ABOUT ME

Hi, I'm Jacob Dornbusch, IT Developer & Support at Gillette Pepsi-Cola Companies in La Crosse, WI. Additionally, I serve as a Web Developer at Flair Developer Group, where I apply my expertise to create engaging and user-friendly websites.

I have a strong passion for learning new technologies and continuously expanding my skill set to stay up-to-date with industry advancements. Feel free to connect with me to discuss potential collaborations, share insights, or explore exciting opportunities.



Work

Flair Developer Group

Founder & Web Developer January 2021 - Present

  • Work closely with clients to understand their needs and translate them into functional websites and digital assets
  • Design and develop custom HTML, CSS, JS, PHP, and SQL solutions to meet client needs
  • Build and maintain WordPress and Shopify websites, ensuring they are up-to-date, secure, and functional
  • Manage DNS and domain registration for clients, ensuring seamless domain setup and maintenance
  • Migrate websites to new servers, optimize performance and minimize downtime
  • Create engaging and visually appealing graphic designs for websites, social media, and other digital channels
  • Conduct regular website audits and performance reviews, identifying opportunities for improvement and implementing changes to optimize user experience and search engine optimization (SEO)
  • Communicate technical concepts and requirements to non-technical stakeholders in a clear and concise manner
  • Gillette Pepsi-Cola Companies

    IT Developer & Support November 2020 - Present

  • Support and maintain the company's internal systems and applications
  • Provide technical support to employees, troubleshoot and resolve issues related to software, hardware, and network systems
  • Monitor and maintain system performance and security, ensuring optimal uptime and data integrity
  • Collaborate with cross-functional teams to identify and address business needs, working closely with stakeholders to deliver solutions that meet their requirements
  • Develop and maintain technical documentation, ensuring that all systems and applications are well-documented and easy to understand
  • Stay up-to-date with emerging technologies and industry trends, continuously improve skills and knowledge to stay at the forefront of the industry
  • Certifications

    CompTIA Security+

    CompTIA Novemeber 2023


    CompTIA Network+

    CompTIA Novemeber 2023


    CompTIA A+

    CompTIA September 2023


    LPI Linux Essentials

    LPI October 2023


    ITIL 4 Foundation

    ITIL October 2023


    AWS Certified Cloud Practitioner

    Amazon Web Services July 2023


    Cybersecurity Analyst

    Leveld Careers June 2023

    Education

    Bachelor of Science - Information Technology

    Western Governors University 2023

    Projects

    Azure Resume Challenge

    GithubMay 2023

    • Frontend: Utilized a modified provided template for the user interface, incorporating HTML and CSS modifications.
    • Backend: Developed a serverless API using Azure Functions, implementing an HTTP trigger for seamless integration and communication.
    • Visitor counter: Leveraged the power of Azure CosmosDB to efficiently track and maintain the visitor count, ensuring accurate data representation.
    • Frontend storage: Stored the frontend in Azure Blob Storage, ensuring secure and scalable storage capabilities.
    • CDN: Utilized Azure CDN to optimize the delivery of static content, enhancing performance and user experience.
    • CI/CD: Implemented a robust CI/CD pipeline using Github actions. Triggers were set on the 'frontend' and 'backend' folders to automate deployment and ensure efficient workflow management.

    Azure Honeynet

    GithubJune 2023

    • Honeynet: Designed and deployed a secure honeynet infrastructure within the Microsoft Azure cloud environment.
    • Log Analytics: Gathered log data from various sources and directed them into a Log Analytics Workspace for centralized monitoring and analysis.
    • SIEM: Leveraged Microsoft Sentinel to analyze the log data, generate attack maps, trigger alerts, and create incidents, enhancing threat detection and response capabilities.
    • Pre-security Assessment: Conducted an assessment of security metrics within the insecure environment over a 24-hour period to identify vulnerabilities and potential attack vectors.
    • Incident Response: Implemented fundamental security controls to fortify the environment, mitigating identified risks and strengthening overall security posture.
    • Post-security Assessment: Conducted a subsequent assessment of security metrics after another 24 hours following the implementation of the security controls to evaluate their effectiveness and measure the impact on the environment's security.