Josh Cannons
Hello

I'm Josh Cannons

System Administration and Application Development

Hello! I'm Josh Cannons. System administrator, code slinger, devout Linux user and Open-Source enthusiast. For the last four years, I have been providing part-time freelance IT support in the Far North region for a variety of small business.

While focusing on Linux as a development platform, I have worked extensively with Windows server and desktop systems in a professional capacity and believe in a pragmatic approach to Information Technology in general.

I am a High-performing Information Technology graduate with a strong understanding of current trends in technology and security. A proven ability to respond to changing environments and develop new skills rapidly while able to remain calm under pressure while handling multiple workloads. Excelled at academic studies, maintaining top 15% scoring students internationally.


I specialise in

Linux and Windows Administration and Support

Python, Java, PHP and HTML Development

Network Configuration and Security Auditing

Technical Documentation

Data Recovery and Backup Management

DevOps and Configuration Management

Management of Cloud Services

Digital Forensic Investigation


Professional Skills

  • Highly detailed system and infrastructure documentation including configuration, performance monitoring and support data
  • Discretion, Confidentiality and Ethics; Inspire and maintain an ethical and confidential work environment to collect and store sensitive data
  • Client relationship management; ability to engage with a large demographic, displaying empathy, integrity and credibility. Develop and maintain contractual relationships with clients
  • Leverage’s superior written communication to develop, implement and manage a diverse range of training and support resources
  • Acknowledged for strengths absorbing, processing and disseminating complex information in an engaging manner
  • Highly efficient learner with developed research methods; consistently maintained top percentile grades throughout all study
  • Proactive organizational and time-management skills with experience managing small projects using industry standard methodology.
  • Accustom to roles requiring a high degree of self-motivation

Technical Skills

Linux Administration and Support 80%
Windows Administration and Support 69%
Hardware Implementation and Configuration 83%
Java, PHP and MySQL Development 60%
Incident Investigation 67%
Network Configuration and Security 80%
Documentation and Configuration Management 78%
Data Recovery and Backup Management 79%
DevOps 66%
Digital Forensic Investigation 74%

Administration

  • Configuration, management and support of various platforms including Windows Server 2008-2012, FreeBSD, CentOS/RHEL and Ubuntu
  • Design, implement and maintain small business IT infrastructure including the provisioning of server and workstation hardware, network printers, software applications and cloud services
  • Develop and implement secure and distributed business services on bare-metal systems, virtualization or via Docker including LAMP stacks and database applications
  • WAN and LAN implementation and troubleshooting supported by a broad understanding of network technologies and protocols including, Implementation of Cisco and Draytek proprietary equipment
  • Understanding of essential Unix/Linux commands for the purpose of system monitoring, security and performance profiling and system auditing
  • Highly detailed system and infrastructure documentation including configuration, performance monitoring and support data

Security

  • Review, assess and document vulnerabilities to improve the security of networks and information systems
  • Strong knowledge of TCP/IP and Networking protocols including active packet capture and analysis
  • Safeguard network assets and confidential data from unauthorized access, modification, destruction or disclosure though the development of security policies and the management of user access, firewalls and intrusion detection systems
  • Provide accurate and timely incident analysis/response with detailed reporting

Forensics

  • A rich understanding of current Privacy Laws and the social and ethical aspects of digital investigations and security analysis
  • Broad knowledge of computer security topics such as digital forensics, incident response, application security and malware analysis
  • Experience wiping/destroying, imaging, verifying and validating media to all industry and court-approved standards using hardware and software based forensic tools
  • Configuration and application of physical and virtual write-blocking technology
  • Firm understanding of hexadecimal code and file structures, headers and footers including the creation of custom binary to assist in file carving

Development

  • Design and development of standalone and enterprise applications using Python, Java, SQL, PHP, Asp.NET and HTML/CSS
  • Manage projects with Git, Redmine and Slack to co-ordinate team based application development
  • Audit code to identify and mediate possible security flaws including input validation, SQL injection and buffer overflow issues

Technologies I Use

Education

Docker Deep Dive

Linux Academy

Learning Chef DevOps Deployment

Linux Academy

Linux Academy Red Hat Certified Systems Administrator Prep Course

Linux Academy

Certificate III in Investigative Services

OCA Tafe

Bachelor's Degree - Information Technology (Network Security)

CQ University

Diploma of Information Technology (Network Administration)

TNQ Tafe

Certifications

Licensed Private Investigator

Queensland Police Service

License Number - 4000686
Queensland Police

Experience

2016 - Ongoing

Privata

Technical Support

  • Small business network, server and desktop support, providing professional advice and support for both new and existing infrastructure
  • Assess customer needs to assist in design and implementation of network and business systems
  • Provide client support and develop problem resolution strategies
  • Perform a wide range of hardware and software installation, configuration and troubleshooting
  • Maintaining close relationships with clients, meeting SLA’s and adhering to contractual agreements
2017

Turmeric Products Australia

Developer

  • Design landing page and blog
  • Develop and maintain e-commerce platform
  • Social media marketing and community management
2016

Audiad

Developer

  • Design landing page and maintain social media presence
  • Django/Python application design
  • Data modelling (SQL and ElasticSearch)
  • An example of an excellent System Administrator.

    Dr. Edilson Arenas Professor of Information Security
  • Josh helped expand our business beyond the local area. We now have customers from all over the country.

    Guy Tilbury Turmeric Products Australia
  • The website has been a hit. A great deal of our work now comes from people who found us online.

    Richard Owen Richard Owen Painting
  • No matter the technical issue, Josh has always found an efficient and resourceful solution. He has been essential to maintaining business continuity.

    Jennifer Jones Project Manager

Portfolio

Audiad

Audiad

Web Site

Audiad

Audiad is a music application that provides natural language searching and predictive playlist generation. It aims to combine the ease of google search with the music discovery of services like Spotify and Pandora for your local music collection.

Audiad is written in Python and Django.

Richard Owen Painting

Richard Owen Painting

Web Site

Richard Owen Painting

Richard Owen Painting had previously not established a web presence and were looking at expanding their customer reach. Having spent many years working in regional area's, they wanted to promote their on-site experience.

I developed the website with an intent on showcasing their wide array of experience and constant level of high quality. The final product has proven to be successful in increasing customer inquiries from all over Queensland and have maintained a constantly full booking sheet ever since.

Privata Services

Privata Services

Web Site

Privata Services

We have been providing On-Site Computer Repairs and Technical Support since 2010. Our computer friendly repair technicians are ready to assist you with any issue you or your business may have.

Privata has an experienced and skilled team of mobile computer support technicians with a large range of experience in all things technical. Whether it is your Tablet, Phone, Computer or Laptop, we provide on-site support for all your digital devices. We guarantee to deliver convenient, efficient and reliable on-demand, on-site computer and network technical support.

OFV

OFV

Web Site

OFV

A responsive front-end for an online fruits and vegetables store

Hat And Scarf

Hat And Scarf

Java EE Application

Hat And Scarf

A simple Java EE web application to manage store inventory

Documentation

Server Settings

Documentation

Server Settings

This document provide an example of server/system documentation. Included is a small sample of servers with their basic configuration information and system documentation.

Results Manager

Code

Results Manager

The problem put forward was to design a program to assist a course coordinator in the management of student results. A Java desktop application is to be developed, driven by a simple Swing GUI. Interaction between the database and the application is to be via JDBC. The NetBeans IDE is to be used for development. Derby must be used as the database connector.

The initial user requirements are:

  1. Start the application and connect to the database. If a connection cannot be established, the application must exit.
  2. Close the database connection and stop the application
  3. Display all records
  4. Display the record for a specified student
  5. Display all records where the total mark is within a specified range
  6. Display the number of students who have received 0 for all assessment items (i.e. absent fails)
  7. Update the exam mark and total mark for a specified student.

Museum Proposal

Museum Proposal

Documentation

Museum Proposal

The Museum of Science and Technology (SAT) have requested the design and implementation of a web- technology enabled kiosk system. This system must provide an accessible interface to visitors that will allow them to obtain an overview of the museum layout and find details of the exhibits they intend to visit.

This document intends to cover the proposal of the implementation. It will cover the user requirements study and the analysis of its results. From this a list of requirements will be drafted and a low-fidelity prototype developed. A small user group will then be taken through the prototype and a survey given to determine initial user reaction. The results will be analysed and if needed the list of requirements will be amended before the review will proceed.

Car Repair

Car Repair

Code

Car Repair

Car Repairs Shop (CRS) undertakes car repairs for their customers. A car repair job could be either a maintenance job or a breakdown repair job. You have been asked to develop a prototype Java application, using GUI, to maintain the records that are related to car repair jobs performed by CRS.

Even though the cost of a part remains the same, the application allows inputting different costs for the same part in different jobs. Hence, it is expected that the application should maintain the details of parts that are currently available in the shop. The application should allow the user to enter the details related to new parts and also to view/modify/save the details related to existing parts (parts-data).

Finally, the program must output the bill to a text file receipt.

Privacy U

Privacy U

Documentation

Privacy U

This document presents the concept and idea behind the Privacy Box as well as the combined market research, financial analysis, business operations and marketing planning.

Market research has shown that an ever growing number of internet users are becoming concerned with the scope of data collection and the misuse of their data. Unfortunately the largest group of people expressing concern and a desire to act are also some of least technical internet users.

The Privacy Box combines the research of several talented individuals and will allow people to surf the internet with the assurance that their information is kept private, secure and anonymous. By designing a “No Configuration” interface, people with no technical experience can implement the same security measures used by large enterprises and employ techniques that keep their identity completely private.

Maths Tutor

Code

Maths Tutor

The goal was to write a java application using Java TCP API Socket to implement a simple client/server application using multi-threaded programming RMI.

The MathsTutor allows the user to practice arithmetic operations as chosen by the user. The user can select one of addition, subtraction, multiplication, or division.

On receiving the user’s choice from the client side, the server has to send randomly generated double digit numbers to the client. The MathsTutor has got method to create arithmetic problems using randomly generated double digit numbers.

On receiving the problem, the client has to display the problem and read the user input which is the answer consisting of an integer and send it to the server. The server has to invoke the method to execute the required operation, check the result and send a reply informing whether the answer is correct or incorrect to the client.

On completion of 10 problems, the server has to send a summary of results, and allow the user choose another arithmetic operation if desired. The user should be able to stop the service by entering a single character ‘Q’ or ‘q’.

Strategic Acquisition

Strategic Acquisition

Documentation

Strategic Acquisition

This document intends to investigate the validity of the current Human Resource methods used by Wordsmiths as it pertains to the amalgamation of Mainly Books and the existing plans to expand the companies position as online retailer and book publisher.

The investigation found that the issue of age based employee selection was not supported by current research and the option of a more diverse workforce provided a greater customer experience and a greater variety of skills. The possibility of retraining exisiting staff was found to be preferable to redundancy in most cases. It was found that many companies outsource a wide variety of Information Technology systems and tasks, which in turn allowed then to focus more on critical business process and provided a greater chance for growth and stakeholder return.

Memberships

Australian Computer Society

Australian Information Security Association

Australian Institute of Professional Intelligence Officers


Golden Key Honor Society

FreeBSD Foundation

Linux Foundation

Availability

Contact Me

Feel free to contact me


Loading ...