-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathexample.json
302 lines (283 loc) · 11.4 KB
/
example.json
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
{
"meta": {
"format": "PRTFLIO@0.0.1",
"version": "0.0.1"
},
"basics": {
"name": "Elliot Alderson",
"label": "Cybersecurity Engineer",
"image": "http://40.media.tumblr.com/31d92e5030572f2d0b58ccf0b8931c68/tumblr_o1jnk8J4Bv1uba6jio1_250.jpg",
"summary": "Highly talented and accomplished IT professional with 10+ years industry experience specializing in cybersecurity. Proven ability to deploy, administrate, maintain and secure IT infrastructures. Also, I'm an imaginary software engineer from the american drama–thriller television series <i>Mr. Robot</i>, created by Sam Esmail.",
"disposition": "I'm looking for consulting work as a full time contractor for companies based in NYC or companies that allow remote work.",
"contact": {
"email": "elliotalderson@lavabit.com",
"phone": "0001-0101-1010101111",
"website": "https://elliotalderson.com",
"location": "New York City, USA",
"social": [
{
"network": "Github",
"user": "elliotalderson",
"url": "https://github.com/elliotalderson"
},
{
"network": "Linkedin",
"user": "elliotalderson",
"url": "https://linkedin.com/elliotalderson"
}
]
}
},
"employment": [
{
"employer": "Allsafe Cybersecurity",
"position": "Chief Cybersecurity Engineer",
"url": "https://allsafe.com",
"startDate": "01-01-2014",
"endDate": "01-01-2016",
"summary": "At my job with Allsafe Cybersecurity I'm responsible with maintaining and securing client IT infrastructures. <br /><br /><div><h4>Highlights</h4><ul><li>Developed and implemented online security procedures</li><li>Worked with management to set security standards and manuals</li></ul></div>",
"location": "New York City, USA",
"keywords": ["IAM", "UNIX", "IPSec", "VPN", "EIGRP"]
},
{
"employer": "BigCorp Inc.",
"position": "Cybersecurity Engineer",
"url": "https://bigcorp.com",
"startDate": "01-01-2012",
"endDate": "01-01-2014",
"summary": "My responsibility at BigCorp Inc. was to find holes in their system, until it was 'hacker-proof'. <br /><br /><div><h4>Highlights</h4><ul><li>Developed complicated network infrastructure from scratch</li><li>Secured running applications and full network infrastructure</li></ul></div>",
"location": "New York City, USA",
"keywords": ["OSPF", "BGP", "SSH", "ModSecurity", "Fail2Ban", "RKHunter", "Nmap"]
}
],
"education": [
{
"institution": "Columbia University",
"fieldOfStudy": "Computer Security",
"degree": "Master",
"startDate": "01-01-2010",
"endDate": "01-01-2011",
"grade": "4.0 gpa",
"url": "http://www.cs.columbia.edu/education/ms/newComputerSecurity/",
"location": "New York City, USA",
"keywords": ["Computer Security"]
},
{
"institution": "Columbia University",
"fieldOfStudy": "Computer Science",
"degree": "Bachelor",
"startDate": "01-01-2008",
"endDate": "01-01-2011",
"url": "http://www.cs.columbia.edu/",
"location": "New York City, USA",
"keywords": ["Computer Science"]
}
],
"projects": [
{
"title": "OpenDoor",
"summary": "A tool to check a system for open ports and other known security holes",
"url": "https://opendoor.org",
"repo": "https://github.com/elliotalderson/opendoor",
"category": "Command line application",
"startDate": "01.01.2014",
"endDate": "Present",
"keywords": ["C++"]
}
],
"openSource": [
{
"title": "Tor",
"summary": "Tor is free software and an open network that helps you defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security.",
"url": "https://www.torproject.org/",
"category": "Desktop Application",
"repo": "https://gitweb.torproject.org/tor.git",
"startDate": "01.01.2010",
"endDate": "Present",
"keywords": ["C"]
},
{
"title": "F-coin",
"summary": "F-coin is a peer-to-peer cryptocurrency and open source software project released under the MIT/X11 license",
"url": "http://fcoin.org",
"category": "Cryptocurrency",
"repo": "http://git.fcoin.org",
"startDate": "01.01.2015",
"endDate": "Present",
"keywords": ["Cryptocurrency", "C++"]
}
],
"skills": [
{
"name": "Computer Security",
"summary": "Although to completely secure a system you have to know every layer of the stack, there are some common tools that I use on a regular basis.",
"keywords": ["OSPF", "BGP", "SSH", "ModSecurity", "Fail2Ban", "RKHunter", "Nmap", "IAM", "UNIX", "IPSec", "VPN", "EIGRP"]
},
{
"name": "Programming",
"summary": "I use the tool which is right for the job, and I am certain I can pick up any programming language that is necessary to get the task done.",
"keywords": ["C", "C++", "Java", "PHP"]
}
],
"qualifications": [
{
"category": "Course",
"title": "Cybersecurity Specialization",
"startDate": "01.01.2015",
"endDate": "",
"from": "University of Maryland",
"summary": "The Cybersecurity Specialization covers the fundamental concepts underlying the construction of secure systems, from the hardware to the software to the human-computer interface, with the use of cryptography to secure interactions.",
"url": "https://www.coursera.org/specializations/cyber-security#courses",
"keywords": ["Cryptography", "Hardware Security", "Software Security"]
},
{
"category": "Certification",
"title": "ITIL® Master Qualification (ITILMA)",
"startDate": "01.01.2012",
"endDate": "",
"from": "Exin",
"summary": "The ITIL Master Qualification Certificate validates the capability of the candidate to apply the principles, methods and techniques from ITIL in the workplace.",
"url": "https://www.exin.com/NL/en/certifications/&fw=itil-v3",
"keywords": ["Problem Management", "IS Governance", "Risk Management"]
}
],
"recognition": [
{
"category": "Award",
"title": "Google Summer of Code",
"startDate": "01.01.2012",
"endDate": "",
"from": "Google",
"summary": "Google Summer of Code is a global program that offers post-secondary student developers stipends to write code for various open source software projects. ",
"url": "https://en.wikipedia.org/wiki/Google_Summer_of_Code",
"keywords": ["Java"]
}
],
"writing": [
{
"title": "Applied Cryptography",
"category": "Book",
"date": "01.01.2014",
"url": "http://elliotalderson.com/applied-cryptography",
"publisher": "O'Reilly Media",
"summary": "Cryptography or cryptology is the practice and study of techniques for secure communication in the presence of third parties called adversaries. More generally, cryptography is about constructing and analyzing protocols that prevent third parties or the public from reading private messages;",
"keywords": ["Cryptography"]
}
],
"reading": [
{
"title": "Post-Quantum Cryptography",
"category": "Book",
"url": "https://www.amazon.com/Post-Quantum-Cryptography-Daniel-J-Bernstein/dp/3540887016/ref=sr_1_1?s=books&ie=UTF8&qid=1490352947&sr=1-1&refinements=p_27%3ADaniel+J.+Bernstein",
"author": "Daniel J. Bernstein and Johannes Buchmann",
"date": "01.01.2009",
"summary": "This book is an essential resource for students and researchers who want to contribute to the field of post-quantum cryptography.",
"keywords": ["Cryptography", "RSA", "DSA", "ECDSA"]
}
],
"speaking": [
{
"title": "Viability and the future of cryptocurrencies",
"event": "Real World Cryptography Conference 2017",
"location": "Columbia University in New York City",
"url": "https://www.realworldcrypto.com/rwc2017/program",
"date": "January 6, 2017",
"summary": "In this talk I gave a brief overview of the cryptocurrency landscape, arguments for and against its viability, and my opinion about the future.",
"keywords": ["cryptocurrency", "F-coin"]
}
],
"patents": [
{
"title": "Anonymous peer-to-peer verification through cryptographic key-address mapping",
"url": "https://patents.google.com/patent/US11111FAKE1234",
"number": "US11111FAKE1234",
"status": "Issued",
"summary": "Disclosed is a method for peer-to-peer verification through cryptography key-address mapping, which allows users of a cryptocurrency to verify the authenticity of a transaction without the need to disclose privat information of involved parties.",
"date": "01.01.2016",
"keywords": ["F-coin", "cryptocurrency"]
}
],
"languages": [
{
"language": "English",
"level": "Native",
"years": "26"
},
{
"language": "French",
"level": "Elementary",
"years": "1"
}
],
"interests": [
{
"name": "Arduino",
"summary": "I love to play around with hardware once in a while. I build myself a simple cellphone (on Arduino). Next I want remove the arduino, and custom print my chip design to get the size down."
},
{
"name": "Gaming",
"summary": "I don't play as often as I used to, but once in a while I still love to loose myself in a great game."
}
],
"extracurricular": [
{
"title": "BitcoinNYC",
"url": "https://www.meetup.com/BitcoinNYC/",
"summary": "BitcoinNYC is New York's Bitcoin professional network.",
"category": "Meetup",
"location": "NYC",
"startDate": "01.01.2016",
"endDate": "Present",
"keywords": ["cryptocurrency", "Bitcoin"]
}
],
"affiliation": [
{
"category": "Non-Profit Organization",
"organization": "EFF",
"url": "https://www.eff.org/about",
"startDate": "01.01.2015",
"endDate": "Present",
"summary": "The Electronic Frontier Foundation is the leading nonprofit organization",
"location": "815 Eddy Street, San Francisco CA 94109 USA",
"keywords": ["free speach", "privacy"]
}
],
"governance": [
{
"summary": "Protect your privacy. Defend yourself against network surveillance and traffic analysis.",
"category": "Non-Profit Organization",
"organization": "Tor browser",
"url": "https://www.torproject.org/",
"startDate": "01.01.2015",
"endDate": "Present",
"keywords": ["encryption"]
}
],
"service": [
{
"category": "Non-Profit Organization",
"organization": "ACLU",
"url": "https://www.aclu.org/",
"startDate": "01.01.2015",
"endDate": "Present",
"summary": "ACLU's mission is to defend and preserve the individual rights and liberties guaranteed to every person in this country by the Constitution and laws of the United States.",
"location": "125 Broad St., 18th floor, New York, NY 10004",
"keywords": ["Privacy", "Free Speach"]
}
],
"references": [
{
"name": "Angela Moss",
"role": "Account Executive",
"company": "Allsafe Cybersecurity",
"summary": "Elliot is a very loyal and competent employee."
},
{
"name": " Gideon Goddard ",
"role": "CEO",
"company": "Allsafe Cybersecurity",
"summary": "Elliot is a very loyal and competent employee."
}
]
}