Personal Information
Organization / Workplace
Brisbane, Australia Australia
Occupation
Senior Information Security Analyst at AusCERT
Industry
Technology / Software / Internet
Website
www.setuptips.com
About
Senior Information Security Analyst and Unix Administrator with a background in software development and systems monitoring.
* Implemented highly available systems and application monitoring solutions that decreased business downtime and increased the quality of life for support staff.
* GIAC Certified Incident Handler (GCIH) working for National Cyber Emergency Response Team (CERT)
* Exhibits a “does whatever it takes” attitude to resolving production outages within ITIL standards and best security practices.
* Solid previous software development background leading to an infrastructure as Code DevOps /DevSecOps mindset.
Likes
(55)Graphing Nagios services with pnp4nagios
jasonholtzapple
•
14 years ago
Security Analyst Workshop - 20190314
Florian Roth
•
5 years ago
KubeCI - Cloud Native Continuous Delivery for Kubernetes
Tobias Schneck
•
5 years ago
Docker Kubernetes Istio
Araf Karsh Hamid
•
5 years ago
Tackling Terraform at Ticketmaster
Fastly
•
5 years ago
Comprehensive Terraform Training
Yevgeniy Brikman
•
7 years ago
Infrastructure as Code with Terraform
Tim Berry
•
5 years ago
Immutable AWS Deployments with Packer and Jenkins
Manish Pandit
•
6 years ago
Packer + Ansible을 이용한 AMI 생성 및 AutoScaling Group 이미지 교체 이야기
창훈 정
•
6 years ago
there is no talent shortage - Velocity 2013
Andrew Shafer
•
10 years ago
Leading A DevOps Transformation: Lessons Learned
Gene Kim
•
8 years ago
Test-Driven Infrastructure with Ansible, Test Kitchen, Serverspec and RSpec
Martin Etmajer
•
8 years ago
Ansible: How to Get More Sleep and Require Less Coffee
Sarah Z
•
9 years ago
Bus Pirate Workshop Ruxcon Hardware Hacking 2017
Tim N
•
6 years ago
Understanding and Extending Prometheus AlertManager
Lee Calcote
•
7 years ago
Digital Forensics and Incident Response (DFIR) using Docker Containers
Deep Shankar Yadav
•
7 years ago
Evading Microsoft ATA for Active Directory Domination
Nikhil Mittal
•
6 years ago
Countering Innovative Sandbox Evasion Techniques Used by Malware
Tyler Borosavage
•
6 years ago
Design in Tech Report 2017
John Maeda
•
7 years ago
Proxmox VE
Dario Tion
•
10 years ago
RT and RT for Incident Response
Best Practical Solutions
•
13 years ago
Using Canary Honeypots for Network Security Monitoring
chrissanders88
•
9 years ago
Log Monitoring Simplified - Get the best out of Graylog2 & Icinga 2
Icinga
•
9 years ago
Patch Management on Windows with Puppet
Puppet
•
8 years ago
Docker for everything
Tim Haak
•
9 years ago
DockerCon EU 2015: Docker Networking Deep Dive
Docker, Inc.
•
8 years ago
Getting the maximum out of systemd
Julien Pivotto
•
8 years ago
What's New in v2 - AnsibleFest London 2015
jimi-c
•
9 years ago
Cgroups, namespaces, and beyond: what are containers made from? (DockerCon Europe 2015)
Jérôme Petazzoni
•
8 years ago
Innovation and Architecture
Adrian Cockcroft
•
8 years ago
Personal Information
Organization / Workplace
Brisbane, Australia Australia
Occupation
Senior Information Security Analyst at AusCERT
Industry
Technology / Software / Internet
Website
www.setuptips.com
About
Senior Information Security Analyst and Unix Administrator with a background in software development and systems monitoring.
* Implemented highly available systems and application monitoring solutions that decreased business downtime and increased the quality of life for support staff.
* GIAC Certified Incident Handler (GCIH) working for National Cyber Emergency Response Team (CERT)
* Exhibits a “does whatever it takes” attitude to resolving production outages within ITIL standards and best security practices.
* Solid previous software development background leading to an infrastructure as Code DevOps /DevSecOps mindset.