Hey, I am Cameron Haddock

Full-Stack Developer.

About Me

My name is Cameron. I am a Full-Stack Developer based in Nashville.

I'm a Full-Stack Developer who's familiar with all concepts and layers in computer software building from the front-end to the back-end and all of the OS's in between. Layers of the Full Stack are server, network, hosting environment, data modeling, business logic, API layer / Action layer / MVC, User interface, User experience, and understanding what the customer and the business need. I'm not concerned with what a program does, but how well the program does it. I'm subscribed to GitHub Pro and use a Git branching model for the software development process. Private repositories are only accessible to me, people I explicitly share access with, and, for organization repositories, certain organization members. I have mastered the core aspects of computer programming that are valid across programming languages which covers the following topics: Algorithms, Complex Data Types, Data Access, Productivity and Quality, Program Flow, Program Structure, Programming Paradigms, User Interface, Variables, Data Types, and Operators.



HTML 4.0

Brainbench certification

Earned on : January 10, 2015


Brainbench certification

Earned on : January 11, 2015


Brainbench certification

Earned on : January 11, 2015


Brainbench certification

Earned on : January 20, 2015

Unix Administration

Brainbench certification

Earned on : February 8, 2015

Linux Administration

Brainbench certification

Earned on : March 6, 2015


Brainbench certification

Earned on : March 24, 2015

Programming Concepts

Brainbench certification

Earned on : March 25, 2015

Web Services Application Engineering

Brainbench certification

Earned on : March 26, 2015

Java 7

Brainbench certification

Earned on : April 10, 2015

Corporate Information Security Awareness

Global Learning Systems

Earned on : July 10, 2015

HIPAA Compliance

Privacy Professor

Earned on : March 20, 2017


  • jQuery
  • AJAX
  • PHP
  • SQL
  • CSS
  • Algorithms
  • XML
  • Mainframe
  • Frameworks(Homegrown & Open Source; Client Side & Server Side)
  • CMSs(Homegrown & Open Source)
  • OOP
  • LAMP(Linux, Apache, MySQL, PHP)
  • UNIX
  • SEO Audits
  • HTML
  • SVN
  • Git
  • CentOS
  • Ubuntu
  • JSON
  • Intrusion Prevention
  • Intrusion Detection
  • Open Source Technologies
  • iPhone & Android Development
  • MVC
  • Programming Paradigms
  • Third Party APIs
  • HTTP
  • SOAP
  • Debugging
  • Conditional Logic
  • Looping
  • Error Handling
  • Cross-Platform Compatibility
  • IDEs(eg.,JetBrains)
  • Vim
  • Enterprise Software Development
  • WHM
  • cPanel
  • Shell Scripting
  • Cron
  • PeerVPN Network
  • Java
  • Microsoft SQL Server
  • TFS
  • Plesk
  • Visual Studios
  • IIS
  • Microsoft SQL Server Management Studio
  • C#
  • Visual Basic
  • Redgate
  • Unit Testing
  • Agile/Scrum Methodology
  • Django
  • DevOps
  • ORM
  • Web Template Engines
  • OAuth
  • Web Application Firewall(WAF)
  • Secure Sockets Layer
  • Navicat
  • SDKs
  • Obfuscation
  • Load Balancing
  • Brute Force Protection
  • Cryptography
  • Best Coding Practices
  • Virtual Machines
  • Ruby on Rails
  • Sass
  • Telemetry-Based Infrastructure Device Integrity Monitoring
  • JSON Web Tokens
  • Postman
  • MVVM
  • UI Prototyping(InVision & Adobe XD)
  • MongoDB
  • AWS
  • Azure
  • GCP
  • PostgreSQL
  • 2FA
  • Regex
  • Stored Procedures
  • SSIS
  • SSRS
  • Business Logic
  • Content Delivery Network (CDN)
  • CRUD
  • .htaccess Tricks
  • Penetration Testing
  • Bootstrap
  • Vysor
  • Xamarin
  • Audit Trails
  • Stripe API
  • Highcharts JS
  • Neutrino API
  • SparkPost API
  • Atlassian Collaboration Tools
  • WinSCP
  • WinMerge
  • Network Protocols
  • Shopify
  • Bot Detection
  • Geo-blocking View and Post
  • PowerShell
  • Uptime Monitoring
  • Security Headers


Nashville State Community College

A public community college in Nashville, Tennessee.

Session : 2008-2011

Aquinas College

A private, Catholic, four-year liberal arts college in Nashville, Tennessee.

Session : 2008-2011


Journal Communications

Back-end Developer


Handled a portal of assignments as a Back-end Developer.

cj Advertising

Front-end Developer


Handled a portal of assisgnments as a Front-end Developer.

Inbound Marketing Agents

Full-Stack Developer


Handled a portal of assignments as a Full-Stack Developer.

P&E Distributors

Back-end Developer


Handled a portal of assignments as a Back-end Developer.


Applications Developer


Handled a portal of assignments as an Applications Developer.

Aegis Health Group

Senior Developer

September 2015 - May 2017

Handled a portal of assignments as a Senior Developer.



Analysis and Translation


Searching & Sorting

Data Access

Data Sources

Relational Databases


Productivity and Quality

Code Formatting



Program Flow

Conditional Logic

Error Handling


Program Structure

Expressions and Statements

Functions and Subroutines

Variable Declaration and Scope

User Interface

Form / Screen Design

Help Systems

Input Validation

Programming Paradigms

Compiled/Interpreted Languages

Event-Driven Programming

Object-Oriented Programming

Procedural Programming

Variables, Data Types, and Operators



Numeric Data

Complex Data Types


Data Structures


What are the top security risks that I look for?

My mission is to make software security visible, so that individuals and organizations are able to make informed decisions. Consider the business value of the affected data and the platform running the interpreter. All data could be stolen, modified, or deleted. Could your reputation be harmed? Also, consider the business impact of public exposure of the vulnerability. The system could be completely compromised without you knowing it. All your data could be stolen or modified slowly over time. Recovery costs could be expensive. To safeguard your business, it is essential to implement various protective measures.

  • SQL Injection
  • Broken Authentication and Session Management
  • Cross-Site Scripting
  • Broken Access Control
  • Security Misconfiguration
  • Sensitive Data Exposure
  • Insufficient Attack Protection
  • Cross-Site Request Forgery (CSRF)
  • Using Components with Known Vulnerabilities
  • Underprotected APIs
  • Security Logging and Monitoring Failures
  • Server-Side Request Forgery
  • Cryptographic Failures
  • Brute Force Bot
  • Distributed Denial-of-Service (DDoS) Attack
  • Blacklisted IPs
  • Backdoor Access
  • Access to Restricted Folder
  • Insecure Deserialization
  • XML External Entities (XXE)
  • HTTP Verb Tampering
  • File Inclusion
  • Command Injection
  • Firewall Bypass
  • Card Testing Fraud Attacks
  • Clickjacking Attacks
  • Anonymous Proxies
  • Improper User Agents
  • SSL Stripping


Get in Touch

Good developers who are familiar with the entire stack know how to make life easier for those around them. Want to hire me? I am seeking opportunities to build websites and/or applications from the ground up for you or your company.





Nashville, TN

Today's good mood is sponsored by coffee

Nashville Native