Hey, I am Cameron Haddock

Full-Stack Developer.

About Me

My name is Cameron. I am a Full-Stack Developer based in Nashville.

I'm a Full-Stack Developer who's familiar with all concepts and layers in computer software building from the front-end to the back-end and all of the OS's in between. Layers of the Full Stack are server, network, hosting environment, data modeling, business logic, API layer / Action layer / MVC, User interface, User experience, and understanding what the customer and the business need. I'm not concerned with what a program does, but how well the program does it. I'm subscribed to GitHub Pro and use a Git branching model for the software development process. Private repositories are only accessible to me, people I explicitly share access with, and, for organization repositories, certain organization members. I have mastered the core aspects of computer programming that are valid across programming languages which covers the following topics: Algorithms, Complex Data Types, Data Access, Productivity and Quality, Program Flow, Program Structure, Programming Paradigms, User Interface, Variables, Data Types, Output and Print, Arrays, Conditional Statements, Loops, and Operators.

Resume

Certifications

HTML 4.0

Brainbench certification

Earned on : January 10, 2015

PHP 5

Brainbench certification

Earned on : January 11, 2015

CSS 2

Brainbench certification

Earned on : January 11, 2015

SQL

Brainbench certification

Earned on : January 20, 2015

Unix Administration

Brainbench certification

Earned on : February 8, 2015

Linux Administration

Brainbench certification

Earned on : March 6, 2015

JavaScript

Brainbench certification

Earned on : March 24, 2015

Programming Concepts

Brainbench certification

Earned on : March 25, 2015

Web Services Application Engineering

Brainbench certification

Earned on : March 26, 2015

Java 7

Brainbench certification

Earned on : April 10, 2015

Corporate Information Security Awareness

Global Learning Systems

Earned on : July 10, 2015

HIPAA Compliance

Privacy Professor

Earned on : March 20, 2017

Python 3

CodeChef

Earned on : October 26, 2023

Skills

  • REST API
  • jQuery
  • AJAX
  • PHP
  • SQL
  • CSS
  • Algorithms
  • XML
  • Mainframe
  • Frameworks(Homegrown & Open Source; Client Side & Server Side)
  • CMSs(Homegrown & Open Source)
  • OOP
  • OOCSS
  • LAMP(Linux, Apache, MySQL, PHP)
  • UNIX
  • SEO Audits
  • HTML
  • SVN
  • Git
  • CentOS
  • Ubuntu
  • JSON
  • Intrusion Prevention
  • Intrusion Detection
  • Open Source Technologies
  • iPhone & Android Development
  • MVC
  • Programming Paradigms
  • Third Party APIs
  • HTTP
  • SOAP
  • Debugging
  • Conditional Logic
  • Looping
  • Error Handling
  • Cross-Platform Compatibility
  • IDEs(eg.,JetBrains)
  • Vim
  • Enterprise Software Development
  • WHM
  • cPanel
  • Shell Scripting
  • Cron
  • PeerVPN Network
  • Java
  • Microsoft SQL Server
  • TFS
  • ASP.NET
  • Plesk
  • Visual Studios
  • IIS
  • Microsoft SQL Server Management Studio
  • C#
  • Visual Basic
  • Redgate
  • RDBMS
  • Unit Testing
  • Agile/Scrum Methodology
  • Django
  • DHTML
  • DevOps
  • ORM
  • Web Template Engines
  • PCI SSC
  • OAuth
  • Web Application Firewall(WAF)
  • Secure Sockets Layer
  • Navicat
  • SDKs
  • Obfuscation
  • Load Balancing
  • Brute Force Protection
  • Cryptography
  • Best Coding Practices
  • Virtual Machines
  • Ruby on Rails
  • Sass
  • Telemetry-Based Infrastructure Device Integrity Monitoring
  • JSON Web Tokens
  • Postman
  • MVVM
  • UI Prototyping(InVision & Adobe XD)
  • MongoDB
  • AWS
  • Azure
  • GCP
  • PostgreSQL
  • 2FA
  • Regex
  • Stored Procedures
  • SSIS
  • SSRS
  • Business Logic
  • Content Delivery Network (CDN)
  • CRUD
  • .htaccess Tricks
  • Penetration Testing
  • Bootstrap
  • Vysor
  • Xamarin
  • Audit Trails
  • Stripe API
  • Highcharts JS
  • Neutrino API
  • SparkPost API
  • Atlassian Collaboration Tools
  • WinSCP
  • WinMerge
  • Network Protocols
  • Shopify
  • Bot Detection
  • Geo-blocking View and Post
  • PowerShell
  • Uptime Monitoring
  • Security Headers

Education

Nashville State

A public community college in Nashville, Tennessee.

Session : 2008-2011

Aquinas College

A private, Catholic, four-year liberal arts college in Nashville, Tennessee.

Session : 2008-2011

Y Combinator

A technology startup accelerator based in San Francisco, CA.

Session: Winter 2020

Experience

Journal Communications

Back-end Developer

2013

Handled a portal of assignments as a Back-end Developer.

cj Advertising

Front-end Developer

2013

Handled a portal of assisgnments as a Front-end Developer.

Inbound Marketing Agents

Full-Stack Developer

2014-2015

Handled a portal of assignments as a Full-Stack Developer.

P&E Distributors

Back-end Developer

2015

Handled a portal of assignments as a Back-end Developer.

GCFA

Applications Developer

2015

Handled a portal of assignments as an Applications Developer.

Trilliant Health

Senior Developer

September 2015 - May 2017

Handled a portal of assignments as a Senior Developer.

Concepts

Algorithms

Analysis and Translation

Performance

Searching & Sorting

Data Access

Data Sources

Relational Databases

Transactions

Productivity and Quality

Code Formatting

Debugging

Testing

Program Flow

Conditional Logic

Error Handling

Looping

Program Structure

Expressions and Statements

Functions and Subroutines

Variable Declaration and Scope

User Interface

Form / Screen Design

Help Systems

Input Validation

Programming Paradigms

Compiled/Interpreted Languages

Event-Driven Programming

Object-Oriented Programming

Procedural Programming

Variables, Data Types, and Operators

Boolean

Characters

Numeric Data

Complex Data Types

Classes

Data Structures

Security

What are the top security risks that I look for?

My mission is to make software security visible, so that individuals and organizations are able to make informed decisions. Consider the business value of the affected data and the platform running the interpreter. All data could be stolen, modified, or deleted. Could your reputation be harmed? Also, consider the business impact of public exposure of the vulnerability. The system could be completely compromised without you knowing it. All your data could be stolen or modified slowly over time. Recovery costs could be expensive. To safeguard your business, it is essential to implement various protective measures.

  • SQL Injection
  • Broken Authentication and Session Management
  • Cross-Site Scripting
  • Broken Access Control
  • Security Misconfiguration
  • Sensitive Data Exposure
  • Insufficient Attack Protection
  • Cross-Site Request Forgery (CSRF)
  • Using Components with Known Vulnerabilities
  • Underprotected APIs
  • Security Logging and Monitoring Failures
  • Server-Side Request Forgery
  • Cryptographic Failures
  • Botnet Attacks
  • Distributed Denial-of-Service (DDoS) Attack
  • Blacklisted IPs
  • Backdoor Access
  • Access to Restricted Folder
  • Insecure Deserialization
  • XML External Entities (XXE)
  • HTTP Verb Tampering
  • File Inclusion
  • Command Injection
  • Firewall Bypass
  • Card Testing Fraud Attacks
  • Clickjacking Attacks
  • Anonymous Proxies
  • Improper User Agents
  • SSL Stripping

Contact

Get in Touch

Good developers who are familiar with the entire stack know how to make life easier for those around them. Want to hire me? I am seeking opportunities to build websites and/or applications from the ground up for you or your company.

cameron@cameronhaddock.com

cameron.haddock

/in/cameron-haddock

615-972-6978

Nashville, TN

Bug Bounty Hacker

Nashville Native

My Blog: huntcode.com