I’m a Full Stack Developer with skills in AJAX, Unix and Linux Administration, PHP, SQL, JavaScript, HTML, CSS, XML, JSON, jQuery, Content Management Systems(Homegrown & Open-Source), Frameworks(Homegrown & Open-Source), integrated development environments, open source technologies, the command line, and more. I have 11 certifications in Information Technology.
Skype: cameron.haddock
Email: cameron@cameronhaddock.com
Download Resume
PDF Format | Word Format
For eight years, I have developed a wide range of websites and applications using HMTL, CSS, Jquery, PHP, Javascript, and SQL including sites for startup companies and large businesses. I’m a Full Stack Developer who’s familiar with all layers in computer software building from the front-end to the back-end and all of the OS’s in between. Layers of the Full Stack are server, network, and hosting environment, data modeling, business logic, API layer / Action layer / MVC, User interface, User experience, and understanding what the customer and the business need. I’m not concerned with what a program does, but how well the program does it. I use a Git branching model for the software development process.
● REST API ● jQuery ● AJAX ● PHP ● SQL ● CSS ● Algorithms ● XML ● Mainframe ● Frameworks(Homegrown & Open Source ; Client Side & Server Side) ● CMSs(Homegrown & Open Source) ● OOP ● OOCSS ● LAMP (Linux, Apache, MySQL, PHP) ● UNIX ● SEO Audits ● HTML ● SVN ● Git ● CentOS ● Ubuntu ● JSON ● XML ● Intrustion Prevention ● Intrusion Detection ● Open Source Technologies ● iPhone & Android Development ● MVC ● Programming Paradigms ● 3rd party api’s ● HTTP ● SOAP ● Debugging ● Conditional Logic ● Looping ● Error Handling ● Cross-platform compatibility ● IDEs(eg., JetBrains) ● Vim ● Enterprise Software Deployment ● WHM ● DNS ● cPanel ● Shell Scripting ● Cron ● PeerVPN Network ● Java ● Microsoft SQL Server ● Team Foundation Server ● ASP.NET ● Plesk ● Visual Studios ● IIS ● Microsoft SQL Server Management Studio ● C# ● Visual Basic ● Redgate ● RDBMS ● Unit Testing ● Agile/Scrum Methodology ● Django ● DHTML ● DevOps ● ORM ● Web Template Engines ● PCI SSC ● OAuth ● Web Application Firewall (WAF) ● Secure Sockets Layer ● Navicat ● SDKs ● Obfuscation ● Load Balancing ● Brute Force Protection ● Cryptography ● Best coding practices ● Virtual machines ● Ruby on Rails ● Sass ● Telemetry-Based Infrastructure Device Integrity Monitoring ● JSON Web Tokens ● Postman ● MVVM ● UI Prototyping(InVision & Adobe XD) ● MongoDB ● AWS ● PostgreSQL ● 2FA ● Regex ● Stored Procedures ● SSIS ● SSRS
Handled a portal of assignments as a Back-End Developer at Journal Communications http://jnlcom.com/ onsite contractor: 2013
Handled a portal of assignments as a Front-End Developer at CJ Advertising http://cjadvertising.com
onsite contractor: 2013
Handled a portal of assignments as a Full-Stack Developer at Inbound Marketing Agents http://
inboundmarketingagents.com remote contractor: 2014-2015
Handled a portal of assignments as a Back-End Developer at P&E Distributors http://pedistributors.com onsite contractor: 2015
Handled a portal of assignments as an Applications Developer http://www.gcfa.org/ onsite contractor: 2015
Handle a portal of assignments as a Senior Developer.
In my current project, I’m deserializing JSON data to objects with C# from REST web service responses. I use postman to supercharge my API workflow where I can construct requests quickly to analyze the responses.
http://www.aegisgroup.com/ onsite employee: 9/1/15-Present
Handle a portal of low, medium, high, and critical tickets as the lead developer. Will discuss upon request.
Executive: 2017-Present
The International Webmasters Association (IWA) — with global chapters in over 100 countries — has endorsed all Brainbench’s Web skills certifications. This endorsement offers individuals who are Brainbench certified with added industry validation from the first and largest webmasters’ association. You may visit IWA site for more information at: http://www.iwanet.org/
My mission is to make software security visible, so that individuals and organizations are able to make informed decisions. Consider the business value of the affected data and the platform running the interpreter. All data could be stolen, modified, or deleted. Could your reputation be harmed? Also consider the business impact of public exposure of the vulnerability. The system could be completely compromised without you knowing it. All your data could be stolen or modified slowly over time. Recovery costs could be expensive.
How Do I Prevent ‘Injection’?
My preferred option is to use a safe API which avoids the use of the interpreter entirely or provides a parameterized interface. I’m careful with APIs, such as stored procedures, that are parameterized, but can still introduce injection under the hood. If a parameterized API is not available, I carefully escape special characters using the specific escape syntax for that interpreter.
I have mastered the core aspects of computer programming that are valid across programming languages which covers the following topics: Algorithms, Complex Data Types, Data Access, Productivity and Quality, Program Flow, Program Structure, Programming Paradigms, User Interface, Variables, Data Types, and Operators.
Algorithms
Complex Data Types
Data Access
Productivity and Quality
Program Flow
Program Structure
Programming Paradigms
User Interface
Variables, Data Types, and Operators
Good developers who are familiar with the entire stack know how to make life easier for those around them. A small preview of the following code samples will demonstrate some of my knowledge of algorithms, complex data types, data access, productivity and quality, program flow, program structure, programming paradigms, user interface, variables, data types, and operators.
Absolute URL – code.cameronhaddock.com
I am seeking opportunities to build websites and/or applications from the ground up for you or your company.