Skip to content
View mattborja's full-sized avatar

Highlights

  • Pro

Block or report mattborja

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
mattborja/README.md

About

Sr. Software Engineer and creative with an emphasis on simple elegance and enterprise architecture. Applied industry experience (Education) since 2004.

I look for accountability, ask lots of questions, and pursue the strategic involvement of collaborative individuals: to innovate and create long-lasting business solutions of exemplary quality.

vCard

image

Interests

  • Data-driven business applications and software architecture
  • Information security, penetration testing, and cryptography
  • Infrastructure orchestration and automation
  • Ivy Lee Method (productivity)
  • Horizontal scalability and high availability
  • Project lead and formal documentation
  • Collaboration and camaraderie
  • Contributing to open source projects

Industry Experience

Area Technologies
Database ★ ★ ★ ★ ☆
Microsoft SQL Server, MySQL, Oracle, Couchbase
Coding ★ ★ ★ ★ ★
C#, ASP.NET MVC, Entity Framework (Code First), Classic ASP extended with custom COM objects, Node.js, PHP, CodeIgniter, Laravel
UI/UX ★ ★ ★ ★ ☆
XHTML, CSS, JavaScript, Bootstrap, jQuery
HTTP ★ ★ ★ ★ ★
Cross-Origin Resource Sharing (CORS), Sub-Resource Integrity (SRI), Content Security Policy (CSP), SSL Configuration, HTTP Strict Transport Security (HSTS), proxy, use of appropriate HTTP methods and status codes (REST), and request tracing
Web Application Security ★ ★ ★ ★ ★
OWASP Top 10, SANS SWAT Checklist, manual penetration testing, applied cryptography, systems analysis and network mapping
Cryptography ★ ★ ★ ★ ☆
Implement procedures and best practices for applied cryptography emphasizing proper use of key derivation functions, salts, initialization vectors, message authentication codes, hashing, and key management
Infrastructure ★ ★ ★ ★ ★
TCP/UDP load balancing, tuning, and failover (HAProxy, NGINX). Web server configuration (IIS 7.5/10.0, Tomcat), DNS management, firewall management, virtual IP management, SSL termination, clustering, and automation (Puppet).
CI/CD ★ ★ ★ ★ ★
Git, environment branches, pull requests, branch policies, pre-deployment approval for continuous delivery. Version control repository hosting in Bitbucket, GitHub, and Azure DevOps.
Supervision ★ ★ ★ ★ ★
Provide mentoring, guidance, and architecture decisions. Develop and maintain standard operating procedures. Review work for compliance, security, and best practices. Coordinate changes for release.
Project Management ★ ★ ★ ★ ★
Gather requirements, evaluate cost, conduct systems analysis, manage expectations, coordinate and direct work.

Industry Roles (Work History)

Timeframe Job Title
Mar 2021 - Present Manager, Web Services
Institution of Standard Operating Procedures Implementation of Continuous Integration, and Continuous Delivery for .NET applications, libraries, and application environments using Azure Pipelines; Development of business-aligned progression plans and job descriptions for .NET web application developers through Senior level; Development of Team Charter.
Nov 2019 - Mar 2021 Supervisor, Web Services
Institution of Change Management, Project Management, and Software Development Life Cycle; Employee training, mentoring, and supervision; Initial formation of core development team; Interview panel member as Subject Matter Expert (SME).
Sep 2013 - Nov 2019 Developer, Web Applications
Development and deployment of infrastructure management as code using Puppet Enterprise Configuration and deployment of Single Sign-On identity provider services and connectors (CAS, SAML, OAuth) Research and migration of on-premise application clusters to new high availability environment (HAProxy); Research and migration of legacy web applications (Classic ASP) to modern technology stack (ASP.NET MVC, C#) In-house planning, development, and maintenance of College Portal, Website, internal business applications, community applications, and third-party service integrations.
Fall 2016 Adjunct Faculty (Part-Time), Computer, Systems And Applications
Sam's Teach Yourself ASP.NET 4 in 24 Hours (ISBN-13: 978-0672333057) augmented with more industry-relevant curriculum.
Fall 2015 Adjunct Faculty (Part-Time), Computer, Systems And Applications
Beginning ASP.NET in C# and VB (ISBN - 13: 978 - 1118846773) augmented with more industry-relevant curriculum.
Jun 2011 - Sep 2013 Lead Developer, Web Applications
Develop custom web applications using LAMP stack Develop and support integrations with ad exchange, marketing automation, content management, publishing, event and newsletter management, payment processing, and customer relationship management; Linux server management, cloud services management, and web application firewall management; Remote desktop support.
Aug 2008 - Aug 2010 Web Design Teacher, Career & Technical Education
Business Math; Web Design and Development; Career Preparation; Student Organization (Future Business Leaders of America).
2004, 2005 - 2008 Technology Specialist
Account provisioning and management in Active Directory District website development and server rebuild; Security, networking, and content filtering; Email management and spam filtering; Desktop and printer support, imaging, and inventory.

Training History

Year Module
2022 Delegation Skills for Busy Leaders ("Why & How")
2021 Salesforce Trailhead
2020 Supervision: Core Competencies: Meeting the Needs of Today's Employees
2020 Team Leadership: Leading Teams
2020 Coaching Essentials: Partnering for Performance
2020 Conflict: Self-Management
2019 Azure DevOps for Project Managers
2014 Building an End-to-End Web Application with ASP.NET MVC5 (C#), EF Code First, HTML5 and jQuery
2014 Web App Penetration Testing and Ethical Hacking, SEC542, SANS

Testimonials

Year Summary of Work
2020 Assisted local city IT director in successfully deploying their first SAML 2.0 Identity Provider
2019 Recouped service fees (FFP) in excess of $40,000 from vendor breach of website build project contract and executed full project requirements in-house using Cascade CMS
2019 Launched new, mobile-friendly College Portal rebuilt in-house using ASP.NET MVC (C#), yielding 95% improvement to login times and application performance
2018 Replaced CAS Service Management WebApp with custom Change Management solution using Azure Repos and Azure Pipelines
2017 Successfully configured and deployed delegated Single Sign-On authentication for Office 365 applications orchestrating onload.js with first successful in-house ADFS Claims Provider supporting SAML 2.0
2017 Succesfully configured and deployed first SAML 2.0 Identity Provider
2017 First adoption of a Software Development Life Cycle process governed by Release Management using A successful Git branching model by Vincent Driessen, and Developing and Deploying with Branches and Deplyoments Best Practices by Beanstalk Guides
2017 First adoption of Project Management using Azure DevOps for Project Managers by Cals Tutorials
2016 Self-taught implementation of FIPS-197 in Arduino C
2016 Challenge Coin received from Department of Defense for submitting valid findings during Federal Govt.'s first ever bug bounty program, Hack the Pentagon hosted by HackerOne
2013 Contributed software patch accepted by Single Sign-On software provider, Jasig/Apereo CAS, resolving lack of cluster support in cryptographic operations via CAS-1386
2005 Orchestration of computer lab imaging, inventory management, and post-installation tasks using Altiris, DeepFreeze, Windows PE, and AutoIt
2005 Automated arrangement of desktop icons on Mac OS 9 during annual imaging using AppleScript
2004 Automated import of 1k+ student accounts from Student Information System into Active Directory using Visual Basic script

PGP

Statement

The following PGP fingerprints belong to the owner of this repository: Matt Borja.

Fingerprint Created Status
99BB 608E 3038 0C45 1952 D6BB A1C7 E813 F160 A407 2024-10-07 Active
F30F F4FC 9365 8457 4EE3 2518 3368 8C2E DC08 CD38 2021-12-29 Suspended
6FDD 7A12 197C 04F8 F510 585C 9DB9 CDDC 7708 8F26 2022-04-18 Inactive
3371 63B2 51AD 534D 6E30 8DC4 BC60 808C E2A8 20F6 2022-04-18 Revoked
4105 C4E5 774F 401B 1824 6910 FED8 1E8C 4D67 3B96 2022-04-18 Revoked
8ED0 E383 176C FAE7 8899 0F29 22E7 1A76 0A44 E2D6 2012-03-07 Revoked
F88A 7363 03AB F22B 60F4 A9C1 C892 093A 3570 183E 2003-08-28 Revoked

Asserted by cryptographically signed commit: be02acb@master (learn more).

Download Sources

Pinned Loading

  1. MB-ATECCX08A-Library MB-ATECCX08A-Library Public

    Arduino C development library and tools for the ATECCX08A. | License: MIT | See LEGAL.md

    C++ 2

  2. identity identity Public

    A registry for verifying identity proofs and assertions, aligned with NIST SP 800-63A. It strengthens vendor integrity, secures the supply chain, and supports critical infrastructure protection by …

    Shell 1

  3. keybase.md keybase.md
    1
    ### Keybase proof
    2
    
                  
    3
    I hereby claim:
    4
    
                  
    5
      * I am mattborja on github.