Last active
June 27, 2019 17:02
-
-
Save antitree/ead23121db199332a80e4b9559e2a290 to your computer and use it in GitHub Desktop.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
{ | |
"basics": { | |
"name": "Mark Manning", | |
"label": "Security Consultant", | |
"picture": "https://pbs.twimg.com/profile_images/658038562261069825/jB7pbsiE_400x400.png", | |
"email": "[email protected]", | |
"phone": "", | |
"website": "https://www.antitree.com", | |
"summary": "Career security consultant with a focus on containerization technologies.", | |
"location": { | |
"address": "", | |
"postalCode": "", | |
"city": "Rochester", | |
"countryCode": "US", | |
"region": "NY" | |
}, | |
"profiles": [ | |
{ | |
"username": "antitree", | |
"url": "https://twitter.com/antitree", | |
"network": "twitter" | |
} | |
] | |
}, | |
"work": [ | |
{ | |
"company": "NCC Group", | |
"position": "Technical Director", | |
"website": "", | |
"startDate": "2019-06-01", | |
"summary": "", | |
"highlights": [] | |
}, | |
{ | |
"company": "NCC Group", | |
"position": "Principal Security Consultant", | |
"website": "", | |
"startDate": "2015-06-01", | |
"endDate": "2019-06-01", | |
"summary": "", | |
"highlights": [ | |
] | |
}, | |
{ | |
"company": "NCC Group", | |
"position": "Senior Security Engineer", | |
"website": "", | |
"startDate": "2015-05-01", | |
"summary": "", | |
"highlights": [], | |
"endDate": "2015-06-01" | |
}, | |
{ | |
"company": "Intrepidus Group, Inc.", | |
"position": "Sr Security Consultant", | |
"website": "", | |
"startDate": "2012-06-01", | |
"endDate": "2015-06-01", | |
"summary": "", | |
"highlights": [] | |
}, | |
{ | |
"company": "Intrepidus Group, Inc.", | |
"position": "Security Consultant", | |
"website": "", | |
"startDate": "2011-02-01", | |
"summary": "", | |
"highlights": [], | |
"endDate": "2012-06-01" | |
}, | |
{ | |
"company": "Rochester 2600", | |
"position": "Organizer", | |
"website": "", | |
"startDate": "2009-01-01", | |
"summary": "Rochester 2600 is a continuation of the group that has started decades before. Since taking it over, we've turned it into a group of people that meet monthly to discuss infosec topics and share their research.", | |
"highlights": [] | |
}, | |
{ | |
"company": "Security B-Sides Rochester", | |
"position": "Organizer", | |
"website": "", | |
"startDate": "2010-05-01", | |
"summary": "", | |
"highlights": [] | |
}, | |
{ | |
"company": "Interlock Rochester", | |
"position": "Member", | |
"website": "", | |
"startDate": "2009-01-01", | |
"summary": "Interlock is a hackerspace started by gathering members of the community and building support for building a space together. For almost a decade it has provided services and space for many members of the community.", | |
"highlights": [] | |
} | |
], | |
"education": [ | |
{ | |
"institution": "Rochester Institute of Technology", | |
"area": "Information Technology", | |
"studyType": "BS", | |
"startDate": "2000-05-01", | |
"gpa": "", | |
"courses": [], | |
"endDate": "2005-09-01" | |
} | |
], | |
"publications": [ | |
{ | |
"name": "Kubernetes: Devops vs \"Security People\"", | |
"publisher": "Security B-Sides Rochester", | |
"releaseDate": "2019-03-06", | |
"website": "https://bsidesroc.com/2019Talks/", | |
"summary": "" | |
}, | |
{ | |
"name": "K8s: Pods to root in minutes", | |
"publisher": "", | |
"releaseDate": "2016-12-31", | |
"website": "", | |
"summary": "" | |
}, | |
{ | |
"name": "Practical Tor Attacks", | |
"publisher": "", | |
"releaseDate": "2016-12-31", | |
"website": "", | |
"summary": "" | |
}, | |
{ | |
"name": "Docker Security", | |
"publisher": "", | |
"releaseDate": "2015-12-31", | |
"website": "", | |
"summary": "" | |
}, | |
{ | |
"name": "The State of WiFi Security", | |
"publisher": "", | |
"releaseDate": "2015-12-31", | |
"website": "", | |
"summary": "" | |
}, | |
{ | |
"name": "Corporate Espionage", | |
"publisher": "BSidesDetroit", | |
"releaseDate": "2014-12-31", | |
"website": "", | |
"summary": "" | |
}, | |
{ | |
"name": "Tizen: Hacking the new mobile OS", | |
"publisher": "Derbycon", | |
"releaseDate": "2013-09-27", | |
"website": "http://www.derbycon.com", | |
"summary": "" | |
}, | |
{ | |
"name": "Bringing Intelligence Back To the Hacker Community", | |
"publisher": "GRRCon", | |
"releaseDate": "2013-09-12", | |
"website": "http://www.grrcon.org", | |
"summary": "" | |
}, | |
{ | |
"name": "Jacking the Jukebox", | |
"publisher": "DEFCON Skytalks", | |
"releaseDate": "2012-07-27", | |
"website": "http://skytalks.info", | |
"summary": "[redacted]" | |
} | |
], | |
"skills": [ | |
{ | |
"name": "Containerization", | |
"level": "", | |
"keywords": [ | |
"Kubernetes", | |
"Docker", | |
"Container Runtimes", | |
"Container Breakouts", | |
"Devops Penetration Testing", | |
"Cloud Architecture Review", | |
"Linux Kernel" | |
] | |
}, | |
{ | |
"name": "Application Security", | |
"level": "", | |
"keywords": [ | |
"Web application assessments", | |
"Assisted source code review", | |
"Network protocol review" | |
] | |
}, | |
{ | |
"name": "Mobile Security", | |
"level": "", | |
"keywords": [ | |
"Android", | |
"Blackberry", | |
"iOS", | |
"Tizen" | |
] | |
}, | |
{ | |
"name": "Privacy and Anonymity", | |
"level": "", | |
"keywords": [ | |
"Tor", | |
"QubesOS", | |
"Browser fingerprinting", | |
"Anonymity attacks" | |
] | |
}, | |
{ | |
"name": "Development", | |
"level": "", | |
"keywords": [ | |
"Python", | |
"Go", | |
"Java" | |
] | |
}, | |
{ | |
"name": "Community Organization", | |
"level": "", | |
"keywords": [ | |
"Hackerspaces", | |
"Conference Organizer", | |
"Community Presenter", | |
"Trainer", | |
"Non Profits" | |
] | |
} | |
], | |
"references": [ | |
{ | |
"name": "Joe Bauser - Calero Software", | |
"reference": "At first I dreaded Mark's daily messages. I'd wake in a cold sweat wondering what news of a new world ending exploit would be sitting in my slack channel at 6am. Over time I got over the fear. Now I look forward to having my morning ruined because I know that ultimately it will make me a safer cyber citizen. Thanks Mark!" | |
} | |
], | |
"meta": { | |
"theme": "elegant" | |
} | |
} |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment