Premium Essay

Forensic Investigation

In:

Submitted By fkeyes
Words 349
Pages 2
Keischa G. McKay

12717 Gordon Blvd. Apt 124 Email: keischag@gmail.com
Woodbridge, Virginia 22192 Phone: 703-229-7862

SUMMARY:

Detail oriented team player with a competitive mind that is not afraid of challenges. Structured thinker who responds well under pressure with an ability to work independently. Has excellent communication skills and the ability to prioritize as well as organize and has great follow through with tasks.

HIGHLIGHTS OF QUALIFICATIONS:

Over 10 years of work experience reporting and reconciling multiple cas accounts on various systems
4 years of work experience preparing month end journal entries
The ability to work under high pressure and meet deadlines
Work experience in Oracle, Micro-strategy and billing systems
Proficient in Microsoft Word and Excel, Working knowledge of Access
Excellent organizational skills and planning
Ability to be self sufficient as well as a team player
Trained to use CSR tools, WorldNic Software and Regulus I-Vault software

EDUCATION:

Canisius College- Buffalo, New York
Bachelor of Arts Degree- Sociology
Minor in Psychology

WORK EXPERIENCE:

Network Solutions March 2005-Present

Financial Analyst
Reporting, tracking, reconciling daily and monthly cash activities
Prepare and review month end journals before submitting
Review current procedures and implements ways to be more effieceint
Complete various recons for internal control
Performs numerous analyses on multiple reconciliations
Teach and train departments to identify and reconcile variances.

Kohl’s Department Store May 2007-Present

Front-End Supervisor
Managed and Supervised 30 Associates on a daily basis
Enhanced the Customer Service Experience
Developed and Trained Associates to Kohl’s Best Practices
Operated the store on a day to day basis

Demeter Consulting November 2003-March 2005

Similar Documents

Premium Essay

Forensic Investigation Essay

...A digital forensics investigation is conducted after a significant security incident has been identified. The goal of a forensic investigation is to answer why, when, where, what and who though a meticulous scientific process of identifying, preserving, documenting and analyzing extracted information from digital evidence (Marcella & Menendez, 2008, Chapter 1). The following are examples of activities which may warrant a forensic investigation (Marcella & Menendez, 2008, Chapter 1): Fraud Hacking Embezzlement Compromise to a customer’s electronic privacy data Peer-to-peer file sharing Leak or unauthorized disclosure of confidential information Theft of trade secrets, intellectual property Unlawful access to a computer Use of a company’s information technology resources for personal gain Violation of acceptable use policies Launching denial of service attacks against a competitor The Federal Rules of Civil Procedure (FRCP) e-discovery...

Words: 531 - Pages: 3

Premium Essay

CSI Forensic Investigation

...Somewhere in the world tonight there is a forensic scientist shaking their head while watching the latest episode of the CSI franchise. The reason why this may be is because in the real world things are handled and done very differently oppose to how it is shown on crime shows such as CSI: Miami and its other popular spinoffs. That is right, contrary to popular belief those who work within crime scene investigation do not go cruising down south beach in Miami, in their brand new hummer or have clever one liners, and dramatic music playing in the background. This field requires thorough examination and investigations of crime scenes and the scientific tools to allow each case to be solved. This obviously means that it is extremely tedious and...

Words: 1206 - Pages: 5

Premium Essay

Forensic Investigations Case Summary

...This case report was created Wednesday, September 03, 2014 at 3:56:30 PM. Both an Investigator/Forensic Examiner Jeremy Muraskiis assigned to investigate this Forensic Software Report. Investigator Jeremy Muraskiis received a tip coming from a woman who claims her ex-husband told her about a crime he had committed. Investigator Muraskiis questions the woman for more information involving the crime the ex-husband is said to have told her about it. It has come to the investigator attention that the crime that her ex-husband has been involved in, is a crime that is formerly known as computer crime. The ex-wife goes on and begins to give certain details about what her ex-husband has told her. Upon probable cause, Investigator Muraskiis called out the computer forensic examiner to examine the computer that is known to be used in this computer crime. Upon investigating this case, this Forensic Software Report contained 2 evidence, which are JPEG file which is known as images files. These two images files are Andromeda Galaxy M31 and Southern Pinwheel which are the 2 evidence that needs to be recover and sent to the lab to be examine and used in the court of law to prosecute the lady’s ex-husband....

Words: 565 - Pages: 3

Free Essay

Digital Forensic Investigation Bsc Submission

...of misuse of company property due to that staff bragging about gaining access to privileged information to his colleagues that he should have otherwise not have gotten access to. The issue first came to the attention of Mr. Ali, the Enterprise Systems Administrator of TT Bank who had investigated silently to discover the identity of the staff and that the person was a member of the Loans Department and his name was Mr. Mike. What became particularly disturbing was that Mike worked in the Loans Department and should not have any access whatsoever to any Human Resources (HR) department files. The Enterprise System Administrator decided that the case should be investigated properly and hired a computer forensic expert from the APIIT FORENSIC LABOROTARY. Upon arrival, the forensic investigator was issued full...

Words: 1635 - Pages: 7

Premium Essay

Forensic Business Investigations

...ACCT 2211: Forensic Accounting Individual Test 1 Baldor Electric Singapore The finance manager, See Lay See, of Baldo Electric, embezzled nearly $227,000 over a 4 year period (200-2004). Through deliberate falsification of the company accounts, she successfully covered her crime. Required: 5 + 5 = 10 Marks 1. Using the elements of fraud, explain how this case of employee embezzlement would be deemed as fraud. (5 Marks) __________________________________________________________________________________Comments: students should consider the 7-elements (not the fraud triangle here). – “Fraud” is deception that includes the following elements 1. A representation 2. About a material point 3. Which is false 4. And intentionally or recklessly so, 5. Which is believed 6. And acted upon by the victim 7. To the victim’s damage This was a case of employee embezzlement (some might also suggest senior management fraud, as See Lay See was a senior manager; however, this was a non-collusive fraud situation). The 7-elements are required for this to be deemed fraud (but note some jurisdictions take a wide interpretation of “victim” to include potential shareholders or society at large. 1. Representation – this was a claim made by See about the company accounts being true and fair 2. Material point – this was proven to be material as...

Words: 528 - Pages: 3

Premium Essay

A Guide to Forensic Accounting Investigation

...A GUIDE TO FORENSIC ACCOUNTING INVESTIGATION THOMAS W. GOLDEN, STEVEN L. SKALAK, AND MONA M. CLAYTON JOHN WILEY & SONS, INC. A GUIDE TO FORENSIC ACCOUNTING INVESTIGATION THOMAS W. GOLDEN, STEVEN L. SKALAK, AND MONA M. CLAYTON JOHN WILEY & SONS, INC. This book is printed on acid-free paper. Copyright © 2006 by PricewaterhouseCoopers LLP. PricewaterhouseCoopers refers to the individual member firms of the worldwide PricewaterhouseCoopers organization. All rights reserved. Published by John Wiley & Sons, Inc., Hoboken, New Jersey. Published simultaneously in Canada. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400, fax 978-646-8600, or on the Web at www.copyright.com. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, 201-748-6011, fax 201-748-6008, or online at http://www.wiley.com/go/permissions. Limit of Liability/Disclaimer of Warranty: While the publisher and author have used their best efforts in preparing this...

Words: 246885 - Pages: 988

Premium Essay

Welcome to Homicide

...Welcome to Homicide Forensic Science is a fundamental component of the justice system. Forensic scientists use scientific techniques and knowledge to assist law enforcement in investigations and solving crimes. They collect and analyze numerous types of evidence, including blood, body fluids; DNA; and human tissue. Forensic scientists assist the decision makers by showing the prosecutor if the issue has merit before it reaches the courtroom thereby reducing the number of cases having to be heard. Their decisions are based on scientific investigations and not circumstantial evidence or unreliable witnesses. Forensic scientists can restore faith in the judicial system with the use of science and technology for facts in criminal and civil investigations. The legal system is established on the belief that the legal process results in justice for all. History of forensic science The history of Forensic science or the applying of scientific principles to legal questions has a lengthy and interesting history. The first recorded autopsy was reported in 44 B.C was on Julius Caesar, where the Roman physician, Antistius proclaimed that he had 23 wounds on his body but only one was fatal. In 1248, a Chinese book entitled “His Duan Yu” (meaning The Washing Away of Wrongs) explaining how to tell apart a drowning from a strangulation. This was also the first recorded use of medicine to assist in solving crimes. In 1590, the first microscope was developed. In 1775, Karl...

Words: 2382 - Pages: 10

Premium Essay

Information System Technology

...Assessment Worksheet Documenting a Workstation Configuration Using Common Forensic Tools Course Name and Number: _____________________________________________________ Student Name: ________________________________________________________________ Instructor Name: ______________________________________________________________ Lab Due Date: ________________________________________________________________ Overview In this lab, you performed a forensic analysis of a Windows 2012 machine using three commonly available tools: WinAudit, DevManView, and Frhed. You reviewed the forensic capabilities of each tool, using the sample files provided, to determine any clandestine threats or vulnerabilities such as viruses and malicious software. You also recovered a file that was altered to hide its native file format. You documented your findings in a forensics report. Lab Assessment Questions & Answers 1. What is the main purpose of a software tool like WinAudit in computer forensics? 2. Which item(s) generated by WinAudit would be of critical importance in a computer forensic investigation? 3. Could you run WinAudit from a flash drive or any other external media? If so, why is this important during a computer forensic investigation? 4. Why would you use a tool like DevManView while performing a computer forensic investigation? Copyright © 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved. www.jblearning.com Student Lab Manual ...

Words: 295 - Pages: 2

Premium Essay

Forensics

...In the article it was discussing all the different types of forensics there are. People think there is just one type of forensics, but there’s a wide range of all different types. I also picked this article because I think people should realize that forensics is a very hard field to go into. You really have to really have heart to be able to go into this field. Investigator’s really have to go into detail about every little thing. In the investigations you really cannot miss a single detail. The article also goes in depth about what sciences are required to take, and for that person to really know. To be in the field you really have to love what you do. Many people often misunderstand Forensic Science and believe it is much more capable than it really is. People typically think that what they watch on T.V. is 100% true. Actually what you see on T.V. is mainly false or over exaggerated in some way. Criminal Investigation is the largest and most known form of Forensic Science. More of the known areas that people know about Forensics are; Fingerprinting, DNA Identification, Fiber Samples, Computer Animation, etc. What people see on T.V. is that it takes about an hour for the people on the NCIS, or Law & Order to figure everything. Typically it takes months at a time, and most of the time aren’t even accurate concepts. This article relates to my life, because forensics is really all about a puzzle. I feel like my life is like a puzzle. But in a good way. This article was...

Words: 314 - Pages: 2

Free Essay

Security Job Search

...000/Yr Title: Forensics Managing Specialist –Security JOB DESCRIPTION All Forensics Candidates are encouraged to apply. Jr. to Sr. level positions are available from 2 years to 10+ years experience. Salary based on experience. A Bachelor's Degree in Forensics or related is a plus. This is a full time perm position. Must be willing to travel nationwide. Our client’s computer forensics team is a comprehensive solution for global data collections and forensic analysis. They offer best-in-class security. From small to large matters, they provide easy to understand interpretations of findings and a single point of contact. The Managing Consultant utilizes state of the art techniques that enable the recovery and use of critical electronic evidence for litigation, investigations and other fact-finding exercises. The Computer Forensics Managing Consultant establishes whether evidence has been erased or modified; analyzes electronic content and patterns of Internet and e-mail usage; recovers deleted data; and assesses and explains metadata within recovered files. RESPONSIBILITIES Manage day to day activities for projects involving computer forensics, information security or rapid response data breach matters. Manage large data preservation and collection activities to ensure that accepted forensic protocols; create and maintain Chain of Custody; document the handling of evidence. Analyze log files from firewalls, web servers and computers. Conduct forensic analysis and write...

Words: 585 - Pages: 3

Premium Essay

Computer Ethics

...utilizing it. On the flip side, it can also be as bad; incredibly harmful at best. When a crime has been committed, in this day in age, a computer is often the accomplice. That being said, the sooner the evidence within the computer accomplice is collected by the attending computer forensics specialists, the more likely the data that has been accessed, even if deleted, is remaining evidence on the computer; whether only in part or true to form detail. The longer the forensic team takes to collect this invaluable data, the more likely it is that the computer will overwrite key pieces of evidence, which would ultimately result in the prosecution or release of a potential criminal mind. Even partial data is extracted from the hard drive of the accomplice computer; it can still be very much useful in a prosecution, as partial data is also admissible in court today (Krehel, 2011). Securing the hard drive in the exact manner in which the computer has been found is absolutely vital to any forensic expert hoping to do their job with attention to detail and accuracy. This can be done by duplicating or replicating the hard drive at the onset of any said investigation when a computer is involved. Because forensic specialists are not attorneys, it is nearly impossible for this professional to know which data to keep and what to leave behind for overwrite. In this case, the choice is clear. There isn’t one. Every shred of data on the accomplice computer must be collected ((Biles, 2010). Just...

Words: 691 - Pages: 3

Premium Essay

Forensic Science Crime Scene Investigation Final Exam

...FSCJ 4340 Final Exam Tasks of Preliminary Investigation A preliminary investigation is the actions taken at the scene of a crime immediately following its detection and report to the police. This may include; receiving the information about the crime and initial response, providing emergency care to victims, crime scene control, putting out BOLO alerts, crime scene determination, gathering evidence, and the report. So, a preliminary investigation basically consists of securing the crime scene, determining where exactly the crime scene is going to be, controlling the crime, and all the little things in between. The senior officer and his partner are responsible for this. The first and most important step in any crime scene investigation is to secure the scene. The crime scene should be approached in a manner that maximizes the safety of any potential victims, witnesses, others in that area, and the officers on the scene. Officers should work to preserve and protect any evidence that could potentially be lost or compromised from weather; (footprints and tire tracks). Once the crime scene is secured, officers should control the scene by identifying and removing people that don’t belong from the crime scene. Controlling the crime scene is described as the actions which the first arriving officer(s) at the crime scene take to make sure that the integrity of the scene is maintained. This can prevent contamination of any evidence, and/or destroying physical...

Words: 1353 - Pages: 6

Premium Essay

The Ted Bundy Case and Forensic Science

...Forensic Science and Murder: The Ted Bundy Case Sheila Hawkins Criminalistics Abstract Forensic science is the foundational element of all crime investigation procedures. Recent advances in forensic technologies make possible to resolve even the most challenging crimes. This paper tells a story of Ted Bundy, a serial killer, whose case was solved with the help of forensic science. Implications and possible changes in case investigation are proposed. Keywords: forensic science, Ted Bundy, serial killer, case, solve. The Ted Bundy Case Forensic science is at the heart of all crime investigation procedures. Recent advances in forensic science make possible to solve even the most challenging cases. The contribution of forensic science to crime investigation is difficult to overestimate: according to Ribaux, Walsh and Margot (2006), forensic science facilitates accreditation, standardization, and interpretation of forensic evidence and ensures the scientific efficiency and objectivity of crime data. The case of Ted Bundy, a serial killer, is no exception: it is with the help of forensic science that the crimes committed by Ted Bundy were solved. The story of Ted Bundy is believed to have started between 1973 and 1974, when he committed his first murders. In just two years, Bundy managed to kill almost two dozens of girls (Ramsland, n.d.). Victims’ age ranged from 12 to 20; some of them were reported to be missing, whereas others vanished from their rooms, leaving...

Words: 854 - Pages: 4

Premium Essay

Essay On Computer Forensics

...Abstract: Rising era of computer and other technologies as internet and gadgets, explosively increase in number of cybercrime or other crimes using technologies. The growth of computer forensic has taken as huge success to control those crimes which are committed using computers. The main task of computer forensic is to examining and collecting electronic data as evidence from a crime scene. The work of computer forensic is to recover the data which has been hacked or lost by the criminals using different system. The growing dependency on computer forensic has decreased the cybercrime and professionals have to understand the computer technology that is used in computer forensic. Introduction Forensic roots from a Latin word, “forensic” which...

Words: 870 - Pages: 4

Free Essay

Hair Analysis in Solving a Crime

...Introduction Hair is among the most commonly used evidences in the crime investigations. Hair analysis is based on its chemical characteristics and physical structure which aid during investigations. It is notable that hairs are easily transferred hence can be left as evidence after a criminal activity. Hair analysis can be of great use in forensic analysis during an investigation since it can help prove crime in various ways. First, hair analysis can easily link a suspect to a crime scene. It can also show the association or link between the suspect and the victim. Hair analysis can also help single out a particular suspect from other suspects in the case. It is important to note that hair is a great resource to forensic science. The presence of the suspects ‘ hair on the victim’s body can help determine his or her sex and race. Hair analysis can also be used to determine the DNA of a suspect in a crime scene. The forensic problem to be solved is identification of the murder suspect in the Ford Heights Four case. A couple was robbed and murdered in Ford Heights in East Chicago. According to witnesses, four men were seen leaving the crime scene after the incident. The four men were later convicted and sentenced to prison despite their insistence on being innocent. However, after some years, DNA testing was conducted and the four suspects proved to be innocent before being released from prison. The forensic problem is relevant to the course since hair left on the victims’ body...

Words: 771 - Pages: 4