Full-Stack Developer → Cybersecurity (Cloud & AppSec)

Jason Achkar Diab

Azure Fundamentals (AZ-900) | Security+ | MSc Cybersecurity (UoL, in progress)

Full-stack developer transitioning into cybersecurity with a secure-by-design mindset. Focused on Azure security, identity, detection engineering, and application security—bringing hands-on engineering experience into security work.

Current Focus

Azure identity & access (Entra ID, Conditional Access concepts)
Microsoft Sentinel fundamentals (KQL, detections, alert tuning)
Secure SDLC: threat modeling + OWASP-style mitigations
Cloud security foundations: logging, posture, governance basics
security.profile
Active
0
Certifications

Security+, AZ-900, Google Cybersecurity

0+yrs
Engineering Experience

full-stack + secure-by-design practices

0
Security Projects

labs, detections, and secure patterns

Security Toolkit
AzureSentinelEntra IDDefenderOWASPKQLTerraformGitHub

Open to Opportunities

Cloud Security Engineer, Security Consultant, DevSecOps roles in Canada or remote

About Me

About Me

Developer transitioning to cybersecurity with a secure-by-design mindset.

I'm a software developer actively transitioning into cybersecurity, with a focus on cloud security (Azure), application security, and security operations. My background in full-stack development gives me a practical understanding of how to build secure systems from the ground up.

Currently pursuing a Master's in Cybersecurity at University of London while holding Security+ and AZ-900 certifications. I combine hands-on development experience with structured security learning to approach problems from both builder and defender perspectives.

My goal is to work in cloud security consulting, security engineering, or DevSecOps roles where I can help organizations design and implement secure cloud architectures, establish security automation, and build security into the development lifecycle.

Focus Areas

Cloud Security (Azure focus)
Secure Software Development
Threat Modeling & Risk Assessment
Identity & Access Management
SIEM & Detection Engineering
Security Automation & DevSecOps

Core Strengths

Secure SDLC

Integrating security throughout the development lifecycle

Cloud Fundamentals

Azure architecture, services, and security controls

Identity & Access

Authentication, authorization, and privilege management

Risk Awareness

Identifying and mitigating security risks proactively

Communication

Translating technical security concepts for diverse audiences

Continuous Learning

Staying current with evolving threats and technologies

Credentials

Certifications & Education

Structured learning path combining industry certifications with formal academic study in cybersecurity

Certifications

CompTIA Security+

CompTIA

2025

Industry-standard certification covering core cybersecurity principles, threat analysis, risk management, and security controls across networks, applications, and cloud environments.

Key Skills

Threat Detection & ResponseSecurity OperationsGovernance & ComplianceNetwork Security+2 more

Microsoft Azure Fundamentals (AZ-900)

Microsoft

2025

Foundational certification demonstrating knowledge of cloud services, Azure architecture, security, privacy, compliance, and trust in Microsoft Azure.

Key Skills

Cloud ConceptsAzure ServicesSecurity & ComplianceIdentity & Governance+2 more

Google Cybersecurity Professional Certificate

Google / Coursera

2025

Comprehensive program covering security fundamentals, network security, Linux, Python automation, threat detection with SIEM tools, and incident response procedures.

Key Skills

SIEM ToolsPython for SecurityIncident ResponseLinux Administration+2 more

Education

In Progress

Master of Science in Cybersecurity

University of London

Online2025 - Present

Highlights

  • Graduate-level study of cybersecurity principles, risk management, and security governance
  • Focus on secure systems design, software security, and network security concepts
  • Academic grounding in cryptography, cybercrime, and information security management
  • Developing analytical and research skills applicable to cybersecurity consulting and engineering roles

Relevant Coursework

Cyber Security FoundationsSecurity Management and GovernanceNetwork and Infrastructure SecuritySoftware and Application SecurityApplied CryptographyCybercrime

Bachelor of Science in Computer Science

Concordia University

Montreal, QC2022 - 2025

Highlights

  • Strong foundation in computer science, software engineering, and systems programming
  • Hands-on experience designing and implementing web applications and backend services
  • Studied core networking and operating systems concepts relevant to cybersecurity
  • Developed analytical problem-solving skills through algorithms and data structures coursework

Relevant Coursework

COMP 248 – Object-Oriented Programming ICOMP 249 – Object-Oriented Programming IICOMP 352 – Data Structures and AlgorithmsCOMP 445 – Data Communications and Computer NetworksCOMP 346 – Operating SystemsCOMP 353 – DatabasesCOMP 348 – Principles of Programming LanguagesSOEN 341 – Software Process
Career Journey

Professional Experience

Secure software development with a focus on building resilient systems and integrating security throughout the SDLC

Full-Stack Web Developer

SES & Technologies Ltd.

Laval, QCJun 2025 - Presentfull-time

Key Achievements

  • Built and maintained Angular (v17+) and ASP.NET Core applications with clean, scalable patterns
  • Implemented APIs with strong validation and reliable error handling
  • Improved delivery quality through CI/CD automation in Azure DevOps

Security Highlights

  • Applied secure-by-design patterns (RBAC mindset, least privilege, secure defaults)
  • Contributed to quality gates and automated checks in CI/CD
  • Strengthened observability practices that support incident triage and auditability

Technologies

AngularTypeScript.NETSQL ServerAzure DevOps

Full-Stack Software Developer Intern

Genetec Inc.

Montreal, QCDec 2023 - May 2024internship

Key Achievements

  • Improved platform features with scalable .NET services and real-time updates
  • Contributed tests and pipeline improvements in Azure DevOps

Security Highlights

  • Worked with HTTPS enforcement and secure service practices in backend work
  • Built habits around logging, testing, and reliability that translate directly to security engineering

Technologies

.NETAzure DevOps

Applications Engineer Intern

Matrox Graphics Inc.

Dorval, QCMay 2023 - Sep 2023internship

Key Achievements

  • Built internal tools that automated troubleshooting and support workflows

Security Highlights

  • Built tooling with reliability in mind: structured troubleshooting flows and safer operational outcomes

Technologies

C#.NET
Featured Work

Featured Projects

Cybersecurity projects demonstrating security architecture, threat detection, and secure development practices

Featured

DevSecOps CI/CD Security Gates

DevSecOps implementation & automation

Reference CI/CD pipeline integrating security tools: SAST scanning with SonarQube, dependency vulnerability checking, container scanning, infrastructure-as-code security validation, and automated security testing gates.

GitHub ActionsSonarQubeTrivyOWASP Dependency-Check+1
Featured

SIEM Detection Pack (Microsoft Sentinel)

Detection engineering & threat hunting

Collection of KQL-based detection rules for Azure Sentinel targeting common attack patterns. Includes detections for suspicious authentication, privilege escalation, lateral movement, and data exfiltration with MITRE ATT&CK mapping.

Microsoft SentinelKQLAzure MonitorLogic Apps+1
Featured

Secure API Gateway Pattern

Secure architecture & implementation

Production-ready API gateway implementing security controls: JWT authentication, rate limiting, request validation, SQL injection prevention, XSS protection, and comprehensive logging. Demonstrates OWASP API Top 10 mitigations.

Node.jsExpressRedisJWT+2

Azure Secure Landing Zone Baseline

Security architecture & infrastructure automation

Infrastructure-as-Code implementation of Azure landing zone with security best practices. Includes network segmentation, Azure Policy enforcement, RBAC configuration, centralized logging to Log Analytics, and compliance monitoring.

AzureTerraformAzure PolicyARM Templates+1

Threat Model: CRM Web Application

Security analysis & risk assessment

Comprehensive threat model for a multi-tenant CRM system using STRIDE methodology. Includes data flow diagrams, trust boundaries, threat identification, risk assessment, and prioritized mitigation strategies with implementation guidance.

STRIDEMicrosoft Threat Modeling ToolPlantUMLMarkdown

Cloud Security Hardening Checklist

Security compliance & automation

CIS Benchmark-aligned security hardening guide for Azure and AWS environments. Covers identity management, network security, encryption, logging, compliance, and automated verification scripts for continuous compliance monitoring.

AzureCIS BenchmarksPowerShellAzure CLI+1

More projects and labs in development. Check my GitHub for the latest updates.

Interactive Demos

Interactive Security Showcases

Explore fully functional cybersecurity tools and demonstrations. Each showcase demonstrates real detection engineering, threat modeling, and security architecture skills with actual working implementations.

Real Implementations, Not Mockups

These showcases feature fully functional implementations with real data processing, detection algorithms, and security analysis capabilities. All detection rules, query engines, and threat models are built from scratch to demonstrate deep technical understanding of security engineering principles.

Case Studies

Real-World Security Solutions

Detailed case studies showcasing security challenges, analysis, implementation, and measurable impact

Writeups & Learning

Technical articles, research notes, and documentation from my cybersecurity learning journey

tutorial

Building a Secure Azure Landing Zone

A practical guide to implementing Azure security best practices, including network segmentation, identity governance, and compliance policies using Azure Policy and Blueprints.

12 min2024-12
AzureCloud SecurityIAM+2
tutorial

OWASP API Security Top 10: Practical Mitigations

Deep dive into each of the OWASP API Security Top 10 vulnerabilities with real-world examples and actionable mitigation strategies for Node.js and .NET applications.

18 min2024-11
OWASPAPI SecurityAppSec+2
tutorial

Threat Modeling a Multi-Tenant SaaS Application

Step-by-step walkthrough of applying STRIDE methodology to identify threats in a multi-tenant CRM system, with data flow diagrams and mitigation planning.

15 min2024-10
Threat ModelingSTRIDEAppSec+1
tutorial

Detection Engineering with Microsoft Sentinel

Building effective KQL queries for Azure Sentinel to detect suspicious authentication patterns, lateral movement, and privilege escalation attempts.

14 min2024-09
SIEMMicrosoft SentinelKQL+2
certification notes

CompTIA Security+ Study Notes & Labs

Comprehensive study guide covering all Security+ exam objectives with hands-on lab exercises, practice scenarios, and memory aids for key concepts.

25 min2024-08
Security+CertificationStudy Guide+1
research

Common OAuth 2.0 Misconfigurations and Exploits

Analysis of real-world OAuth implementation flaws including redirect URI validation bypass, state parameter issues, and token leakage scenarios.

10 min2024-07
OAuthAuthenticationWeb Security+1
tutorial

Implementing Security Gates in CI/CD Pipelines

Practical guide to integrating SAST, dependency scanning, and container security tools into GitHub Actions and Azure DevOps pipelines.

11 min2024-06
DevSecOpsCI/CDSAST+2
tutorial

Securing Azure Entra ID (formerly Azure AD)

Best practices for configuring Conditional Access policies, MFA, Privileged Identity Management, and identity protection in Azure Entra ID.

13 min2024-05
AzureEntra IDIAM+2

More writeups and technical content coming soon. Follow my learning journey on GitHub.

Get In Touch

Get In Touch

Interested in cloud security, cybersecurity consulting, or DevSecOps roles? Let's connect. Open to opportunities in Canada and remote positions.

Drop a line

Links

Prefer async? Reach out via email or socials. Resume is available to preview or download.

Email
email
LinkedIn
linkedin
GitHub
github