Skip to content

Instantly share code, notes, and snippets.

@antitree
Last active June 27, 2019 17:02
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save antitree/ead23121db199332a80e4b9559e2a290 to your computer and use it in GitHub Desktop.
Save antitree/ead23121db199332a80e4b9559e2a290 to your computer and use it in GitHub Desktop.
{
"basics": {
"name": "Mark Manning",
"label": "Security Consultant",
"picture": "https://pbs.twimg.com/profile_images/658038562261069825/jB7pbsiE_400x400.png",
"email": "mark@antitree.com",
"phone": "",
"website": "https://www.antitree.com",
"summary": "Career security consultant with a focus on containerization technologies.",
"location": {
"address": "",
"postalCode": "",
"city": "Rochester",
"countryCode": "US",
"region": "NY"
},
"profiles": [
{
"username": "antitree",
"url": "https://twitter.com/antitree",
"network": "twitter"
}
]
},
"work": [
{
"company": "NCC Group",
"position": "Technical Director",
"website": "",
"startDate": "2019-06-01",
"summary": "",
"highlights": []
},
{
"company": "NCC Group",
"position": "Principal Security Consultant",
"website": "",
"startDate": "2015-06-01",
"endDate": "2019-06-01",
"summary": "",
"highlights": [
]
},
{
"company": "NCC Group",
"position": "Senior Security Engineer",
"website": "",
"startDate": "2015-05-01",
"summary": "",
"highlights": [],
"endDate": "2015-06-01"
},
{
"company": "Intrepidus Group, Inc.",
"position": "Sr Security Consultant",
"website": "",
"startDate": "2012-06-01",
"endDate": "2015-06-01",
"summary": "",
"highlights": []
},
{
"company": "Intrepidus Group, Inc.",
"position": "Security Consultant",
"website": "",
"startDate": "2011-02-01",
"summary": "",
"highlights": [],
"endDate": "2012-06-01"
},
{
"company": "Rochester 2600",
"position": "Organizer",
"website": "",
"startDate": "2009-01-01",
"summary": "Rochester 2600 is a continuation of the group that has started decades before. Since taking it over, we've turned it into a group of people that meet monthly to discuss infosec topics and share their research.",
"highlights": []
},
{
"company": "Security B-Sides Rochester",
"position": "Organizer",
"website": "",
"startDate": "2010-05-01",
"summary": "",
"highlights": []
},
{
"company": "Interlock Rochester",
"position": "Member",
"website": "",
"startDate": "2009-01-01",
"summary": "Interlock is a hackerspace started by gathering members of the community and building support for building a space together. For almost a decade it has provided services and space for many members of the community.",
"highlights": []
}
],
"education": [
{
"institution": "Rochester Institute of Technology",
"area": "Information Technology",
"studyType": "BS",
"startDate": "2000-05-01",
"gpa": "",
"courses": [],
"endDate": "2005-09-01"
}
],
"publications": [
{
"name": "Kubernetes: Devops vs \"Security People\"",
"publisher": "Security B-Sides Rochester",
"releaseDate": "2019-03-06",
"website": "https://bsidesroc.com/2019Talks/",
"summary": ""
},
{
"name": "K8s: Pods to root in minutes",
"publisher": "",
"releaseDate": "2016-12-31",
"website": "",
"summary": ""
},
{
"name": "Practical Tor Attacks",
"publisher": "",
"releaseDate": "2016-12-31",
"website": "",
"summary": ""
},
{
"name": "Docker Security",
"publisher": "",
"releaseDate": "2015-12-31",
"website": "",
"summary": ""
},
{
"name": "The State of WiFi Security",
"publisher": "",
"releaseDate": "2015-12-31",
"website": "",
"summary": ""
},
{
"name": "Corporate Espionage",
"publisher": "BSidesDetroit",
"releaseDate": "2014-12-31",
"website": "",
"summary": ""
},
{
"name": "Tizen: Hacking the new mobile OS",
"publisher": "Derbycon",
"releaseDate": "2013-09-27",
"website": "http://www.derbycon.com",
"summary": ""
},
{
"name": "Bringing Intelligence Back To the Hacker Community",
"publisher": "GRRCon",
"releaseDate": "2013-09-12",
"website": "http://www.grrcon.org",
"summary": ""
},
{
"name": "Jacking the Jukebox",
"publisher": "DEFCON Skytalks",
"releaseDate": "2012-07-27",
"website": "http://skytalks.info",
"summary": "[redacted]"
}
],
"skills": [
{
"name": "Containerization",
"level": "",
"keywords": [
"Kubernetes",
"Docker",
"Container Runtimes",
"Container Breakouts",
"Devops Penetration Testing",
"Cloud Architecture Review",
"Linux Kernel"
]
},
{
"name": "Application Security",
"level": "",
"keywords": [
"Web application assessments",
"Assisted source code review",
"Network protocol review"
]
},
{
"name": "Mobile Security",
"level": "",
"keywords": [
"Android",
"Blackberry",
"iOS",
"Tizen"
]
},
{
"name": "Privacy and Anonymity",
"level": "",
"keywords": [
"Tor",
"QubesOS",
"Browser fingerprinting",
"Anonymity attacks"
]
},
{
"name": "Development",
"level": "",
"keywords": [
"Python",
"Go",
"Java"
]
},
{
"name": "Community Organization",
"level": "",
"keywords": [
"Hackerspaces",
"Conference Organizer",
"Community Presenter",
"Trainer",
"Non Profits"
]
}
],
"references": [
{
"name": "Joe Bauser - Calero Software",
"reference": "At first I dreaded Mark's daily messages. I'd wake in a cold sweat wondering what news of a new world ending exploit would be sitting in my slack channel at 6am. Over time I got over the fear. Now I look forward to having my morning ruined because I know that ultimately it will make me a safer cyber citizen. Thanks Mark!"
}
],
"meta": {
"theme": "elegant"
}
}
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment