Carolyn Clarke is a Secret-TS cleared cybersecurity professional with over 7 years of experience in incident management, cybersecurity analysis, systems administration, and help desk support. She has expertise in hardware and software troubleshooting, customer service, clear communication, and team collaboration. Currently she works as a System Administrator for BAI, Inc where her responsibilities include Active Directory management, network monitoring, documentation, and assisting the cybersecurity team. She has a Master's degree in Learning & Teaching with Technology and certifications including CEH, Remedy, and CompTIA.
For more course tutorials visit
www.newtonhelp.com
CST 610 Project 1 Information Systems and Identity Management
CST 610 Project 2 Operating Systems Vulnerabilities (Windows and Linux)
CST 610 Project 3 Assessing Information System Vulnerabilities and Risk
CompTIA exam study guide presentations by instructor Brian Ferrill, PACE-IT (Progressive, Accelerated Certifications for Employment in Information Technology)
For more course tutorials visit
www.newtonhelp.com
CSEC 610 Project 1 Information Systems and Identity Management
CSEC 610 Project 2 Operating Systems Vulnerabilities (Windows and Linux)
CSEC 610 Project 3 Assessing Information System Vulnerabilities and Risk
For more course tutorials visit
www.tutorialrank.com
CYB 610 Project 1 Information Systems and Identity Management
CYB 610 Project 2 Operating Systems Vulnerabilities (Windows and Linux)
CYB 610 Project 3 Assessing Information System Vulnerabilities and Risk
CompTIA exam study guide presentations by instructor Brian Ferrill, PACE-IT (Progressive, Accelerated Certifications for Employment in Information Technology)
"Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53"
Learn more about the PACE-IT Online program: www.edcc.edu/pace-it
For more classes visit
www.snaptutorial.com
CST 610 Project 1 Information Systems and Identity Management
CST 610 Project 2 Operating Systems Vulnerabilities (Windows and Linux)
CST 610 Project 3 Assessing Information System Vulnerabilities and Risk
CST 610 Project 4 Threat Analysis and Exploitation
FOR MORE CLASSES VISIT
www.cst610rank.com
CST 610 Project 1 Information Systems and Identity Management CST 610 Project 2 Operating Systems Vulnerabilities (Windows and Linux) CST 610 Project 3 Assessing Information System Vulnerabilities and Risk CST 610 Project 4 Threat Analysis and Exploitation CST 610 Project 5 Cryptography CST 610 Project 6 Digital Forensics Analysis
For more course tutorials visit
www.tutorialrank.com
CST 610 Project 1 Information Systems and Identity Management
CST 610 Project 2 Operating Systems Vulnerabilities (Windows and Linux)
CST 610 Project 3 Assessing Information System Vulnerabilities and Risk
FOR MORE CLASSES VISIT
www.cst610rank.com
CST 610 Project 1 Information Systems and Identity Management CST 610 Project 2 Operating Systems Vulnerabilities (Windows and Linux) CST 610 Project 3 Assessing Information System Vulnerabilities and Risk CST 610 Project 4 Threat Analysis and Exploitation CST 610 Project
For more classes visit
www.snaptutorial.com
CSEC 610 Project 1 Information Systems and Identity Management
CSEC 610 Project 2 Operating Systems Vulnerabilities (Windows and Linux)
CSEC 610 Project 3 Assessing Information System Vulnerabilities and Risk
CSEC 610 Project 4 Threat Analysis and Exploitation
For more course tutorials visit
www.tutorialrank.com
CSEC 610 Project 1 Information Systems and Identity Management
CSEC 610 Project 2 Operating Systems Vulnerabilities (Windows and Linux)
CSEC 610 Project 3 Assessing Information System Vulnerabilities and Risk
For more course tutorials visit
www.newtonhelp.com
CST 610 Project 1 Information Systems and Identity Management
CST 610 Project 2 Operating Systems Vulnerabilities (Windows and Linux)
CST 610 Project 3 Assessing Information System Vulnerabilities and Risk
CompTIA exam study guide presentations by instructor Brian Ferrill, PACE-IT (Progressive, Accelerated Certifications for Employment in Information Technology)
For more course tutorials visit
www.newtonhelp.com
CSEC 610 Project 1 Information Systems and Identity Management
CSEC 610 Project 2 Operating Systems Vulnerabilities (Windows and Linux)
CSEC 610 Project 3 Assessing Information System Vulnerabilities and Risk
For more course tutorials visit
www.tutorialrank.com
CYB 610 Project 1 Information Systems and Identity Management
CYB 610 Project 2 Operating Systems Vulnerabilities (Windows and Linux)
CYB 610 Project 3 Assessing Information System Vulnerabilities and Risk
CompTIA exam study guide presentations by instructor Brian Ferrill, PACE-IT (Progressive, Accelerated Certifications for Employment in Information Technology)
"Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53"
Learn more about the PACE-IT Online program: www.edcc.edu/pace-it
For more classes visit
www.snaptutorial.com
CST 610 Project 1 Information Systems and Identity Management
CST 610 Project 2 Operating Systems Vulnerabilities (Windows and Linux)
CST 610 Project 3 Assessing Information System Vulnerabilities and Risk
CST 610 Project 4 Threat Analysis and Exploitation
FOR MORE CLASSES VISIT
www.cst610rank.com
CST 610 Project 1 Information Systems and Identity Management CST 610 Project 2 Operating Systems Vulnerabilities (Windows and Linux) CST 610 Project 3 Assessing Information System Vulnerabilities and Risk CST 610 Project 4 Threat Analysis and Exploitation CST 610 Project 5 Cryptography CST 610 Project 6 Digital Forensics Analysis
For more course tutorials visit
www.tutorialrank.com
CST 610 Project 1 Information Systems and Identity Management
CST 610 Project 2 Operating Systems Vulnerabilities (Windows and Linux)
CST 610 Project 3 Assessing Information System Vulnerabilities and Risk
FOR MORE CLASSES VISIT
www.cst610rank.com
CST 610 Project 1 Information Systems and Identity Management CST 610 Project 2 Operating Systems Vulnerabilities (Windows and Linux) CST 610 Project 3 Assessing Information System Vulnerabilities and Risk CST 610 Project 4 Threat Analysis and Exploitation CST 610 Project
For more classes visit
www.snaptutorial.com
CSEC 610 Project 1 Information Systems and Identity Management
CSEC 610 Project 2 Operating Systems Vulnerabilities (Windows and Linux)
CSEC 610 Project 3 Assessing Information System Vulnerabilities and Risk
CSEC 610 Project 4 Threat Analysis and Exploitation
For more course tutorials visit
www.tutorialrank.com
CSEC 610 Project 1 Information Systems and Identity Management
CSEC 610 Project 2 Operating Systems Vulnerabilities (Windows and Linux)
CSEC 610 Project 3 Assessing Information System Vulnerabilities and Risk
REVISTA QUIMICA-MENTE Impacto ambiental y humano de los compuestos químicos.Rossana Jimenez
Revista Educativa QUÍMICA-MENTE infórmate sobre distintos compuestos químicos y el impacto ambiental que estos causan en el ambiente y los seres humanos.
Por Blankelis Carrera y Rossana Jiménez.
Versión reducida del taller experiencial de STARTUP ASTRONAUTS de 4 hrs para emprendedores y pequeños empresarios. Métricas, funnel de ventas, scorecard y lean startup con ejemplos de startups reales y del mundo SaaS
Parcela de La Florida AET Provincial Santiagovidasindical
Durante el mes de Julio de 2012 se han efectuado trabajos en el cierre de la parcela y el portón. Nos preparamos para brindar este espacio a nuestros asociados y a quienes lo requieran para un evento. AET Provincial SAntiago
Established 17+ years of solid record: data system administration; technical & project planning support; system analysis / reporting; major system security / maintenance, upgrading, implementation; resource planning, utilization, and maximization; and overseeing directing projects to improve integrity/usefulness of functional database systems. Experience leading projects from conceptual stages through sustainment: major multi-site, multi-state hardware installation, upgrade, and system administration.
1. Carolyn Clarke
Carolynflower26@gmail.com 804-572-1228
Clearance Level: Secret – TS Interim
DoD 8570 compliant as a CNDSP Analyst & IAT Level II
PROFESSIONAL PROFILE
Excellent hardware & software troubleshooting skills, strong communication and organization skills with expertise in
an Incident Management environment; conscientious attention to detail to prepare work performed.
Expert customer service; identify clients and/orcustomer to access needs,provide information or assistance
interpreting, analyzing and applying operations and security guidance to resolve their problems or satisfy their
expectations.
Accurately communicate information through oral presentation,identifying problems, problem solving, ascertains root
cause and impact, and providing recommendations for resolution.
Result-driven with an excellent track record of cooperation among cross-integrated team members and other
organizational departments.
PROFESSIONAL EXPERIENCE
System Administrator Mid
Quantico, Virginia, United States
BAI, Inc.
June 2016 – Present
Determines accuracy of information, uses sound judgment to generate and evaluate alternatives, and to make
recommendations
Provide guidance and instruction to the service desk for handling standard Active Directory related incidents and
service requests.
Provide Active Directory Service Desk Resolution Reports documentation to the service desk on the procedures for
completing the task.
Receive and satisfy requests Remedy Action Request System(ARS), Remedy Help Desk, Asset Manager and
other incident management console software to monitor, manage, escalate and resolve any issues for the
enterprise.
Assist with troubleshooting network outages on the enterprise level.
Assist all local Administrators with escalated issues on the enterprise domain
Create documentation on troubleshooting network related issues
Use RDP to remote into servers to manage issues related to AD DS database
Assist cybersecurity team regarding possible network intrusions
Microsoft exchange management console and shell
Laptop and Desktop support – hardware and software
Server configuration and support,add computers to domain
Experience supporting Windows 7 and Windows 10 operating system
Rebuild profiles, perform Registry fixes, using Symantec access disk and JRAVE
2. Cyber Security Analyst
Quantico, Virginia, United States
BAI, Inc.
August 2014 – June 2016
Support 24/7 operations watch floor environment
Monitor network-based IDS/IPS devices,correlate global actions and associated events into actionable/reportable
analysis that could lead to an intrusion on the Marine Corps Enterprise Network working closely with the Marine
Corps Network Operations Security Center (MCNOSC) on determining ‘real world’ events as they happen and also in
trend analysis to provide indications and warnings of future intrusion and attack incidents.
Performed as Privileged System Administrator with access to systemcontrol, monitoring and administration functions
Delivers network security monitoring by evaluating Real-Time and Historical intrusion detection analysis, manual and
automated event correlation, and event escalation activities.
Monitor raw network traffic through the use of various enterprise tools such as McAfee Intrushield, McAfee
Enterprise Security Manager ESM (Nitro), HBSS ePolicy Orchestrator (EPO), Fortianalyzer, Belmanage, Ironport,
Interrogator, Bluecoat proxy, and Centaur with ability to assess and advise methods and procedures for systems and
applications.
Document a systemfrom an IA perspective using Microsoft Office including MS Word, MS Excel, MS Visio and
other appropriate tools.
Research and recommend logical and physical solutions that prevent, detect and correct the systemto be certified and
accredited.
Trained new hires providing leadership and guidance in getting their accounts and providing guidance for
implementing the MCD database to create events.
Develops/participates in the improvement of local IT policy and procedures supporting activities. Analyze incidents
and events captured in Intrushield, HBSS, NSM and other detection tools and correlate data for malicious trends,
patterns,or actionable information. Gather supporting evidence and authordetailed reports then enter to the MCD
(Marine Collection Database) for action.
Knowledge of commonly applied principles, methodologies, operating characteristics and capabilities of and related
software systems,processes and procedures.
.Monitor dedicated inbox for reporting of suspicious emails. Perform analysis to email header, routing, and content to
ascertain threat then respond to submitters with findings and recommendations.
Recommend ACL, DNS, and/or SMTP blocks as needed to neutralize/mitigate threats from suspicious email.
Analyze data packets, review signatures,analyze and interpret PCAP using Wireshark
Create HBSS queries and disseminate to entire Watch Team for monitoring of ePos - On Access Scan and VSE
threat events.
Assess enterprise risk to network assets and performance, as was well as,identify type of attack, estimate
impact while collecting evidence for reports (to include incidents, outages,threats/technicalvulnerabilities)
Review and analyze findings that identify security issues on the system. Provide analysis for the Information
System Security Engineer (ISSE), SystemAdministrator (SA), and Project Manager (PM) for remediation and
informational purposes.
Maintain current knowledge on immerging threats,malware, zero day exploits, APTs and apply information to
identify new threats to MCEN (Marine Corp Enterprise Network).
Interpret incoming (classified and unclassified) Intel reports from various DOD agencies and take appropriate actions.
Report MCEN Incidents to the Joint CERT Database for US Cyber Command.
Coordinate with the Incident Responders and Senior Analysts to maintain situational awareness of issues within our
respective AORs.
Provide technical support in identifying and specifying requirements and performing risk assessments
Perform daily duties as a Liaison to the Battle Captain.
Guidelines for creation of Remedy tickets for multiple purposes - ACL blocks, DNSBH, creating new accounts,
review of SPAM.
Interpret incoming (classified and unclassified) Intel reports from various DOD agencies and take appropriate actions.
Demonstrated ability to lead a team in performing day-to-day work and ensuring availability and functionality
while coordinating with appropriate process owners when additional resources are required.
Perform duties ensuring compliance with all policies, instructions,SOPs and/or guidelines
3. Ability to interpret, define and translate customer requirements in order to provide courses ofaction and
recommendations.
Ability to interface with co-workers, superiors and third party vendors.
Act as liaison between IT Ops, CyberSecurity and Logistics to resolve any problems.
Coordinate resolution of cross-division or cross-department issues.
Familiar with Windows 7 & Windows 8 performing registry analysis on both.
Help Desk Administrator/Field Technician
Quantico, Virginia, United States
BAI, Inc
April 2014 – August 2014
Received incoming calls from users in the National Capital Region (NCR) and determined the best resolution for
issues with software and hardware in the Enterprise Service Call Center.
Maintain calendar conference rooms, schedule appointments,meetings, reserve conference rooms
Created tickets in Remedy into ticket tracking database with 98% accuracy.
Ensure timely attention to all incoming calls by responding to 95% of calls within 5 minutes.
Ensure timely attention to all incoming emails by responding to all emails within 20 minutes.
Maintain facilities management systems by documenting customer request activity.
Front desk security checking in visitors for meetings, distributing parking passes,ensuring no electronic devices
were in their possession.Signed for Federal Express deliveries.
Checked in new hires, checking JPASS to ensure they were on the roster.
Liaison with senior civilian and military, flag level and distinguished visitors with the Department of Defense
and Defense Cyber Service Operations and their staff.
Reset passwords on PKI systemfor CACs.
Acted a Queue Managerdistributing trouble tickets to appropriate department for resolution.
Performed follow up on all open tickets before resolving.
User contact handling SAAR accounts,confirming they had necessary drives and email needed to perform their job
Activate and tether software for Blackberry Accounts.
Provide technical support to customers via telephone, email and through tickets analyzing , implementing,
troubleshooting and maintaining hardware and software.
software and hardware issues
Help customers identify and resolve issues pertaining Lan/Wan connectivity,domain issues,BitLocker and Symantec
issues,including software updates,and Microsoft repairs.
Maintained documentation of processes and tickets
Configuration, of workstations, laptops and other peripherals.
Systems Technology Administrator
Spotsylvania County Schools, Spotsylvania, VA
August 2011 – April 2014
Assist the schoolinstructional and administrative staff in the use of computers and related technology.
Monitor the local network hardware and software, including servers,peripherals, switches and wiring.
Provide support and train users on network usage (i.e. logging in, printing, file management, etc.)
Responsible for performing network troubleshooting to isolate and diagnose network problems.
Provide local workstation support for the students and staff,to include hardware setup,hardware moves, installation
of printers, and troubleshooting.
Evaluate and resolve software and OS issues such as boot failure, application corruption, software failure, system
freezing, registry file corruption, device driver failure as well as troubleshooting on post image issues.
Image laptops/desktops fornew assets,systemupgrades ofcurrent assets,including user profile and data migration
from their current to upgraded systems.
4. Install approved applications and ghost when needed.
Ability to interpret and execute a variety of instructions furnished in written, oral or schedule form.
Image laptops/desktops fornew assets,systemupgrades ofcurrent assets,including user profile and data migration
from their current to upgraded systems.
Maintain LAN security by reviewing log and audit trails to detect intrusion, virus or othermalicious activity and use
our provided virus tools for removal.
Analyze LAN & WLAN network connectivity issues using TCP/IP tools to check for the IP Address,Hostname.
Troubleshoot a variety of hardware issues stemming from components failure within workstations (hard drive,
memory etc.) to external peripherals, to printer issues (connectivity issues,jamming and component replacement).
Use Active Directory for managing user accounts,as well adding and/ordeleting computer names to and from the
correct OU group within our domain.
Provide network administration to include backups,add/delete/change users on network and email distribution lis ts,
console operations,virus protection, systemcleanup functions, such as purge files, directory, directory moves, etc.
Monitors student use of technology resources,and reports irregularities to schooladministration.
Function as liaison between schoolstaff and Central Office Technology Staff. Monitor an accurate inventory of all
computer hardware and software.
Creates work orders for central support and track issues to resolution.
LAN Admin for users such as the installation of personalcomputers and workstations onto the network, configuring
network interface cards and client software as well as configuring network printers
Purchases technology supplies for school, as well as assists with developing and monitoring the school’s technology
budget.Serves as Channel 17 contact person.
EDUCATION
Ashford University - Masters Degree in Learning & Teaching with Technology - 2013
Ashford University - Bachelors Degree in Organizational Management - 2011
TRAINING
EC Council Certified Ethical Hacker – 2016
Remedy 8.1 Incident Management - 2016
Marine Corps Intrusion Detection Analysis Training – 2015
STIG Compliant – 2015
CompTIA Network+ CE - 2014
CompTIA Security+ CE - 2014
Microsoft Technical Associate Network Fundamentals – 2014
Microsoft Certified Professional - 2014