Skip to content

Commit

Permalink
improve wording
Browse files Browse the repository at this point in the history
  • Loading branch information
lawndoc authored Sep 28, 2024
1 parent 1cd3a61 commit 4d0676b
Show file tree
Hide file tree
Showing 2 changed files with 13 additions and 15 deletions.
15 changes: 7 additions & 8 deletions subfiles/experience/vermeer/appsec.tex
Original file line number Diff line number Diff line change
Expand Up @@ -2,14 +2,13 @@
\begin{document}
\begin{itemize}
\item Built and scaled Vermeer's DevSecOps program
\item Drove adoption of SAST, SCA, Secret Scanning, and other tools
\item Implemented security gates to enforce security-by-design
\item Configured automated fixes to improve security and reduce overhead
\item Audited and configured git repos using GitHub's API
\item Remediated hundreds of leaked secrets and vulnerabilities
\item Deployed SAST, SCA, Secret Scanning, and other tools
\item Enforced Security-by-Design through security gates and SLAs
\item Reduced developer toil by configuring automated security fixes
\item Automated git repo compliance using GitHub's API
\item Pentested APIs, web applications, mobile apps, and embedded systems
\item Performed threat modeling for new products and features
\item Worked with Architects and Engineering Managers to standardize processes
\item Consulted for IT on architecture committee
\item Created threat models for numerous products
\item Standardized processes with Engineering Managers
\item Architecture committee member for IT development
\end{itemize}
\end{document}
13 changes: 6 additions & 7 deletions subfiles/experience/vermeer/corpsec.tex
Original file line number Diff line number Diff line change
@@ -1,15 +1,14 @@
\documentclass[../../../main.tex]{subfiles}
\begin{document}
\begin{itemize}
\item Ransomware threat actors contained and eradicated post-foothold
\item Developed custom honeypots, incident response tools, and data analysis tools
\item Detection lab created and maintained for purple teaming
\item Used Detection-as-Code principles to write detections at scale
\item Led investigations in high-pressure security events
\item Mentored junior members of the SOC
\item Contained and eradicated multiple ransomware threat actors post-foothold
\item Wrote detections at scale using a detection-as-code approach
\item Built and maintained a detection lab environment
\item Pentested APIs, web applications, embedded systems, and mobile apps
\item Worked with cross-functional teams to reduce workstation attack surface
\item Developed custom honeypots, incident response tools, and data analysis tools
\item Created CI/CD pipelines for custom tooling and detections-as-code
\item Administered security infrastructure on Linux and Windows systems
\item Administered security infrastructure such as BloodHound and Hashtopolis
\item Reduced workstation attack surface by working with cross-functional teams
\end{itemize}
\end{document}

0 comments on commit 4d0676b

Please sign in to comment.