About Me
My name is Cameron. I am a Full-Stack Developer based in Nashville.
I'm a Full-Stack Developer who's familiar with all concepts and layers in computer software building from the front-end to the back-end and all of the OS's in between. Layers of the Full Stack are server, network, hosting environment, data modeling, business logic, API layer / Action layer / MVC, User interface, User experience, and understanding what the customer and the business need. I'm not concerned with what a program does, but how well the program does it. I'm subscribed to GitHub Pro and use a Git branching model for the software development process. Private repositories are only accessible to me, people I explicitly share access with, and, for organization repositories, certain organization members. I have mastered the core aspects of computer programming that are valid across programming languages which covers the following topics: Algorithms, Complex Data Types, Data Access, Productivity and Quality, Program Flow, Program Structure, Programming Paradigms, User Interface, Variables, Data Types, Output and Print, Arrays, Conditional Statements, Loops, and Operators.
ResumeCertifications
HTML 4.0
Brainbench certification
Earned on : January 10, 2015
PHP 5
Brainbench certification
Earned on : January 11, 2015
CSS 2
Brainbench certification
Earned on : January 11, 2015
SQL
Brainbench certification
Earned on : January 20, 2015
Unix Administration
Brainbench certification
Earned on : February 8, 2015
Linux Administration
Brainbench certification
Earned on : March 6, 2015
JavaScript
Brainbench certification
Earned on : March 24, 2015
Programming Concepts
Brainbench certification
Earned on : March 25, 2015
Web Services Application Engineering
Brainbench certification
Earned on : March 26, 2015
Java 7
Brainbench certification
Earned on : April 10, 2015
Corporate Information Security Awareness
Global Learning Systems
Earned on : July 10, 2015
HIPAA Compliance
Privacy Professor
Earned on : March 20, 2017
Python 3
CodeChef
Earned on : October 26, 2023
Skills
- REST API
- jQuery
- AJAX
- PHP
- SQL
- CSS
- Algorithms
- XML
- Mainframe
- Frameworks(Homegrown & Open Source; Client Side & Server Side)
- CMSs(Homegrown & Open Source)
- OOP
- OOCSS
- LAMP(Linux, Apache, MySQL, PHP)
- UNIX
- SEO Audits
- HTML
- SVN
- Git
- CentOS
- Ubuntu
- JSON
- Intrusion Prevention
- Intrusion Detection
- Open Source Technologies
- iPhone & Android Development
- MVC
- Programming Paradigms
- Third Party APIs
- HTTP
- SOAP
- Debugging
- Conditional Logic
- Looping
- Error Handling
- Cross-Platform Compatibility
- IDEs(eg.,JetBrains)
- Vim
- Enterprise Software Development
- WHM
- cPanel
- Shell Scripting
- Cron
- PeerVPN Network
- Java
- Microsoft SQL Server
- TFS
- ASP.NET
- Plesk
- Visual Studios
- IIS
- Microsoft SQL Server Management Studio
- C#
- Visual Basic
- Redgate
- RDBMS
- Unit Testing
- Agile/Scrum Methodology
- Django
- DHTML
- DevOps
- ORM
- Web Template Engines
- PCI SSC
- OAuth
- Web Application Firewall(WAF)
- Secure Sockets Layer
- Navicat
- SDKs
- Obfuscation
- Load Balancing
- Brute Force Protection
- Cryptography
- Best Coding Practices
- Virtual Machines
- Ruby on Rails
- Sass
- Telemetry-Based Infrastructure Device Integrity Monitoring
- JSON Web Tokens
- Postman
- MVVM
- UI Prototyping(InVision & Adobe XD)
- MongoDB
- AWS
- Azure
- GCP
- PostgreSQL
- 2FA
- Regex
- Stored Procedures
- SSIS
- SSRS
- Business Logic
- Content Delivery Network (CDN)
- CRUD
- .htaccess Tricks
- Penetration Testing
- Bootstrap
- Vysor
- Xamarin
- Audit Trails
- Stripe API
- Highcharts JS
- Neutrino API
- SparkPost API
- Atlassian Collaboration Tools
- WinSCP
- WinMerge
- Network Protocols
- Shopify
- Bot Detection
- Geo-blocking View and Post
- PowerShell
- Uptime Monitoring
- Security Headers
Education
Nashville State
A public community college in Nashville, Tennessee.
Session : 2008-2011
Aquinas College
A private, Catholic, four-year liberal arts college in Nashville, Tennessee.
Session : 2008-2011
Y Combinator
A technology startup accelerator based in San Francisco, CA.
Session: Winter 2020
Experience
Journal Communications
Back-end Developer
2013
Handled a portal of assignments as a Back-end Developer.
cj Advertising
Front-end Developer
2013
Handled a portal of assisgnments as a Front-end Developer.
Inbound Marketing Agents
Full-Stack Developer
2014-2015
Handled a portal of assignments as a Full-Stack Developer.
P&E Distributors
Back-end Developer
2015
Handled a portal of assignments as a Back-end Developer.
GCFA
Applications Developer
2015
Handled a portal of assignments as an Applications Developer.
Trilliant Health
Senior Developer
September 2015 - May 2017
Handled a portal of assignments as a Senior Developer.
Concepts
Algorithms
Analysis and Translation
Performance
Searching & Sorting
Data Access
Data Sources
Relational Databases
Transactions
Productivity and Quality
Code Formatting
Debugging
Testing
Program Flow
Conditional Logic
Error Handling
Looping
Program Structure
Expressions and Statements
Functions and Subroutines
Variable Declaration and Scope
User Interface
Form / Screen Design
Help Systems
Input Validation
Programming Paradigms
Compiled/Interpreted Languages
Event-Driven Programming
Object-Oriented Programming
Procedural Programming
Variables, Data Types, and Operators
Boolean
Characters
Numeric Data
Complex Data Types
Classes
Data Structures
Security
What are the top security risks that I look for?
My mission is to make software security visible, so that individuals and organizations are able to make informed decisions. Consider the business value of the affected data and the platform running the interpreter. All data could be stolen, modified, or deleted. Could your reputation be harmed? Also, consider the business impact of public exposure of the vulnerability. The system could be completely compromised without you knowing it. All your data could be stolen or modified slowly over time. Recovery costs could be expensive. To safeguard your business, it is essential to implement various protective measures.
- SQL Injection
- Broken Authentication and Session Management
- Cross-Site Scripting
- Broken Access Control
- Security Misconfiguration
- Sensitive Data Exposure
- Insufficient Attack Protection
- Cross-Site Request Forgery (CSRF)
- Using Components with Known Vulnerabilities
- Underprotected APIs
- Security Logging and Monitoring Failures
- Server-Side Request Forgery
- Cryptographic Failures
- Botnet Attacks
- Distributed Denial-of-Service (DDoS) Attack
- Blacklisted IPs
- Backdoor Access
- Access to Restricted Folder
- Insecure Deserialization
- XML External Entities (XXE)
- HTTP Verb Tampering
- File Inclusion
- Command Injection
- Firewall Bypass
- Card Testing Fraud Attacks
- Clickjacking Attacks
- Anonymous Proxies
- Improper User Agents
- SSL Stripping
Contact
Get in Touch
Good developers who are familiar with the entire stack know how to make life easier for those around them. Want to hire me? I am seeking opportunities to build websites and/or applications from the ground up for you or your company.
cameron@cameronhaddock.com
cameron.haddock
/in/cameron-haddock
615-972-6978
Nashville, TN
Bug Bounty Hacker
Nashville Native
My Blog: huntcode.com