Commit 76bf1f93 authored by Kali's avatar Kali
Browse files

Updating with smartsheet

parent e4652d91
Pipeline #472061293 passed with stage
in 3 minutes and 12 seconds
......@@ -28,7 +28,7 @@
\name{Jacob M. Shodd} % Your name
%\address{B-1 \\ II , U.P. 208016} % Your address
%\address{123 Pleasant Lane \\ City, State 12345} % Your secondary addess (optional)
\address{(724)-510-6059 \\ work@jacobshodd.com \\ jacobshodd.com} % Your phone number and email
\address{(724)-510-6059 \\ work@jacobshodd.com} % Your phone number and email
\begin{document}
......@@ -37,7 +37,21 @@
%----------------------------------------------------------------------------------------
\begin{rSection}{\vspace{-5pt}Work Experience}
\begin{rSubsection}{Security Engineer}{\em July 2019 - Current}{Red Ventures}{}
\begin{rSubsection}{Application Security Engineer}{\em Aug. 2020 - Current}{SmartSheet}{}
\item {Lead the code analysis program, which included SAST, container scanning, dependency analysis, and more}
\item {Reproduced bugs, prioritized vulnerabilities, and communicated with researchers for the Bug Bounty program}
\item {Lead technical training initiatives and aided in management of the Security Champions program}
\item {Worked closely with the compliance team to provide recommendations and guidance for meeting compliance standards}
\item {Performed root cause analysis investigations on bugs found in the Bug Bounty program as well as penetration tests}
\item {Lead Threat Modeling sessions with development teams to identify possible threats before pushing code to production}
\item {Represented the security team when working directly with customers and answering technical security questions}
\end{rSubsection}
%------------------------------------------------
\begin{rSubsection}{Security Engineer}{\em July 2019 - Aug. 2020}{Red Ventures}{}
\item {Developed and delivered threat modeling training materials to our internal development teams}
\item {Performed security assessments on multi-cloud environments as part of the Mergers and Acquisitions process}
\item {Performed infrastructure and application penetration tests for our internal operations and development teams}
......@@ -55,7 +69,6 @@
\item {Developed automated systems via Python and Golang to perform operations across all AWS accounts}
\item {Designed, developed, and deployed highly available and scalable ECS applications using AWS Fargate}
\item {Built out a HIPAA Compliant framework in AWS and migrated an existing production and staging environment to it}
\item {Served as a consultant for internal development teams to recommend best practices and to architect solutions}
\end{rSubsection}
......@@ -65,31 +78,11 @@
\begin{rSubsection}{Operations Engineer}{\em May 2017 - Feb. 2018}{M*Modal}{}
\item {Created an internal web application using Golang to act as a reporting and alerting portal}
\item {Implemented a Prometheus monitoring framework in Kubernetes clusters across several data centers}
\item {Wrote, maintained, and utilized Python scripts to automate tasks and process data}
\item {Deployed production code with Kubernetes and performed profile data migrations between databases}
\end{rSubsection}
\end{rSection}
%----------------------------------------------------------------------------------------
% Certification Section
%----------------------------------------------------------------------------------------
%\begin{rSection}{\vspace{-5pt}Certifications}
% \begin{tabular}{ @{} >{\bfseries}l @{\hspace{6ex}} l }
% Offensive Security & Offensive Security Certified Professional \\
% Amazon Web Services & Solutions Architect Associate\\
% \end{tabular}
%\end{rSection}
\begin{rSection}{\vspace{-5pt}Certifications}
\begin{rSubsection}{Offensive Security Certified Professional}{\em Dec. 2019}{Offensive Security}{}
\item {Utilized penetration testing techniques in a realistically segmented multi-network lab environment}
\item {Made use of industry standard tools such as Nmap, Burp Suite, Metasploit, and SQLMap }
\item {Proved proficient in network enumeration, web application attacks, privilege escalation, exploit development, etc.}
\item {Passed the 24 hour exam, in which I successfully compromised all five targets and wrote a comprehensive report}
\end{rSubsection}
{\bf Solutions Architect Associate} \hfill {\em July 2018}
\\ \textit{Amazon Web Services}
\end{rSection}
%----------------------------------------------------------------------------------------
% Mentorship SECTION
%----------------------------------------------------------------------------------------
......@@ -102,6 +95,14 @@
\end{rSubsection}
\end{rSection}
%----------------------------------------------------------------------------------------
% Certification Section
%----------------------------------------------------------------------------------------
\begin{rSection}{\vspace{-5pt}Certifications}
{\bf Offensive Security Certified Professional} \hfill {\em Dec. 2019}
\\ Offensive Security
\end{rSection}
%----------------------------------------------------------------------------------------
% TECHNICAL STRENGTHS SECTION
%----------------------------------------------------------------------------------------
......@@ -118,11 +119,8 @@
%----------------------------------------------------------------------------------------
\begin{rSection}{\vspace{-5pt}Education}
{\bf Westminster College} \hfill {\em Aug. 2013 - May 2017}
\\ Bachelor's of Science in Computer Information Systems
{\bf Bachelor's of Science in Computer Information Systems} \hfill {\em Aug. 2013 - May 2017}
\\ Westminster College
\end{rSection}
......
Supports Markdown
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment