Secure Coding Instructor and Author
Secure Coding Instructor and Author at Manicode Security
|Recommendations||16 people have recommended Jim|
Join LinkedIn & access Jim's full profile
Secure Coding Instructor and Author
17+ years experience as a software engineer and architect.
8+ years experience as a secure software development educator.
Global Board Member of the Open Web Application Security Project (OWASP).
Deliver onsite secure software development education courses.
Elected to the global board of OWASP. Started two year term in January 2013. Active OWASP volunteer since 2008.
Project manager of the OWASP Cheatsheet Series, the OWASP Java Encoder Project and the OWASP HTML Sanitizer Project.
Web application secure development educator and author. Conference speaker. Product Evangelist. Remediation practice support.
Providing web application development and application security services to a wide variety of clients.
Application security instructor and editor for 1, 3 and 5 day classes including "Building and Testing Secure Web Application", "Secure Coding for Java EE" and "Application Security Management".
Performed assessments of web applications and software products using architectural review, code review and penetration testing techniques. Experience identifying vulnerabilities associated with Web applications as well as system and network software. Produced detailed reports documenting vulnerabilities and specific mitigation recommendations.
Cutting-edge website design. Application Security. Programming (Java, PHP, *ml, AJAX). Database (MySQL, Oracle, Posrgres). Software Engineering Management.
* Played a key role on the Citibank project
* Responsible for mastering and integrating the object-relational mapping tool Hibernate
* Led the design and implementation of a web service data formatting component that had strict performance requirements
* Developed a Java training package for Plug Power
Senior software engineer and director for vendor sales team. ($2 million + in annual sales) Provide Business Development support to other Departments. Perform Vendor Floorshow Manager duties at all national conventions. Train and motivate sales staff. Provide in-depth metrics on department performance. Direct report to CEO. Instructor for the LAMP (Linux, Apache, MySQL and PHP) Track.
5th-12th Grade Technology Educator, Physics Educator, Network Administrator, and Head of Technology Department for Elementary, Intermediate and High school.
Worked as independent consultant for GE, EchoStar, WebMD, Gazoontite, RateExchange, Fireman's Fund Insurance, Fortune 10 financial institutions and others.
Encryption is a common answer when data is to be secured. However there are choices and tradeoffs to be made when encrypting information. Further, a good algorithm does not guarantee secure data. We look at the use of encryption for various scenarios and discuss how to implement it correctly.
The OWASP Prevention Cheat Sheet Series was created to provide a concise collection of high value information on specific web application security topics. These cheat sheets were created by multiple application security experts and provide excellent security guidance in an easy to read format.
Iron-Clad Java: Building Secure Web Applications describes the use of several OWASP, Oracle, Apache, and Google open-source Java projects that are essential tools needed to construct a secure web application with the Java programming language. You’ll learn best practices for authentication and access control, defense for cross-site scripting and cross-site request forgery, cryptographic storage, and injection protection. Using the practical advice, best practices, and real-world examples provided in this authoritative resource, you’ll gain software engineering techniques for increasing security. Tech edited by Java Security Director, Milton Smith.
Iron-Clad Java: Building Secure Web Applications describes the use of several OWASP, Oracle, Apache, and Google open-source Java projects that are essential tools needed to construct a secure web application with the Java programming language. You’ll learn best practices for authentication and access control, defense for cross-site scripting and cross-site request forgery, cryptographic storage, and injection protection. Using the practical advice, best practices, and real-world examples provided in this authoritative resource, you’ll gain software engineering techniques for increasing security.
Tech edited by Java Security Director, Milton Smith
2011 GIAC GWEB Certified Web Application Defender
Q4 2008 Aspect Security - Call to Arms Award
Q2 2008 Aspect Security - Extreme Developer Award
2006 GIAC GSEC Certified Security Professional
2002 Sun Certified Programmer for the Java Platform
2004 CodeMagi 4 quarterly awards for excellence
1998 GE - Recognition/Achievement award
1997 GE - Customer Service Award
1997 GE - Achievement award for server development
Over 300 million professionals are already on LinkedIn. Find who you know.
Interim Chief Executive Officer at WhiteHat Security
VP Product Strategy at RiskIQ
Cofounder / COO at Aspect Security
Chairman of OWASP Global Board & Director of Product Security, Shape Security
Principle Security Engineer at Security Innovation