SlideShare a Scribd company logo
5511 Lucky Lane, Wichita Falls, Tx. 76306940-855-3355C.Brian.Whitelaw@Gmail.com
Brian Whitelaw
Objective
An ideal job for me would be to try to hack security systems in order to find weaknesses in the
system. Then I would create a superior program to eliminate the possibility of another security
breach.
Professional Accomplishments
Connectivity
 Studied various network and connection methodologies
 Networking with Linux and Windows based OSs
 Using CLIs
Object Oriented Programming
 Learned C++
 Learned OOP structure and procedure
 Learned Java
 Learned VB
Structured Analysis & Design
 System Development Life Cycle
 Data Flow Diagrams
 Decomposistion Diagrams
 Context Flow Diagrams
Logic and Design
 How to read and write pseudocode
 How to create and understand flowcharts
 How to read UMLs
 Understanding the IPOlogic structure
Employment History
5May97 to Present Cable Splicing Technician At&t, Wichita Falls, Texas
Education
December 2016 B.S. Computer Information
Systems >> Cyber Security
DeVry University, Irving, Texas
References
References are available on request.

More Related Content

Viewers also liked

Plantas de tratamiento Aclara periódico corporativo Jun 02 13
Plantas de tratamiento Aclara periódico corporativo  Jun 02 13Plantas de tratamiento Aclara periódico corporativo  Jun 02 13
Plantas de tratamiento Aclara periódico corporativo Jun 02 13
AclaraPTARs
 
Probability And Probability Distributions
Probability And Probability Distributions Probability And Probability Distributions
Probability And Probability Distributions
Sahil Nagpal
 
Trabajo Ciencias de los Materiales
Trabajo Ciencias de los MaterialesTrabajo Ciencias de los Materiales
Trabajo Ciencias de los Materiales
Alfonso Castellanos
 
Artículo diseño curricular(1)
Artículo diseño curricular(1)Artículo diseño curricular(1)
Artículo diseño curricular(1)
Mario Zárate
 
Dementia Friendly Projects
Dementia Friendly ProjectsDementia Friendly Projects
Dementia Friendly Projects
Health Innovation Wessex
 
Inherited IRA Not Exempt from Bankruptcy Estate, Supreme Court Rules
Inherited IRA Not Exempt from Bankruptcy Estate, Supreme Court RulesInherited IRA Not Exempt from Bankruptcy Estate, Supreme Court Rules
Inherited IRA Not Exempt from Bankruptcy Estate, Supreme Court Rules
CBIZ, Inc.
 
Digital Inbound Marketing for the Financial Advisor
Digital Inbound Marketing for the Financial AdvisorDigital Inbound Marketing for the Financial Advisor
Digital Inbound Marketing for the Financial Advisor
Craig Faulkner
 
Actividades 2
Actividades 2Actividades 2
Actividades 2
rosario1704
 
HASKA Security & Steel Door Company
HASKA Security & Steel Door CompanyHASKA Security & Steel Door Company
HASKA Security & Steel Door Company
Cesur Çulha
 
diapositivas de video
diapositivas de videodiapositivas de video
diapositivas de video
nestor2004
 
Telemetro y Spredfast logran histórica integración de redes sociales en la co...
Telemetro y Spredfast logran histórica integración de redes sociales en la co...Telemetro y Spredfast logran histórica integración de redes sociales en la co...
Telemetro y Spredfast logran histórica integración de redes sociales en la co...
Spredfast
 
преступление и наказание
преступление и наказаниепреступление и наказание
преступление и наказание
SnezhanaP10
 
Distributed Crawler Service architecture presentation
Distributed Crawler Service architecture presentationDistributed Crawler Service architecture presentation
Distributed Crawler Service architecture presentation
Gennady Baranov
 
Intermediario electronico
Intermediario electronicoIntermediario electronico
Intermediario electronico
claudiacte
 

Viewers also liked (20)

Plantas de tratamiento Aclara periódico corporativo Jun 02 13
Plantas de tratamiento Aclara periódico corporativo  Jun 02 13Plantas de tratamiento Aclara periódico corporativo  Jun 02 13
Plantas de tratamiento Aclara periódico corporativo Jun 02 13
 
המלצה פניקס.יצחק בלייר
המלצה פניקס.יצחק בליירהמלצה פניקס.יצחק בלייר
המלצה פניקס.יצחק בלייר
 
Probability And Probability Distributions
Probability And Probability Distributions Probability And Probability Distributions
Probability And Probability Distributions
 
Trabajo Ciencias de los Materiales
Trabajo Ciencias de los MaterialesTrabajo Ciencias de los Materiales
Trabajo Ciencias de los Materiales
 
Artículo diseño curricular(1)
Artículo diseño curricular(1)Artículo diseño curricular(1)
Artículo diseño curricular(1)
 
Dementia Friendly Projects
Dementia Friendly ProjectsDementia Friendly Projects
Dementia Friendly Projects
 
Inherited IRA Not Exempt from Bankruptcy Estate, Supreme Court Rules
Inherited IRA Not Exempt from Bankruptcy Estate, Supreme Court RulesInherited IRA Not Exempt from Bankruptcy Estate, Supreme Court Rules
Inherited IRA Not Exempt from Bankruptcy Estate, Supreme Court Rules
 
Tifaifai
TifaifaiTifaifai
Tifaifai
 
Digital Inbound Marketing for the Financial Advisor
Digital Inbound Marketing for the Financial AdvisorDigital Inbound Marketing for the Financial Advisor
Digital Inbound Marketing for the Financial Advisor
 
Guaianas 094
Guaianas 094Guaianas 094
Guaianas 094
 
Actividades 2
Actividades 2Actividades 2
Actividades 2
 
HASKA Security & Steel Door Company
HASKA Security & Steel Door CompanyHASKA Security & Steel Door Company
HASKA Security & Steel Door Company
 
Folha 211
Folha 211Folha 211
Folha 211
 
diapositivas de video
diapositivas de videodiapositivas de video
diapositivas de video
 
Poblacion
PoblacionPoblacion
Poblacion
 
cooking
cookingcooking
cooking
 
Telemetro y Spredfast logran histórica integración de redes sociales en la co...
Telemetro y Spredfast logran histórica integración de redes sociales en la co...Telemetro y Spredfast logran histórica integración de redes sociales en la co...
Telemetro y Spredfast logran histórica integración de redes sociales en la co...
 
преступление и наказание
преступление и наказаниепреступление и наказание
преступление и наказание
 
Distributed Crawler Service architecture presentation
Distributed Crawler Service architecture presentationDistributed Crawler Service architecture presentation
Distributed Crawler Service architecture presentation
 
Intermediario electronico
Intermediario electronicoIntermediario electronico
Intermediario electronico
 

Similar to Whitelaw_CV

Resume, linkedin
Resume, linkedinResume, linkedin
Resume, linkedinAlex Wier
 
Why do women love chasing down bad guys?
Why do women love chasing down bad guys? Why do women love chasing down bad guys?
Why do women love chasing down bad guys?
SITA
 
Secure SDLC for Software
Secure SDLC for Software Secure SDLC for Software
Secure SDLC for Software
Shreeraj Shah
 
AI Security : Machine Learning, Deep Learning and Computer Vision Security
AI Security : Machine Learning, Deep Learning and Computer Vision SecurityAI Security : Machine Learning, Deep Learning and Computer Vision Security
AI Security : Machine Learning, Deep Learning and Computer Vision Security
Cihan Özhan
 
[DSC Europe 23][AI:CSI] Goran Gvozden Improving Cybersecurity Posture with an...
[DSC Europe 23][AI:CSI] Goran Gvozden Improving Cybersecurity Posture with an...[DSC Europe 23][AI:CSI] Goran Gvozden Improving Cybersecurity Posture with an...
[DSC Europe 23][AI:CSI] Goran Gvozden Improving Cybersecurity Posture with an...
DataScienceConferenc1
 
ROBERT KENNEY RESUME 2015
ROBERT KENNEY RESUME 2015ROBERT KENNEY RESUME 2015
ROBERT KENNEY RESUME 2015Robert Kenney
 
LNK Payload exploit in windows
LNK Payload exploit in windowsLNK Payload exploit in windows
LNK Payload exploit in windows
ssuser1d7287
 
Career in Software Development
Career in Software Development  Career in Software Development
Career in Software Development
neosphere
 
Noshir Contractor's view on the future of Linked Data
Noshir Contractor's view on the future of Linked DataNoshir Contractor's view on the future of Linked Data
Noshir Contractor's view on the future of Linked Data
Carlos Pedrinaci
 
Detection of webshells in compromised perimeter assets using ML algorithms
Detection of webshells in compromised perimeter assets using ML algorithms Detection of webshells in compromised perimeter assets using ML algorithms
Detection of webshells in compromised perimeter assets using ML algorithms
Rod Soto
 
Handout1o
Handout1oHandout1o
Handout1o
Shahbaz Sidhu
 
CV - DCHATTERJI
CV - DCHATTERJICV - DCHATTERJI
CV - DCHATTERJI
Debarshi Chatterji
 
Residency ResearchISOL 536 Security Architecture and Design.docx
Residency ResearchISOL 536 Security Architecture and Design.docxResidency ResearchISOL 536 Security Architecture and Design.docx
Residency ResearchISOL 536 Security Architecture and Design.docx
brittneyj3
 
Cybersecurity-NSIC.pdf
Cybersecurity-NSIC.pdfCybersecurity-NSIC.pdf
Cybersecurity-NSIC.pdf
20CM040ChilakaniMahe
 
Sania: Syntactic and Semantic Analysis for Automated Testing against SQL Inje...
Sania: Syntactic and Semantic Analysis for Automated Testing against SQL Inje...Sania: Syntactic and Semantic Analysis for Automated Testing against SQL Inje...
Sania: Syntactic and Semantic Analysis for Automated Testing against SQL Inje...
Yuji Kosuga
 
DevBeat 2013 - Developer-first Security
DevBeat 2013 - Developer-first SecurityDevBeat 2013 - Developer-first Security
DevBeat 2013 - Developer-first Security
Coverity
 
Software Architecture - Principles, Patterns and Practices - OSI Days - 2017
Software Architecture - Principles, Patterns and Practices - OSI Days - 2017Software Architecture - Principles, Patterns and Practices - OSI Days - 2017
Software Architecture - Principles, Patterns and Practices - OSI Days - 2017
CodeOps Technologies LLP
 
Software Analytics: Towards Software Mining that Matters (2014)
Software Analytics:Towards Software Mining that Matters (2014)Software Analytics:Towards Software Mining that Matters (2014)
Software Analytics: Towards Software Mining that Matters (2014)
Tao Xie
 
Resume - CV
Resume - CVResume - CV
Resume - CV
Vladimir_1977
 

Similar to Whitelaw_CV (20)

Resume, linkedin
Resume, linkedinResume, linkedin
Resume, linkedin
 
Why do women love chasing down bad guys?
Why do women love chasing down bad guys? Why do women love chasing down bad guys?
Why do women love chasing down bad guys?
 
Resume
ResumeResume
Resume
 
Secure SDLC for Software
Secure SDLC for Software Secure SDLC for Software
Secure SDLC for Software
 
AI Security : Machine Learning, Deep Learning and Computer Vision Security
AI Security : Machine Learning, Deep Learning and Computer Vision SecurityAI Security : Machine Learning, Deep Learning and Computer Vision Security
AI Security : Machine Learning, Deep Learning and Computer Vision Security
 
[DSC Europe 23][AI:CSI] Goran Gvozden Improving Cybersecurity Posture with an...
[DSC Europe 23][AI:CSI] Goran Gvozden Improving Cybersecurity Posture with an...[DSC Europe 23][AI:CSI] Goran Gvozden Improving Cybersecurity Posture with an...
[DSC Europe 23][AI:CSI] Goran Gvozden Improving Cybersecurity Posture with an...
 
ROBERT KENNEY RESUME 2015
ROBERT KENNEY RESUME 2015ROBERT KENNEY RESUME 2015
ROBERT KENNEY RESUME 2015
 
LNK Payload exploit in windows
LNK Payload exploit in windowsLNK Payload exploit in windows
LNK Payload exploit in windows
 
Career in Software Development
Career in Software Development  Career in Software Development
Career in Software Development
 
Noshir Contractor's view on the future of Linked Data
Noshir Contractor's view on the future of Linked DataNoshir Contractor's view on the future of Linked Data
Noshir Contractor's view on the future of Linked Data
 
Detection of webshells in compromised perimeter assets using ML algorithms
Detection of webshells in compromised perimeter assets using ML algorithms Detection of webshells in compromised perimeter assets using ML algorithms
Detection of webshells in compromised perimeter assets using ML algorithms
 
Handout1o
Handout1oHandout1o
Handout1o
 
CV - DCHATTERJI
CV - DCHATTERJICV - DCHATTERJI
CV - DCHATTERJI
 
Residency ResearchISOL 536 Security Architecture and Design.docx
Residency ResearchISOL 536 Security Architecture and Design.docxResidency ResearchISOL 536 Security Architecture and Design.docx
Residency ResearchISOL 536 Security Architecture and Design.docx
 
Cybersecurity-NSIC.pdf
Cybersecurity-NSIC.pdfCybersecurity-NSIC.pdf
Cybersecurity-NSIC.pdf
 
Sania: Syntactic and Semantic Analysis for Automated Testing against SQL Inje...
Sania: Syntactic and Semantic Analysis for Automated Testing against SQL Inje...Sania: Syntactic and Semantic Analysis for Automated Testing against SQL Inje...
Sania: Syntactic and Semantic Analysis for Automated Testing against SQL Inje...
 
DevBeat 2013 - Developer-first Security
DevBeat 2013 - Developer-first SecurityDevBeat 2013 - Developer-first Security
DevBeat 2013 - Developer-first Security
 
Software Architecture - Principles, Patterns and Practices - OSI Days - 2017
Software Architecture - Principles, Patterns and Practices - OSI Days - 2017Software Architecture - Principles, Patterns and Practices - OSI Days - 2017
Software Architecture - Principles, Patterns and Practices - OSI Days - 2017
 
Software Analytics: Towards Software Mining that Matters (2014)
Software Analytics:Towards Software Mining that Matters (2014)Software Analytics:Towards Software Mining that Matters (2014)
Software Analytics: Towards Software Mining that Matters (2014)
 
Resume - CV
Resume - CVResume - CV
Resume - CV
 

Whitelaw_CV

  • 1. 5511 Lucky Lane, Wichita Falls, Tx. 76306940-855-3355C.Brian.Whitelaw@Gmail.com Brian Whitelaw Objective An ideal job for me would be to try to hack security systems in order to find weaknesses in the system. Then I would create a superior program to eliminate the possibility of another security breach. Professional Accomplishments Connectivity  Studied various network and connection methodologies  Networking with Linux and Windows based OSs  Using CLIs Object Oriented Programming  Learned C++  Learned OOP structure and procedure  Learned Java  Learned VB Structured Analysis & Design  System Development Life Cycle  Data Flow Diagrams  Decomposistion Diagrams  Context Flow Diagrams Logic and Design  How to read and write pseudocode  How to create and understand flowcharts  How to read UMLs  Understanding the IPOlogic structure Employment History 5May97 to Present Cable Splicing Technician At&t, Wichita Falls, Texas Education December 2016 B.S. Computer Information Systems >> Cyber Security DeVry University, Irving, Texas References References are available on request.