competitive analysis security risk compliance tanium

What: One of many content to help customers make better, informed decisions

Why: To utilize my skills and knowledge in the industry by publishing impactful pieces of content. This not only helped me improve myself, but it also empowered others on our team so that we can work together more effectively for future projects.

html css javascript svelte tailwindcss netlify

What: Website for a family restaurant that specializes in the most delicious Cambodian cuisine

Why: I'm looking to build my portfolio with more landing pages and showcases of work that was done for different clients.

docker bash bitlocker postgresql node windows jenkins

What: Tests your application against different versions of Postgres

Why: I needed a way to test for regression as we followed a rapid release cycle and wanted the best possible experience with each patch. This is what led me to create integration verification tests (IVT), which were executed alongside traditional smoke tests; this provided early warning signs before any issues arise within installed products themselves.

docker bash mkbom make xmlstarlet linux osx

What: Repackaging OS X apps with customizations

Why: With Docker, I was able to streamline the process for generating OS X installers that is much easier and faster than going through Packages. This meant teams were customizing packages with minimal effort which also leads into more frequent deploys with clients.

docker taiko windows async artifactory

What: Automatically downloads Application Compatibility Toolkit files for each operating system for Enterprise Win10 readiness

Why: When it comes to building the compatibility checker, Microsoft makes finding the right files difficult. I created a tool that made things easier by providing links and updates in one place for whichever OS build was needed to be downloaded at once.

python rest postman api

What: SDK contribution to interface with role-based access control (RBAC)

Why: By abstracting away from RBAC, my clients were able to more freely integrate with the platform. The API library enabled them by taking care of administrative privileges and other complexity involved in managing user accounts.

rest postman api

What: Automate API calls in different environments

Why: Automating API testing is key for finding bugs before release. When one version breaks, you'll know exactly where to start revising so that your app can continue functioning as intended instead of having people rely on assumptions about what might have gone wrong due simply because no log data was available.

cypress taiko puppeteer testcafe postman api

What: Use a web framework which provides API for interactivity with browsers

Why: The transition from Angular to React created challenges for me since there is no way we could do unit testing alone. To make sure that our product works as intended, behavioral tests and scenarios on how things should work had to be implemented.

virtualbox packer bash powershell node

What: Create identical machine images for multiple platforms from a single json source configuration

Why: The challenge I faced was how to make sure all my tests returned the same value no matter what operating system they ran on.

auditd linux event log cgroups filebeat

What: File integrity monitoring on low compute resources

Why: Integrity monitoring is a fundamental part of systems management. When you have low resources, it becomes difficult to monitor everything that needs attention.

log4j python vbscript

What: Integrate vulnerabilities catalog from CISA

Why: The client wanted to ensure that they met their service level agreement for each vulnerability scanned.

usmt smb data backup disaster recovery vss

What: User State Migration Tool for remote users

Why: Clients won't always be at their desk and the computers they're using can become failed or disconnected. I devise a way to capture file layers so that you can easily migrate data when needed.

ansible vault linux api

What: Bootstrap servers using secrets from Vault

Why: Hackers are always looking for ways into your database and if you have leaky users or processes that can be compromised by this kind of attack, then it's time consider implementing restrictions on source hosts.