Tutoring/Resume/Technical Writing


Sample of Before and After Resume



Rochelle Dubouer

University of Arizona
Majored in Psychology
Minored in Informational Statistics

Project Manager: Global Web Solutions (Feb.4 to Present
Successfully manage multiple overlapping web-based software releases working against extremely tight deadlines of 4 weeks.

Lead team in establishing/executing schedules production upgrades throughout development and release cycles including client acceptance.
Ensure project progress identifying gaps/issues and work to mitigate them.

Ensured bi-directional communication across the organization and at executive level. Ensure strong team health by identifying and alleviating concerns where possible. Manage organizational and client readiness.  

Success in this position requires team attention to detail, a positive attitude and a strong desire to see the project and team succeed.

Project management skills easily translate to event management as this role requires me to juggle multiple tasks simultaneously communicate, coordinate, follow through task completion, deadline sensitive, issue resolution, document progress and provide training, understand each team’s needs as part of the overall project.
Rochelle Dubouer

University of Arizona
Major: Psychology
Minor: Informational Statistics

Position Desired: Level 3 Project Manager

Project Manager: Global Business Solutions

February 4 to Present:

• Complete responsibility for successful “hand-off” of multiple, overlapping software releases working within significant deadline schedules --- 4 weeks maximum for production upgrades.

• Lead team(s) from establishment through execution of release cycles; identified and mitigated gaps, overlaps, errors, and acted as lead client liaison to provide client-centered revisions ensuring successful final projects.

Pertinent Experience and Skills:

• Capable of multi-directional communication leading to “team health” through identification and clarification of client concerns.

• Capable of directing multiple teams and individuals both within company and as liaison to clients.

• Capable of managing projects and events –in-house and client based.

• Excellent at communicating document progress, coordinating follow-through and juggling multiple tasks and teams.

• Capable of negotiation and communications between teams and clients with regard to resolving issues, gaps, errors as they affect clients, and projects.

• Driven to resolve all issues pertinent to completion of successful client-centered results.

Barbara's Reviews 

Need Resume Writer?

Review from Karen H

"I found Barbara so easy to work with! She's a true master of words!"
October 21, 2015 
Review from Jari G. 

"I had the pleasure to have Barbara Molloy help me with my resume. She was extremely helpful with her assistance and very professional with her editing and explanations when helping me. She is very knowledgeable in grammar and many types of writing styles for books, school work, resumes and editing. I would be happy to recommend Barbara Molloy, she has a great sense of humor also! Very Fun Lady! I appreciate her knowledge and help!"
October 20, 2015 
Review from Chris B.

"Have worked with Barbara on many writing projects over the past 20 years. She's an excellent writer, editor, and teacher! Very detailed, observant, and nuanced."
September 29, 2015

Sample of Technical Writing

Ransomware: Definition and Description

While ransomware can be hidden inside several varieties of computer phishing messages, all ransomware falls into the category of internet based extortion. Victims of ransomware find themselves in a position where a perpetrator demands payment for the victim’s own data or else: Ransomware, also known under the general heading, malware, is designed to infect the victim’s computer so that the victim is unable to access her/his files until payment is made. 

In most cases the victim has opened a link---or hyper-link---unsuspectingly, e.g., the link or hyper-link might have been sent through a co-option of Microsoft, or Google Chrome, or some other trusted messenger such as Norton Antivirus. The victim clicks on what looks like a harmless link and with that single click the harm is done.

Ransomware then occurs via a series of sophisticated software maneuvers incorporating a transfer of keys. To simplify by analogy, just as the non-virtual world uses keys and locks to prevent criminal trespass, so computer software is walled between portals by virtual keys.  Through a process called encryption,  the victim clicks on the email link, antivirus notification, pop-up, or other seemingly harmless item, and a transfer of keys occurs.  

One such malware known as Cryptolocker uses a highly sophisticated method of key pairs to encrypt the victim’s files. From the web page Ransomware Explained by Mikel Verojic:  
 When the sender’s malware is released, a random but symmetric key encrypts
      the victim’s data. Next, a small asymmetric ciphertext along with the ciphertext
      of the victim’s data occurs. “Hybrid encryption” is thereby established and the user 
      then receives a message as to how to pay the ransom.

Ransomware attacks typically involve something called a Trojan Horse.  Again, by analogy, a virtual Trojan Horse, like its counterpart in Greek Mythology---a Trojan Horse---is a message or other virtually received entity (as above pop-ups, antivirus notifications, email links), or horse.  When/if the email or pop-up, (horse) is opened (clicked on), a malware encryption process begins. 

A payload then locks the system---or claims to lock it (scareware) until the victim provides payment. 

Note: Scareware is no less menacing and difficult to maneuver because, for all intents to the victim, the files are locked even while they may not have been thoroughly encrypted. In other words, the victim cannot retrieve her or his files or know whether those files have been rendered inaccessible. Thus, payment would appear to be the only means to retrieve the compromised data.

Most often the victim receives a message from the perpetrator soon after encryption telling the victim what to do--- how much to pay and how to process the payment. More often than not, the perpetrator demands that the ransom payment be made via bitcoins, (1) or virtual currency.   

Needless to say, victims of ransomware find themselves in a dire circumstance. They must either pay an anonymous and untraceable entity, e.g., the use of bitcoins or virtual currency, creates the circumstance wherein the already remote and anonymous perpetrator cannot be traced via the payload! To make matters worse, victims of ransomware seduced into paying the ransom amount, may or may not be rewarded with the restoration of their data upon payment! Indeed, in a substantial percent of cases, the perpetrator disappears---after exacting the bitcoin ransom--- into the cyber-anonymity by which she or he arrived!

The ways to avoid being a victim of ransomware

A. Never click on a suspect link.
B. Always use strong passwords.
C. Do not forget to back up and store files regularly.
D. If in any doubt, err on the side of not clicking on pop-ups.
E. Although ransomware can be hidden inside a co-option of virus protection software, updating virus protection regularly is still the safest means of guarding against malware and viruses of all forms.

The future of ransomware:

Computer viruses have been compared to moles for their ability to create yet another underground pipeline when the original one is discovered and plugged. Using that same analogy applied to ransomware, it would seem that ransomware’s various forms of sabotage will only increase as the future of the computer as a tool for conducting one’s daily life --- banking, searching for a job, working, learning, driving, and so on --- expands to cover more and more of our daily functioning.

As to the future of such crimes, it would seem a safe bet that computer crime, like its brick and mortar counterpart, is here to stay. But cyber-crime, unlike its brick and mortar contingent, will require a police response as intellectually expansive in its forensic foresight as the virtual perpetrators have become ever more malicious and intractable in their cyber transgressions.
1. Bitcoin – A type of digital currency in which encryption techniques are used to regulate the generation of units of currency and verify the transfer of funds, operating independently of a central bank. 
Share by: