Responders and Senior Analysts to maintain situational awareness of issues within our respective AORs.  Provide technical support in identifying and specifying requirements and performing risk assessments  Perform daily duties as a Liaison to the Battle Captain.  Guidelines for creation of Remedy tickets for multiple purposes - ACL blocks, DNSBH, creating new accounts, review of SPAM.  Interpret incoming (classified and unclassified) Intel reports from various DOD agencies and take appropriate actions.  Demonstrated ability to lead a team in performing day-to-day work and ensuring availability and functionality while coordinating with appropriate process owners when additional resources are required.  Perform duties ensuring compliance with all policies, instructions,SOPs and/or guidelines
  • 3.  Ability to interpret, define and translate customer requirements in order to provide courses ofaction and recommendations.  Ability to interface with co-workers, superiors and third party vendors. Act as liaison between IT Ops, CyberSecurity and Logistics to resolve any problems.  Coordinate resolution of cross-division or cross-department issues.  Familiar with Windows 7 & Windows 8 performing registry analysis on both. Help Desk Administrator/Field Technician Quantico, Virginia, United States BAI, Inc April 2014 – August 2014  Received incoming calls from users in the National Capital Region (NCR) and determined the best resolution for issues with software and hardware in the Enterprise Service Call Center.  Maintain calendar conference rooms, schedule appointments,meetings, reserve conference rooms  Created tickets in Remedy into ticket tracking database with 98% accuracy.  Ensure timely attention to all incoming calls by responding to 95% of calls within 5 minutes.  Ensure timely attention to all incoming emails by responding to all emails within 20 minutes.  Maintain facilities management systems by documenting customer request activity.  Front desk security checking in visitors for meetings, distributing parking passes,ensuring no electronic devices were in their possession.Signed for Federal Express deliveries.  Checked in new hires, checking JPASS to ensure they were on the roster.  Liaison with senior civilian and military, flag level and distinguished visitors with the Department of Defense and Defense Cyber Service Operations and their staff.  Reset passwords on PKI systemfor CACs.  Acted a Queue Managerdistributing trouble tickets to appropriate department for resolution.  Performed follow up on all open tickets before resolving.  User contact handling SAAR accounts,confirming they had necessary drives and email needed to perform their job  Activate and tether software for Blackberry Accounts.  Provide technical support to customers via telephone, email and through tickets analyzing , implementing, troubleshooting and maintaining hardware and software. software and hardware issues  Help customers identify and resolve issues pertaining Lan/Wan connectivity,domain issues,BitLocker and Symantec issues,including software updates,and Microsoft repairs.  Maintained documentation of processes and tickets  Configuration, of workstations, laptops and other peripherals. Systems Technology Administrator Spotsylvania County Schools, Spotsylvania, VA August 2011 – April 2014  Assist the schoolinstructional and administrative staff in the use of computers and related technology.  Monitor the local network hardware and software, including servers,peripherals, switches and wiring.  Provide support and train users on network usage (i.e. logging in, printing, file management, etc.)  Responsible for performing network troubleshooting to isolate and diagnose network problems.  Provide local workstation support for the students and staff,to include hardware setup,hardware moves, installation of printers, and troubleshooting.  Evaluate and resolve software and OS issues such as boot failure, application corruption, software failure, system freezing, registry file corruption, device driver failure as well as troubleshooting on post image issues.  Image laptops/desktops fornew assets,systemupgrades ofcurrent assets,including user profile and data migration from their current to upgraded systems.
  • 4.  Install approved applications and ghost when needed.  Ability to interpret and execute a variety of instructions furnished in written, oral or schedule form.  Image laptops/desktops fornew assets,systemupgrades ofcurrent assets,including user profile and data migration from their current to upgraded systems.  Maintain LAN security by reviewing log and audit trails to detect intrusion, virus or othermalicious activity and use our provided virus tools for removal.  Analyze LAN & WLAN network connectivity issues using TCP/IP tools to check for the IP Address,Hostname.  Troubleshoot a variety of hardware issues stemming from components failure within workstations (hard drive, memory etc.) to external peripherals, to printer issues (connectivity issues,jamming and component replacement).  Use Active Directory for managing user accounts,as well adding and/ordeleting computer names to and from the correct OU group within our domain.  Provide network administration to include backups,add/delete/change users on network and email distribution lis ts, console operations,virus protection, systemcleanup functions, such as purge files, directory, directory moves, etc.  Monitors student use of technology resources,and reports irregularities to schooladministration.  Function as liaison between schoolstaff and Central Office Technology Staff. Monitor an accurate inventory of all computer hardware and software.  Creates work orders for central support and track issues to resolution.  LAN Admin for users such as the installation of personalcomputers and workstations onto the network, configuring network interface cards and client software as well as configuring network printers  Purchases technology supplies for school, as well as assists with developing and monitoring the school’s technology budget.Serves as Channel 17 contact person. EDUCATION Ashford University - Masters Degree in Learning & Teaching with Technology - 2013 Ashford University - Bachelors Degree in Organizational Management - 2011 TRAINING EC Council Certified Ethical Hacker – 2016 Remedy 8.1 Incident Management - 2016 Marine Corps Intrusion Detection Analysis Training – 2015 STIG Compliant – 2015 CompTIA Network+ CE - 2014 CompTIA Security+ CE - 2014 Microsoft Technical Associate Network Fundamentals – 2014 Microsoft Certified Professional - 2014