Skip to content

Instantly share code, notes, and snippets.

@evilmog
Last active April 19, 2023 16:40
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save evilmog/8bf4d7b268fb7e46b300580e36762806 to your computer and use it in GitHub Desktop.
Save evilmog/8bf4d7b268fb7e46b300580e36762806 to your computer and use it in GitHub Desktop.
{
"$schema": "https://raw.githubusercontent.com/jsonresume/resume-schema/v1.0.0/schema.json",
"basics": {
"name": "Dustin Heywood",
"label": "Leader, Hacker, Password Specialist, EvilMog from Team Hashcat, Network Ninja, Conference Speaker, Researcher. Hacker Jeopardy World Champion.",
"email": "dustin.heywood@gmail.com",
"phone": "403-850-0550",
"url": "https://www.linkedin.com/in/evilmog/",
"summary": "Dustin Heywood, also known as Evil Mog in the cyber-security industry, is a highly skilled and experienced cybersecurity professional specializing in penetration testing, red teaming, vulnerability analysis, and password security research. With a solid background in security research, exploit development, and system administration across both Linux and Windows platforms, Dustin excels at identifying and mitigating potential threats to ensure the safety of critical systems and networks. Holding notable certifications such as CISSP, ISP, OSCP, and OSCE, EvilMog is also an active member of Team Hashcat and a recognized speaker at security conferences. His numerous accomplishments include receiving multiple prestigious Uber/Root/Black Badges (Lifetime Entry), which further demonstrate his commitment and expertise in the field of cybersecurity.",
"location": {
"countryCode": "US",
"address": "Canada"
},
"profiles": [
{
"network": "LinkedIn",
"username": "evilmog",
"url": "https://www.linkedin.com/in/evilmog/"
},
{
"network": "Twitter",
"username": "Evil_Mog",
"url": "https://twitter.com/Evil_Mog"
}
]
},
"work": [
{
"name": "IBM",
"position": "Chief Architect of X-Force, Senior Technical Staff Member (STSM), Hacker",
"startDate": "2021-12-31",
"highlights": [],
"summary": "Architect, Implement, and Maintain Hybrid Multi-Cloud Infrastructure. Perform Network Penetration Testing, Research, and Present at Conferences. Mentor Staff, Manage Multi-National Teams and Functions. Design and Implement Proof of Concepts. Referenced in multiple academic papers.",
"url": "https://www.ibm.com/thought-leadership/new-creators/dustin-heywood/",
"location": "Calgary, Alberta, Canada"
},
{
"name": "IBM",
"position": "X-Force Red Hacker, Senior Managing Consultant, and Infrastructure Manager",
"startDate": "2017-04-30",
"endDate": "2021-12-31",
"highlights": [],
"summary": "Architect, Implement, and Maintain Hybrid Multi-Cloud Infrastructure. Perform Network Penetration Testing, Research, and Present at Conferences. Mentor Staff, Manage Multi-National Teams and Functions. Design and Implement Proof of Concepts.",
"url": "https://www.ibm.com/x-force/team",
"location": "Calgary, Canada Area"
},
{
"name": "ATB Financial",
"position": "Security Assurance Manager (Offensive Security)",
"startDate": "2014-04-30",
"endDate": "2017-04-30",
"highlights": [],
"summary": "Managed Penetration Testing, Vulnerability Assessment, and Red Teaming with Internal & External Resources. Performed password security research as a part of team hashcat. Architected, Built and Operated a GPU research cluster. Mentioned in multiple Academic Papers. Managed Firewalls, Network Admission Control, Multi Tier PKI, Venafi Security Director",
"url": "https://www.linkedin.com/company/atbfinancial/",
"location": "Calgary, Canada Area"
},
{
"name": "ATB Financial",
"position": "Information Security Manager (Security Operations)",
"startDate": "2011-04-30",
"endDate": "2014-04-30",
"highlights": [],
"summary": "Performed Penetration Testing, Red Team Engagements and Social Engineering Campaigns. Architected, Designed, Built & Maintained GPU Research Cluster. Architected, Designed, Built & Maintained CPU Research Cluster. Performed password security research as a part of Team Hashcat. Developed generated2.rule in hashcat https://hashcat.net/forum/thread-3323-post-19181.html. Managed Checkpoint Firewalls, Bluecoat Packetshapers, Cisco Secure ACS. Managed IBM CCA HSM's. Developed Custom Identity Management Platform for deprovisioning and provisioning user accounts",
"url": "https://www.linkedin.com/company/atbfinancial/",
"location": "Calgary, Canada Area"
},
{
"name": "ATB Financial",
"position": "Information Security Analyst",
"startDate": "2009-04-30",
"endDate": "2011-04-30",
"highlights": [],
"summary": "Managed SIEM, Packetshapers, HSM's, Firewalls. Managed Incident Response. Designed, Built, Operated & Maintained GPU & CPU Compute Clusters for Password Research. Beta Tested all new oclHashcat builds",
"url": "https://www.linkedin.com/company/atbfinancial/",
"location": "Calgary, Canada Area"
},
{
"name": "Network Innovations",
"position": "Network Architect",
"startDate": "2007-12-31",
"endDate": "2008-12-31",
"highlights": [],
"summary": "Managed Morale Voice & Internet Services Network. Designed, Built, Deployed, Operated, Maintained & Decommissioned Microwave, VSAT WAN's in Afghanistan. Managed Packetshapers, Multi-Site Wireless, Routers & Switches. Performed field support of all equipment including at Forward Operating Bases. Performed Penetration Testing & Vulnerability Management",
"url": "https://www.linkedin.com/company/network-innovations/",
"location": "Afghanistan"
},
{
"name": "CANA Construction Ltd.",
"position": "Network Administrator",
"startDate": "2007-10-31",
"endDate": "2007-12-31",
"highlights": [],
"summary": "Managed Servers, LAN & WAN for regional construction company.",
"url": "https://www.linkedin.com/company/cana-group-of-companies/",
"location": "Calgary, Canada Area"
},
{
"name": "Conquest Technologies",
"position": "Network Installer",
"startDate": "2007-04-30",
"endDate": "2007-09-30",
"highlights": [],
"summary": "Performed Switch Refresh for large retail chain. Managed logistics for refresh project.",
"url": "",
"location": "Western Canada"
},
{
"name": "IBM Global Services",
"position": "Global Network Management Centre - Network Analyst",
"startDate": "2006-09-30",
"endDate": "2007-05-31",
"highlights": [],
"summary": "Managed Cisco Routers, Switches, Firewalls. Managed Cisco Secure ACS (TACACS & RADIUS).",
"url": "https://www.linkedin.com/company/ibm/",
"location": "Calgary, Canada Area"
}
],
"volunteer": [{
"organization": "South-East Collegiate Cyber Defense Competition",
"position": "Red Team Lead (Retired), Cloud Attack Team",
"url": "https://cyberinstitute.kennesaw.edu/seccdc/index.php",
"startDate": "2019-03-01",
"endDate": "2023-04-01",
"summary": "CCDC is a defensive security competition designed to measure the ability of college students to protect and secure the systems of a hypothetical company. Students compete against teams from other universities by proving they can defend against professional red teams. Acted as a Red Team Member, Red Team Lead, Build Team, and now Cloud Attack Team Member.",
"highlights": [
"2019-2020, Red Team",
"2021, Red Team Lead",
"2022, Build Team",
"2023, Cloud Attack Team"
]
}],
"education": [
{
"institution": "Southern Alberta Institute of Technology",
"area": "",
"studyType": "Network Technician Fast Track Certificate",
"endDate": "2006-12-31",
"score": ""
}
],
"awards": [
{
"title": "Red Badge",
"date": "2023-03-31",
"awarder": "CypherCon",
"summary": "Awarded a Red Badge for cracking the challenge safe through manipulation at the largest tech conference in Wisconsin. Red Badges grant free entry for life and are awarded for winning challenging technical contests."
},
{
"title": "Queen Elizabeth Platinum Jubilee Medal",
"date": "2022-01-25",
"awarder": "Government of Alberta",
"summary": "The Queen Elizabeth II Platinum Jubilee Recognition Act was introduced in the Legislature of Alberta on 22 February 2022 and received royal assent on 24 March of the same year. The act included the creation of a medal to be awarded to 7,000 Albertans who have made significant contributions to society. Three minimum criteria were set for the medal recipients; the nominee must: be a Canadian citizen or permanent resident with a tangible link to Alberta at the time the medal is granted; have made a significant contribution to Canada, Alberta, or to a particular Alberta region or community; and have been alive on 6 February 2022."
},
{
"title": "Root Badge (Gold Badge)",
"date": "2021-04-30",
"awarder": "THOTCON (Chicago Security Conference)",
"summary": "Root Badge, equivalent to an Uber Badge which grants free entry to the conference for life. These are awarded for service to the community, delivering a keynote or winning a contest of skill.\n\nFirst Badge was won in an auction for charity to support the THOTCON 501(c)(3)\n\nSecond Badge was awarded for winning Hacker Jeopardy at THOTCON in Fall of 2021."
},
{
"title": "Uber Badge (Black Badge)",
"date": "2019-08-31",
"awarder": "DEFCON Security Conference",
"summary": "Awarded an Uber Badge (Black Badge) to DEFCON which grants free entry for life to the conference.\n\nBadge was awarded for winning the Hacker Jeopardy World Championships at DEFCON 27."
},
{
"title": "Black Badge",
"date": "2018-09-30",
"awarder": "Derbycon",
"summary": "Awarded a Black Badge at Derbycon 8, this grants free entry to the conference plus conferences in the Reciprocity Agreement such as Nolacon, Grrcon, Texas Cyber and Wild West Hacking Fest.\n\nBadge was awarded for service to the conference over 8 years, including volunteering, donations, and fund raising for charities."
},
{
"title": "Black Badge",
"date": "2016-08-31",
"awarder": "Skydog Con",
"summary": "Awarded a Black Badge to SkydogCon which granted free entry for life to the conference plus other conferences in the reciprocity agreement.\n\nBadge was awarded for service to the conference through volunteering and donations."
},
{
"title": "General Service Medal - South-West Asia (with 210 day rotation bar)",
"date": "2008-11-30",
"awarder": "Government of Canada",
"summary": "The General Service Medal (GSM) is awarded to Canadian citizens other than members of the Canadian Forces who are deployed outside Canada, either inside or outside a theatre of operations, and working with the CF to provide direct support, on a full-time basis, to operations in the presence of an armed enemy."
}
],
"certificates": [
{
"name": "Certified Information Systems Security Professional (CISSP)",
"issuer": "(ISC)²",
"startDate": "2010-09-30"
},
{
"name": "Offensive Security Certified Professional (OSCP)",
"issuer": "Offensive Security",
"url": "https://www.youracclaim.com/badges/afe19c08-6b99-401d-957a-01c9c1ae1e86/linked_in_profile"
},
{
"name": "Offensive Security Wireless Professional (OSWP)",
"issuer": "Offensive Security",
"url": "https://www.youracclaim.com/badges/be0ab4dd-b43c-49e2-82f8-9be10d24595c/linked_in_profile"
},
{
"name": "Nexpose Certified Administrator",
"issuer": "Rapid7"
},
{
"name": "Offensive Security Certified Expert (OSCE)",
"issuer": "Offensive Security",
"startDate": "2018-09-30",
"url": "https://www.youracclaim.com/badges/a210b1b4-d49b-44b3-a5a9-92ab50be9359/linked_in_profile"
},
{
"name": "CompTIA Security+ Certification",
"issuer": "CompTIA",
"startDate": "2010-10-31",
"url": "https://www.youracclaim.com/badges/676358f4-2a3f-4c98-b78f-9ef756b37e54/linked_in_profile"
},
{
"name": "CompTIA Network+ Certification",
"issuer": "CompTIA",
"startDate": "2010-10-31",
"url": "https://www.youracclaim.com/badges/e5eca1eb-4883-4add-9f1d-c3291c5cb29c/linked_in_profile"
},
{
"name": "IBM Virtual Collaborator",
"issuer": "IBM",
"startDate": "2020-05-31",
"url": "https://www.youracclaim.com/badges/2eebf17f-2eb8-42f9-a0e1-35826a0289cb/linked_in_profile"
},
{
"name": "Think Like a Hacker",
"issuer": "IBM",
"startDate": "2020-05-31",
"url": "https://www.youracclaim.com/badges/37ab0654-276b-415d-b575-e544cb760a89/linked_in_profile"
},
{
"name": "Information Systems Professional",
"issuer": "CIPS (Canada’s Association of I.T. Professionals)",
"endDate": "2023-01-31",
"startDate": "2021-02-28",
"url": "https://www.credential.net/ec321ff5-ce48-4e0f-82a3-eaf3e695eb5a"
}
],
"publications": [],
"skills": [
{
"name": "Penetration Testing",
"level": "",
"keywords": ["Kali", "Password Cracking", "Linux", "Adversarial Simulation", "Hashcat", "SAP"]
},
{
"name": "Leadership",
"level": "",
"keywords": ["Masterful Leadership", "Function Management", "Multi-National", "Cross-Functional"]
},
{
"name": "Cloud",
"level": "",
"keywords": ["IBM Cloud", "Azure", "AWS"]
},
{
"name": "Network Administration",
"level": "",
"keywords": ["TACACS", "RADIUS", "Cisco", "IBM", "OSPF", "BGP"]
},
{
"name": "Shell Scripting",
"level": "",
"keywords": ["BASH"]
},
{
"name": "Red Teaming",
"level": "",
"keywords": []
},
{
"name": "IT Management",
"level": "",
"keywords": ["IT Service management", "Change Management", "Project Management", "Architecture", "Automation", "Deployment"]
},
{
"name": "Firewalls",
"level": "",
"keywords": ["Palo Alto", "Checkpoint", "Cisco", "ASA", "IPS"]
},
{
"name": "Security Information and Event Management (SIEM)",
"level": "",
"keywords": []
},
{
"name": "Active Directory",
"level": "",
"keywords": ["Penetration Testing", "Design", "ADCS", "ADFS"]
},
{
"name": "Vulnerability Management",
"level": "",
"keywords": ["Nessus", "Qualys", "Rapid7 Nexpose"]
},
{
"name": "Virtualization",
"level": "",
"keywords": ["VMWare", "vSphere"]
},
{
"name": "Security Policy",
"level": "",
"keywords": ["Information Security", "Cyber-Security", "Security Design", "Security"]
},
{
"name": "Network Design",
"level": "",
"keywords": ["Network Architecture", "Routing", "VPN", "ZTNA", "Zero-Trust", "Enteprise Architecture", "Load Balancers"]
},
{
"name": "PKI",
"level": "",
"keywords": ["HSM", "Microsoft PKI", "ADCS"]
},
{
"name": "Identity Management",
"level": "",
"keywords": ["IAM", "Certificates"]
},
{
"name": "System Deployment",
"level": "",
"keywords": ["Ansible"]
}
],
"languages": [
{
"language": "English",
"fluency": "Native Speaker"
}
],
"interests": [],
"projects": [],
"meta": {
"version": "v1.0.0",
"canonical": "https://github.com/jsonresume/resume-schema/blob/v1.0.0/schema.json",
"theme": "elegant"
}
}
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment