8000 danieldejager (Dan de Jager) Β· GitHub
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content
View danieldejager's full-sized avatar
πŸ˜€
I'm here
πŸ˜€
I'm here

Block or report danieldejager

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
danieldejager/README.md

πŸ’« About Me:

πŸ‘¨β€πŸ’» I’m currently working on:

β€’ Risk Management Platform: Developing a Django-based risk management application that integrates third-party risk, contract management, and incident tracking. My focus is on building scalable, secure architectures.
β€’ Incident Response Automation: Building scripts and tools to enhance incident response readiness, integrating capabilities with Microsoft Entra ID and NIST standards to improve cross-departmental response.

🀝 I’m looking to collaborate on:

β€’ Security Automation: Projects involving automation in cybersecurity, such as incident response workflows, IAM, and cloud security operations using tools like PowerShell, Azure Automation, and Snyk.
β€’ Application Security: Collaborating on securing web applications (especially Django) through best practices in secure coding, threat modeling, and integrating SSO solutions like Okta or Entra ID.

πŸ›  I’m looking for help with:

β€’ Front-end Development: Looking to refine my skills in front-end technologies to improve user interfaces for security dashboards and risk management tools.
β€’ Creative Coding: Exploring ways to incorporate innovative approaches and creative problem-solving in cybersecurity tooling and frameworks.

🌱 I’m currently learning:

β€’ Guerrilla Tactics in Cybersecurity: Applying unconventional strategies to run security programs in resource-constrained environments 8000 , focusing on leveraging automation and micro-projects to achieve long-term goals.
β€’ ITIL and COBIT Frameworks: Expanding my understanding of change management and service delivery in multi-vendor environments with a focus on shared infrastructure and SaaS.

πŸ’¬ Ask me about:

β€’ Incident Response & Threat Intelligence: My experience building incident response plans and integrating security tooling (Qualys, XDR, Cisco Umbrella, MDM) into automated workflows.
β€’ Application Security Best Practices: Securing Django applications, customizing admin interfaces, and integrating SSO for seamless user management.

⚑ Fun fact:

β€’ When I’m not coding or solving cybersecurity problems, I like to experiment with creative storytelling, blending South African culture with sci-fi in projects like β€œTow-Truck Heroes vs Aliens!”

πŸ’» Tech Stack:

C# Go GraphQL HTML5 Java Markdown PHP PowerShell Python Shell Script TypeScript Windows Terminal YAML Azure Heroku .Net Apollo-GraphQL Blazor Bootstrap Django Drupal Flask JWT NPM NodeJS Nuxt JS RabbitMQ React React Native React Query React Router React Hook Form Spring Vue.js Vuetify WordPress Xamarin Apache Tomcat Nginx MariaDB MicrosoftSQLServer MySQL SQLite Gimp Plotly Pandas NumPy GitLab CI GitHub Actions GitLab GitHub Bitbucket

πŸ“Š GitHub Stats:



πŸ” Top Contributed Repo


Popular repositories Loading

  1. malware_research malware_research Public

    PowerShell

  2. Reverse-Engineering Reverse-Engineering Public

    Python

  3. Discovery Discovery Public

    Scripts that are used to enumerate domains e.g. subdomains, ip and ASN data

    Shell

  4. AzureDockerDemo AzureDockerDemo Public

    C#

  5. StaticSite StaticSite Public

    HTML

  6. ResearchPapers ResearchPapers Public

0