Search

Crendal Lamar Blackwell

age ~61

from Jacksonville, FL

Also known as:
  • Crendal L Blackwell
  • Crendal C Blackwell
  • Crendall Lamr Blackwell
  • Crendall L Blackwell
  • Grendall L Blackwell
  • Walker Blackwell
  • Crendell Lamar Blackwell
  • Crendel Blackwell
  • Crandal Blackwell
  • Lamar Blackwell
Phone and address:
1728 Broken Bow Ct, Jacksonville, FL 32225
9042201052

Crendal Blackwell Phones & Addresses

  • 1728 Broken Bow Ct, Jacksonville, FL 32225 • 9042201052 • 9042206118
  • 12807 Jordan Blair Ct, Jacksonville, FL 32225 • 9042218986
  • Silver Spring, MD
  • 7230 Silverton Trl, Austell, GA 30168 • 7707323049 • 7707328993
  • Clinton, MD
  • Adelphi, MD
  • Washington, DC
  • Atlanta, GA
  • Powder Springs, GA

Work

  • Company:
    Amerinfosec
  • Position:
    Personnel management

Education

  • School / High School:
    Massachusetts Institute of Technology
    1990 to 1992

Skills

Netcool • Cisco Nexus • Coso • Consulting • Windows Server • Verisign • Channel • Ibm • Ids • Security Implementation • Os/390 • Outline • Outlining • Checkpoint • Infrastructure • Nortel • Cobit • Navigators • Pwc • Vulnerability • Narrative • Esm • Authentication • Oracle Database • Novell • Training Workshops • Penetration Testing • Incident Handling • Finance • Cycles • Access Control • Frameworks • System Life Cycle • Security Controls • Front End • Oversight • Mainframe • Network Security • Broken • Offerings • Network Devices • Technical Standards • Dsa • Assessment • Hping • Dragon • Management • Design • Financial Statements • Vms • Vulnerability Assessment • Security Products • Security • Contractors • Identifies • Key Performance Indicators • Routers • Sop • Redundant • Perimeter • Pki • Aid • Auditing • Coordinated • Gap • Technical Presentations • Cissp • Workflow • Algorithms • Human Resources • Methodology • Execution • Tripwire • It Audit • Satellite Radio • Guidance • Web Applications • Networking • Posture • Local Area Network • System • St&E • Business Services • Cell • Itgc • Testing Methodology • Ocsp • Tests • F Secure • Baltimore • Threat Analysis • Reports • Tcp/Ip • Strategy • Ethernet • Risk Analysis • Enterprise Architecture • Testing • Encryption • Vm • Training • Forensic Analysis • Policy • Ssl • Webinspect • Customer Service • Enterprise Software • Sla • Security Design • Modifying • Scripting • Vpn • Documentation • Project Management • Mitigation • Identity Management • Private Sector • Cisco Routers • Stakeholders • Rsa Security • Internet Security • Commercial Real Estate • Microsoft • Fannie Mae • Software Project Management • Pix • Os/2 • Analysis • Canvas • Hardware • Business Continuity Planning • Sox 404 • Mechanisms • Encase • Technical Papers • Pipeda • Netiq Appmanager • Laboratory • Cisco Vpn • Information Technology • Broad Based • Gap Analysis • Information Security • Power • Web Technologies • Test Planning • Transmission • Accreditation • Industrial Engineering • Coordination • Computer Operations • Fix • Configurations • Nessus • Fix Protocol • Operating Systems • Dos • Applications • Hipaa • Payment Industry • Business Development • Schedules • Active • Bank Reconciliation • Srr • Business Process Analysis • Fms • Privacy Law • Restoration • Suite • Segregation of Duties • Mvs • Risk Assessment • Symantec • Omb • Network Engineering • Mbsa • Change Management • Network Administration • Security Management • Glba • World Bank • Business Intelligence • Technical Support • Project Planning • External Audit • Remediation • Project • Sarbanes Oxley Act • Sql • Iso 27001 • Contractual Agreements • F5 Bigip • Supports • Java Applets • Vax • Process Management • Unix • Autoaudit • Ibm Iseries • Freddie Mac • Presentations • It Controls • Responsibility • Internal Audit • Cisa • Banners • Firewalls • Security Risk • Labor Issues • Business Units • Cisco Technologies • Personnel Management • Architectural Plans • Active Directory • Owasp • Intrusion Detection • Itil • Sidewinder • 3Des • Mrtg • Computer Network Operations • Forms • Testers • Reviews • Government • Prevention • Participatory Management • Computer Security • Nist • Netview • Security Architecture Design • Guidelines • Midrange • Raptor • Materials • Software • Windows Nt • Image Capture • Oracle • Compliance • Java • Business Continuity • Stig • Ioc • Parties • Rate • Ecc • Business Process • White Papers • Manufacturing • Internal Controls • Client/Server • Collateral • Weaknesses • Issa • Fsa • Deployed • Treasury • Assertiveness • Cryptography • Scanners • Data Encryption Standard • Risk • Software Development • Delivery • Disaster • Iss • Cics • Architecture • Chip • Enterprise Security • Unix Operating Systems • Evaluation • Nist 800 53 • Coordinate • Gaps • Databases

Industries

Computer & Network Security

Us Patents

  • Environmentally-Friendly Compositions And Methods For Treating Multiple Surfaces

    view source
  • US Patent:
    20100025622, Feb 4, 2010
  • Filed:
    Aug 4, 2008
  • Appl. No.:
    12/185132
  • Inventors:
    Crendal Lamar Blackwell - Washington DC, US
  • International Classification:
    C09K 3/18
  • US Classification:
    252 70
  • Abstract:
    The present invention provides compositions for road surface application, aircraft wings and surfaces, helicopter rotor blades or any surface where ice formation is not desired; wherein the composition serves to reduce the freezing temperature of surfaces, repels water, prevents the formation of ice, aids in the removal of ice and reduces contractile deformations and corrosion of surfaces. The compositions may also behave like a protective coating to applied surfaces.
  • All-In-One-Laptop

    view source
  • US Patent:
    20170060194, Mar 2, 2017
  • Filed:
    Aug 25, 2015
  • Appl. No.:
    14/835548
  • Inventors:
    Crendal Blackwell - Clinton MD, US
    Corey Sheldon - Vienna VA, US
  • International Classification:
    G06F 1/16
  • Abstract:
    A multi-functional All-In-One Laptop comprising multiple components integrated into one physical laptop. In a preferred embodiment, the invention comprises a laptop computer wherein power methods are comprise of AC\DC power, QI charging, USB charging, lightning cable charging and Solar power. Connectivity methods of the laptop computer invention is comprised of Ethernet, LAN, Wi-Fi, Live 5, SATCOM, and Serial connectivity ports. Additionally, the laptop computer invention is further comprised of a touchscreen and stylus component for signing contracts and a printer and scanner with paper tray and ink cartridges for scanning and printing business documents.

Resumes

Crendal Blackwell Photo 1

Crendal Blackwell

view source
Location:
Washington, DC
Industry:
Computer & Network Security
Work:
Amerinfosec
Personnel Management

Amerinfosec
Senior Security Architect

Baltimore Technologies
Senior Security Architect

Agent Technologies
Senior Security Engineer

Ibm
System Engineer
Education:
Massachusetts Institute of Technology 1990 - 1992
Skills:
Netcool
Cisco Nexus
Coso
Consulting
Windows Server
Verisign
Channel
Ibm
Ids
Security Implementation
Os/390
Outline
Outlining
Checkpoint
Infrastructure
Nortel
Cobit
Navigators
Pwc
Vulnerability
Narrative
Esm
Authentication
Oracle Database
Novell
Training Workshops
Penetration Testing
Incident Handling
Finance
Cycles
Access Control
Frameworks
System Life Cycle
Security Controls
Front End
Oversight
Mainframe
Network Security
Broken
Offerings
Network Devices
Technical Standards
Dsa
Assessment
Hping
Dragon
Management
Design
Financial Statements
Vms
Vulnerability Assessment
Security Products
Security
Contractors
Identifies
Key Performance Indicators
Routers
Sop
Redundant
Perimeter
Pki
Aid
Auditing
Coordinated
Gap
Technical Presentations
Cissp
Workflow
Algorithms
Human Resources
Methodology
Execution
Tripwire
It Audit
Satellite Radio
Guidance
Web Applications
Networking
Posture
Local Area Network
System
St&E
Business Services
Cell
Itgc
Testing Methodology
Ocsp
Tests
F Secure
Baltimore
Threat Analysis
Reports
Tcp/Ip
Strategy
Ethernet
Risk Analysis
Enterprise Architecture
Testing
Encryption
Vm
Training
Forensic Analysis
Policy
Ssl
Webinspect
Customer Service
Enterprise Software
Sla
Security Design
Modifying
Scripting
Vpn
Documentation
Project Management
Mitigation
Identity Management
Private Sector
Cisco Routers
Stakeholders
Rsa Security
Internet Security
Commercial Real Estate
Microsoft
Fannie Mae
Software Project Management
Pix
Os/2
Analysis
Canvas
Hardware
Business Continuity Planning
Sox 404
Mechanisms
Encase
Technical Papers
Pipeda
Netiq Appmanager
Laboratory
Cisco Vpn
Information Technology
Broad Based
Gap Analysis
Information Security
Power
Web Technologies
Test Planning
Transmission
Accreditation
Industrial Engineering
Coordination
Computer Operations
Fix
Configurations
Nessus
Fix Protocol
Operating Systems
Dos
Applications
Hipaa
Payment Industry
Business Development
Schedules
Active
Bank Reconciliation
Srr
Business Process Analysis
Fms
Privacy Law
Restoration
Suite
Segregation of Duties
Mvs
Risk Assessment
Symantec
Omb
Network Engineering
Mbsa
Change Management
Network Administration
Security Management
Glba
World Bank
Business Intelligence
Technical Support
Project Planning
External Audit
Remediation
Project
Sarbanes Oxley Act
Sql
Iso 27001
Contractual Agreements
F5 Bigip
Supports
Java Applets
Vax
Process Management
Unix
Autoaudit
Ibm Iseries
Freddie Mac
Presentations
It Controls
Responsibility
Internal Audit
Cisa
Banners
Firewalls
Security Risk
Labor Issues
Business Units
Cisco Technologies
Personnel Management
Architectural Plans
Active Directory
Owasp
Intrusion Detection
Itil
Sidewinder
3Des
Mrtg
Computer Network Operations
Forms
Testers
Reviews
Government
Prevention
Participatory Management
Computer Security
Nist
Netview
Security Architecture Design
Guidelines
Midrange
Raptor
Materials
Software
Windows Nt
Image Capture
Oracle
Compliance
Java
Business Continuity
Stig
Ioc
Parties
Rate
Ecc
Business Process
White Papers
Manufacturing
Internal Controls
Client/Server
Collateral
Weaknesses
Issa
Fsa
Deployed
Treasury
Assertiveness
Cryptography
Scanners
Data Encryption Standard
Risk
Software Development
Delivery
Disaster
Iss
Cics
Architecture
Chip
Enterprise Security
Unix Operating Systems
Evaluation
Nist 800 53
Coordinate
Gaps
Databases

Youtube

Cooking a 16 year old

  • Duration:
    20m 5s

Ss1 on 2 consoles

Follow my socials.

  • Duration:
    27m 9s

Antwon 1v1

Follow my socials.

  • Duration:
    1h 43m 2s

Crendal Blackwell

  • Duration:
    36m

Beats for 2 hours

Pro am for a couple hours.

  • Duration:
    7m 5s

Hoopin

  • Duration:
    3m 27s

3v3 proam

Follow my socials.

  • Duration:
    1h 25m 46s

My clans and mentions so far in my career

  • Duration:
    33s

Get Report for Crendal Lamar Blackwell from Jacksonville, FL, age ~61
Control profile