This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "User:Jason Haddix"

From OWASP
Jump to: navigation, search
m (Creating user page with biography of new user.)
 
 
Line 1: Line 1:
Jason Haddix is a security researcher and consultant at www.securityaegis.com. Jason is also the Director of Penetration Testing at Hewlett Packard and Fortify Software. Jason performs and trains internal candidates on mobile penetration testing, black box web application auditing, network/infrastructural security assessments, cursory mainframe security analysis, cloud architecture reviews, wireless  
+
Jason Haddix is a security researcher and consultant. Jason is the former the Director of Penetration Testing at Hewlett-Packard and Fortify Software and now works as the Head of Trust and Security at Bugcrowd. Jason performs and trains internal candidates on mobile penetration testing, black box web application auditing, network/infrastructural security assessments, cursory mainframe security analysis, cloud architecture reviews, wireless  
 
network assessment, binary reverse engineering, and static analysis. He is also a semi-regular player on the capture the flag team Shellphish, an academic hacking group based out of the University of California, Santa Barbara.
 
network assessment, binary reverse engineering, and static analysis. He is also a semi-regular player on the capture the flag team Shellphish, an academic hacking group based out of the University of California, Santa Barbara.

Latest revision as of 17:27, 10 December 2016

Jason Haddix is a security researcher and consultant. Jason is the former the Director of Penetration Testing at Hewlett-Packard and Fortify Software and now works as the Head of Trust and Security at Bugcrowd. Jason performs and trains internal candidates on mobile penetration testing, black box web application auditing, network/infrastructural security assessments, cursory mainframe security analysis, cloud architecture reviews, wireless network assessment, binary reverse engineering, and static analysis. He is also a semi-regular player on the capture the flag team Shellphish, an academic hacking group based out of the University of California, Santa Barbara.