Properties (129)
Predicate | Object |
---|---|
gptkbp:instanceOf |
Fictional character
|
gptkbp:affiliation |
gptkb:Counter_Terrorist_Unit
|
gptkbp:appearsIn |
24
|
gptkbp:characterDevelopment |
Grows from a support role to a lead role
|
gptkbp:characterTraits |
Intelligent
Loyal Sarcastic Resourceful |
gptkbp:firstAppearance |
Season 3
Season 9 |
gptkbp:hasSkill |
Analytical thinking
Attention to detail Communication Cryptography Data analysis Disaster recovery Leadership Negotiation Problem-solving Project management Research Training Adaptability Customer service Mentoring Networking Quality assurance Surveillance Data visualization Risk assessment Strategic planning Compliance management Crisis management Incident response Penetration testing Technical support Vulnerability assessment Intelligence gathering Conflict resolution Database management Cloud security Incident response planning Network security Security best practices Security policies Security analysis Team collaboration Security audits Field operations Hacking Mobile security Business continuity planning Security monitoring Security reviews IoT security Security training Presentation skills Incident management System analysis Security standards Security operations Technical writing Security compliance Security frameworks Security architecture Security assessments Security auditing Security tools Security controls Security awareness Threat analysis Application security Security solutions Endpoint security Security awareness training Interrogation techniques Security technologies Security incident response Security evaluations Security metrics Security research Ethical hacking Security incident management Security testing Security policy development Technical troubleshooting Security governance Security incident response training Security incident response planning Security reporting Security risk management Security incident response tools Security development Security implementation Security incident response analysis Security incident response assessments Security incident response audits Security incident response development Security incident response drills Security incident response evaluations Security incident response exercises Security incident response frameworks Security incident response implementation Security incident response management Security incident response policies Security incident response procedures Security incident response protocols Security incident response research Security incident response reviews Security incident response solutions Security incident response standards Security incident response technologies Security incident response testing Security operations management Security procedures Software proficiency Identity_and_access_management Digital_forensics Time_management |
https://www.w3.org/2000/01/rdf-schema#label |
Chloe O'Brian
|
gptkbp:knownFor |
Technical expertise
|
gptkbp:nationality |
American
|
gptkbp:occupation |
CTU Analyst
|
gptkbp:portrayedBy |
Mary Lynn Rajskub
|
gptkbp:relationship |
gptkb:Jack_Bauer
|
gptkbp:significantEvent |
gptkb:Saving_Jack_Bauer
Assisting in the Day 9 events Involvement in the Day 8 crisis CTU_Los_Angeles_attack |