TOPHERTEBOW/CV.md
2025-02-12 15:06:00 -07:00

360 строки
24 KiB
Markdown
Исходник Ответственный История

Этот файл содержит неоднозначные символы Юникода

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

# TOPHER TEBOW
## CYBER THREAT HUNTER
See application for contact details.
***
## SUMMARY
- Experienced Cybersecurity Professional with 10+ years of expertise in threat intelligence, threat hunting, and web application security.
- Multiple certifications, including cybersecurity analysis, penetration testing, and network security.
- Experienced in cross-platform detection and analysis, including Windows, Linux, and macOS.
- Well-versed in malware and vulnerability analysis techniques and tools.
- Strong experience in fast-paced environments that require speedy and accurate analysis and remediation.
- Ability to communicate highly technical concepts and details to a variety of audiences.
***
## CERTIFICATIONS
### Security
Certification | Issuing Organization | Certification Number
------------ | ------------- | -------------
Systems Security Certified Professional (SSCP) | International Information System Security Certification Consortium (ISC2) | 2002157
CySA+ | CompTIA | 25QPHQLT22EEQ33K
PenTest+ | CompTIA | F5W66WNT1EE4QWW8
Security+ | CompTIA | 3WZQEMXSNEBE195G
Network+ | CompTIA | QMTV1HBQPJR1Q39J
A+ | CompTIA | YSP0KKEYBBE41MK8
Linux Essentials | Linux Professional Institute | 5agtvrf82v
### Project & IT
Certification | Issuing Organization | Certification Number
------------ | ------------- | -------------
Certificate in IT Service Management | ITIL Foundation | GR671340266BT
Six Sigma Green Belt | The Council for Six Sigma Certification (CSSC) | PEqbg5qYw7
Project+ | CompTIA | 2YFXP64YLBFEQ535
***
## TECHNICAL SKILLS OVERVIEW
### Cybersecurity Frameworks & Standards
- NIST CSF, MITRE ATT&CK, PCI DSS, SOC2, ISO 27001, CIS, OWWASP Web Security Testing
### Threat Intelligence & Monitoring
- __Threat Intelligence Technologies:__ Anomali ThreatStream, Recorded Future, ThreatConnect, Stairwell, IntSights, VirusTotal, AT&T AlienVault, IBM X-Force, Microsoft Defender Threat Intelligence, Flashpoint Ignite, Wordfence Intelligence
- __Threat Intelligence Standards:__ STIX, TAXII
- __Monitoring, SIEM, & SOAR Tools:__ CrowdStrike Falcon, Google Chronicle, Siemplify, Cofense Triage, QRadar, Snort, Cortex XSOAR, Grafana, Kibana, Splunk, ThreatConnect, Elastic SIEM, Elastic Stack, Logstash
- __OSINT Tools:__ Maltego, Shodan, Google Trends
### Penetration Testing & Vulnerability Assessment
- __DAST Tools:__ Burp Suite, OWASP ZAP, Nmap, Wireshark, BeEF, SQLmap, Metasploit
- __SAST Tools:__ TrueCode, Veracode
### Malware Analysis & Detection
- __Analysis Tools:__ Cuckoo Sandbox, Procmon, Process Hacker, ANY.run, IDA Pro, X64dbg, Radare2, Ghidra, Hybrid Analysis, Joe Sandbox
- __Detection Engines:__ YARA, HyperScan, ClamAV, Acronis
### Development & Automation
- __Programming & Scripting:__ Bash, PowerShell, Batch, Python, Perl, JavaScript, PHP, Lua, C, C#, Go, Rest API, Regular Expressions (Regex)
- __Web & Design Frameworks:__ jQuery, Laravel, Angular, Bootstrap, Tailwind
### Cloud & Virtualization Technologies
- __Cloud Platforms:__ Amazon Web Services (AWS), Azure
- __Virtualization & Containerization:__ Hyper-V, VMWare, VirtualBox, QEMU, oVirt, KVM, Virt-manager, Kubernetes, Docker, Vagrant
### Operating Systems and Web Servers
- Linux, macOS, Windows, Android, iOS, Apache, IIS, Nginx
### Database Management
- MySQL, SQL Server, MariaDB, SQLite, PostgreSQL
### Collaboration Tools
- Jira, Confluence, Git, GitHub, Bitbucket
***
## EDUCATION & HONORS
### Western Governors University
#### Bachelor of Science in Cybersecurity and Information Assurance
##### Oct 2021 - Jul 2024
- I obtained a B.S. degree in Cybersecurity and Information Assurance.
- I was awarded the Excellence Award for my work in Emerging Technologies in Cybersecurity.
### Scottsdale School of Film & Theater
#### Associate of Arts in Film Production
##### Jan 2012 - Jun 2015
- I studied all aspects of film and television production, from scriptwriting and pre-production, to crew positions on set, and the post-production process.
- I obtained 82 credit units toward an A.A. degree.
### Order of the Sword & Shield
The Order of the Sword & Shield National Honor Society is the largest and most respected organization representing the Homeland Security, Intelligence, Emergency Management, Cyber and Information Security, and all Protective Security disciplines.
### National Society of Leadership and Success
The NSLS is an organization that provides a life-changing leadership program that helps students achieve personal growth, career success, and empowers them to have a positive impact in their community.
***
## Community Involvement
### InfraGard
#### Phoenix, AZ
##### Feb 2020 - Present
InfraGard is a partnership between the private sector and the FBI, fostering public-private collaboration to protect critical infrastructure better.
### Arizona Cyber Threat Response Alliance (ACTRA)
#### Phoenix, AZ
##### Feb 2020 - Present
ACTRA leverages public and private cross-sector resources to more effectively analize critical and real-time intelligence, and respond to cyber threats.
### EXITNODE
#### Phoenix, AZ
##### August 2024 - Present
EXITNODE connects tech enthusiasts with a passion for connecting with others and providing a network of support for new engineers. The philosophy is rooted in accessibility and diversity, welcoming anyone with a passion for technology.
### Open Cybersecurity Alliance
#### Phoenix, AZ
##### April 2020 - Present
OCA is building an open ecosystem where cybersecurity products interoperate without the need for customized integrations.
### Filigran Community
#### Phoenix, AZ
##### July 2019 - Present
The Filigran community is a public collaborative of cybersecurity professionals working to to provide cybersecurity and crisis management teams with the best possible software fueled by actionable threat intelligence.
### CTI League
#### Phoenix, AZ
##### Mar 2020 - Present
The CTI League, an all-volunteer non-profit group that focuses on aggressively dismantling cyber criminal infrastructure and protecting healthcare organizations against cyber attacks.
### DC602
#### Phoenix, AZ
##### Aug 2018 - Present
DC602 is a gathering point for those interested in alternate applications of modern technology, providing a space to discuss technology and security topics.
### DC480
#### Phoenix, AZ
##### Aug 2018 - Present
DC480 is a group of hackers, infosec professionals, and learners new to cybersecurity, coming together to learn and share experiences in cybersecurity.
### PHX2600
#### Phoenix, AZ
##### Feb 2015 - Present
PHX2600 is a group of hackers and technology enthusiasts who gather monthly to discuss code, tech, and other hacking related topics.
***
### PROFESSIONAL EXPERIENCE
#### Threat Hunter
##### Charles Schwab
###### Hybrid, Tempe, AZ
- Play a critical role in analysis of disparate information and synthesizing into relevant actionable intelligence.
- Ability to deliver accurate, timely and professional intelligence products.
- Support investigative efforts within the CSOC and the Security Organization.
- Capable communicator that can engage others both internally and externally to protect the companys critical assets.
- Interface with peer departments across the firm.
- Build positive and productive relationships with the business and technology.
- Ability to securely share actionable intelligence internally and externally while maintaining TLP.
#### Cybersecurity Analyst & Technical Writer
##### Microsoft
###### Remote, U.S.
- Collaboratively identified emerging cyber threats with a team of analysts and researchers.
- Authored 223 threat descriptions for the Microsoft Threat Encyclopedia, ensuring accuracy and completeness.
- Reviewed and refined 45 threat analytics reports for the Microsoft Defender Threat Intelligence platform, maintaining Microsoft's standard for accuracy and clarity.
- Conducted additional research to supplement researcher data, ensuring a holistic understanding of threats.
- Elevated team knowledge on cybersecurity threats through meticulous research and documentation.
- Drove team collaboration to pinpoint and document evolving cyber threats.
#### Threat Researcher
##### Defiant
###### Remote, U.S.
- Identified and documented potential threats through log review, penetration testing, and research resources.
- Utilized tools like Burp Suite and ZAP to identify vulnerabilities in web applications.
- Used the MITRE ATT&CK framework and OWASP Top 10 to help analyze and categorize web threats.
- Drove threat awareness by producing key educational resources for identified threats.
- Boosted Defiant's threat intelligence by uncovering new trends in cybersecurity and publishing them to the Wordfence Intelligence platform.
- Contributed to multimedia production for educational videos, promoting cybersecurity awareness.
#### Senior Cyber Security Researcher
##### Acronis
###### Tempe, AZ
- Worked as a Cyber Protection Operations Center (CPOC) member to monitor and respond to alerts from AI, behavioral, and static detections across all endpoints using Acronis Cyber Protect products.
- Utilized regex and behavioral analysis to write malware detection rules for Acronis custom detection engine, significantly reducing risks to Windows, macOS, and Linux systems.
- Made use of custom scripts to perform penetration testing on desktop applications to identify vulnerabilities in Windows, macOS, and Linux applications.
- Analyzed emerging threats, utilizing tools such as Procmon, Process Hacker, IDA Pro, X64dbg, Radare2, Cuckoo Sandbox, ANY run, and VirusTotal to craft detection strategies that preemptively neutralize risks.
- Led a cross-functional team to educate stakeholders through videos on emerging threats and best practices.
- Authored technical blog posts, enhancing the company's reputation in the cybersecurity field.
- Strengthened community relationships, facilitating the exchange of crucial threat intelligence.
#### Manager, Web Security Research
##### SiteLock
###### Scottsdale, AZ
- Spearheaded the training and development of new analysts, fostering a collaborative work environment.
- Monitored the alert queues to ensure web threats on client websites were addressed quickly and accurately.
- Pioneered the optimization of processes and tools, improving efficiency.
- Contributed to security patch backporting and malware detection rule writing.
- Managed a machine learning project, showcasing innovative thinking to improve malware identification by 12%.
- Authored technical and thought leadership articles, exhibiting an analytical understanding of industry trends.
- Analyzed emerging malware trends, improving the companys threat intelligence stance.
#### Web Vulnerability Research Analyst II
##### SiteLock
###### Scottsdale, AZ
- Spearheaded security patch reviews in content management systems (CMSs), ensuring optimal system integrity.
- Pioneered the backporting of patches to older versions, maintaining system functionality.
- Constructed comprehensive test cases using Vagrant and Docker, validating patch compatibility with former application versions.
- Analyzed web threats through code review and penetration testing, using tools like Burp Suite, ZAP, and Metasploit, to ensure robust system security.
- Evaluated CMS security, leading to the identification and mitigation of new vulnerabilities.
#### Web Security Research Analyst II
##### SiteLock
###### Scottsdale, AZ
- Managed alert queues to quickly mitigate emerging web threats on customer websites.
- Led malware analysis and signature creation for enhanced web security.
- Performed penetration testing on web applications to identify vulnerabilities, making use of tools like Burp Suite, ZAP, BeEF, Nmap, and Metasploit.
- Initiated a malware trend-tracking program, improving threat prediction accuracy.
- Developed and managed a suite of tools, optimizing company-wide processes.
- Launched a company podcast, significantly boosting brand visibility through creative media.
- Maintained team server and applications, ensuring optimal performance.
#### Lead Web Security Analyst
##### SiteLock
###### Scottsdale, AZ
- Spearheaded team development and mentoring initiatives, including updating and developing processes and procedures.
- Innovated a new team division to enhance customer service and internal career progression.
- Monitored and managed alert queues to ensure customer websites were cleaned of malware quickly and accurately.
- Collaborated with IT and compliance teams to ensure cybersecurity policies aligned with regulatory requirements like SOC2 and PCI DSS.
- Managed and updated the knowledge base, ensuring accurate and updated information.
- Redesigned new hire training materials, elevating departmental knowledge and skills.
- Delivered technical training to new hires, fostering a proficient and competent workforce.
- Mentored 10+ analysts, elevating team performance and career growth.
#### Web Security Analyst II
##### SiteLock
###### Scottsdale, AZ
- Managed alert queues to quickly eradicate malware from customer websites.
- Identified and eliminated web threats using code review and penetration testing.
- Advised and educated customers on best practices and processes for updating web content filtering.
- Streamlined operations via innovative applications in PHP and JavaScript.
- Mastered multiple programming languages and database formats for comprehensive threat analysis.
- Implemented effective problem-solving strategies to ensure website security.
#### Hosting Support
##### Go Daddy
###### Gilbert, AZ
- Assisted customers with troubleshooting issues in their shared hosting accounts.
- Provided support via chat, phone, support tickets, and server support as needed.
- Developed several web-based applications to streamline workflow and improve efficiency.
#### Chat Support
##### Go Daddy
###### Tempe, AZ
- Assisted customers with domain, hosting, email, and billing issues through chat support.
- Utilized multiple chat applications to handle a range of inquiries, from basic maintenance to complex problem-solving.
- Played a key role in training and coaching the support team in India.
#### Online Support
##### Go Daddy
###### Gilbert, AZ
- Provided customer support for account, domain, shared hosting, and server issues via support ticket system.
- Initiated the creation of scripts to automate repetitive tasks, enhancing team efficiency and effectiveness.
#### Server Administrator
##### Terra Del Sol
###### Portland, OR
- Built website using HTML, CSS, and PHP. Maintained website, updating and troubleshooting as needed.
- Maintained the Windows server that housed the customer management software.
***
### THOUGHT LEADERSHIP
#### Cybersecurity Podcasts
##### Acronis Cyber Protection Operations Center News
January 2020 - June 2022 *Acronis*
- Produced 200 webisodes focused on emerging cybersecurity threats.
- Scripted and presented newscasts on camera, bringing complex cybersecurity topics to a broader audience.
- Created graphics and edited video and audio content.
- Published these newscasts on platforms such as YouTube.
##### Decoding Security
June 2017 - October 2018 *SiteLock*
- Produced 29 episodes that delved into the latest cybersecurity news and trends.
- Scripted and presented in-depth stories on critical cybersecurity issues.
- Generated graphics and managed video and audio editing.
- Published content across multiple platforms, including YouTube and Spotify
#### Speaking Engagements
##### Acronis Virtual Conference: See Inside a Live Ransomware Attack Then Learn How to Prevent All of Them (EMEA)
2021-06-16 *Acronis*
Live ransomware demonstration and panel on best practices for preventing attacks
##### Acronis Virtual Conference: See Inside a Live Ransomware Attack Then Learn How to Prevent All of Them (Americas)
2021-06-09 *Acronis*
Live ransomware demonstration and panel on best practices for preventing attacks
##### 2021 Partner Kickoff
2021-02-02 *Acronis*
Moderated discussion with a panel of cybersecurity experts
##### AZTC Cybersecurity Summit
2020-12-02 *Arizona Tech Council and Arizona Cyber Threat Response Alliance*
Panel discussion on the subject of risk management
#### Published Articles
##### Cross-Site Scripting Vulnerability In Download Manager Plugin
2021-06-07 *Wordfence Blog* [Article](https://www.wordfence.com/blog/2022/06/security-vulnerability-download-manager-plugin/)
##### The Cybersecurity CIA Triad: What You Need to Know as a WordPress Site Owner
2021-06-01 *Wordfence Blog* [Article](https://www.wordfence.com/blog/2022/06/the-cybersecurity-cia-triad-what-you-need-to-know-as-a-wordpress-site-owner/)
##### Your CEO Isn't Real: How to Deal With Deep Fakes
2021-12-06 *Security Boulevard* [Article](https://securityboulevard.com/2021/12/your-ceo-isnt-real-how-to-deal-with-deep-fakes/)
##### Ransomware happens, be prepared: Preventing a LockBit attack
2021-09-30 *Adam Fowler IT* [Article](https://www.adamfowlerit.com/2021/09/ransomware-happens-be-prepared-preventing-a-lockbit-attack/)
##### Recovering from a LockBit Ransomware Attack
2021-09-23 *Adam Fowler IT* [Article](https://www.adamfowlerit.com/2021/09/recovering-from-a-lockbit-ransomware-attack/)
##### No user too small to target: A look at the new LockBit ransomware
2021-09-16 *Adam Fowler IT* [Article](https://www.adamfowlerit.com/2021/09/no-user-too-small-to-target-a-look-at-the-new-lockbit-ransomware/)
##### #BHUSA or bust: Hopes and expectations for Black Hat 2021
2021-07-28 *Acronis Blog* [Article](https://www.acronis.com/en-us/blog/posts/bhusa-or-bust-hopes-and-expectations-black-hat-2021) | [Wayback Archive](https://web.archive.org/web/20210728172556/https://www.acronis.com/en-us/blog/posts/bhusa-or-bust-hopes-and-expectations-black-hat-2021)
##### Detonating Ransomware on My Own Computer (Dont Try This at Home)**
2021-07-14 *Bleeping Computer* [Article](https://www.bleepingcomputer.com/news/security/detonating-ransomware-on-my-own-computer-don-t-try-this-at-home/) | [Wayback Archive](https://web.archive.org/web/20210714144322/https://www.bleepingcomputer.com/news/security/detonating-ransomware-on-my-own-computer-don-t-try-this-at-home/)
##### I Triggered a Ransomware Attack – Heres What I Learned
2021-06-23 *Security Boulevard* [Article](https://securityboulevard.com/2021/06/i-triggered-a-ransomware-attack-heres-what-i-learned/) | [Wayback Archive](https://web.archive.org/web/20210623070938/https://securityboulevard.com/2021/06/i-triggered-a-ransomware-attack-heres-what-i-learned/)
##### Is There Hope for ICS and Supply Chain Security?
2021-05-24 *Security Boulevard* [Article](https://securityboulevard.com/2021/05/is-there-hope-for-ics-and-supply-chain-security/) | [Wayback Archive](https://web.archive.org/web/20210524190519/https://securityboulevard.com/2021/05/is-there-hope-for-ics-and-supply-chain-security/)
##### Cybersecurity Predictions For 2021
2021-03-17 *Cyber Defense Magazine* [Article](https://www.cyberdefensemagazine.com/cybersecurity-predictions-for-2021/) |[Wayback Archive](https://web.archive.org/web/20210318020255/https://www.cyberdefensemagazine.com/cybersecurity-predictions-for-2021/)
##### OSAMiner: The Apple cryptojacker that hid for five years
2021-01-28 *Acronis Blog* [Article](https://www.acronis.com/en-us/blog/posts/osaminer-apple-cryptojacker-hid-five-years) | [Wayback Archive](https://web.archive.org/web/20210128194804/https://www.acronis.com/en-us/blog/posts/osaminer-apple-cryptojacker-hid-five-years)
##### 5 Ways to Protect Online Learning Environments
2020-10-23 *Security Boulevard* [Article](https://securityboulevard.com/2020/10/5-ways-to-protect-online-learning-environments/) | [Wayback Archive](https://web.archive.org/web/20201023191257/https://securityboulevard.com/2020/10/5-ways-to-protect-online-learning-environments/)
##### Securing Healthcare Data in a COVID World
2020-09-01 *Security Boulevard* [Article](https://securityboulevard.com/2020/09/securing-healthcare-data-in-a-covid-world/) | [Wayback Archive](https://web.archive.org/web/20200903183508/https://securityboulevard.com/2020/09/securing-healthcare-data-in-a-covid-world/)
##### The 2019 Database Gold Rush
2019-08-08 *SiteLock Blog* [Article](https://www.sitelock.com/blog/the-2019-database-gold-rush/) | [Wayback Archive](https://web.archive.org/web/20190926004030/https://www.sitelock.com/blog/the-2019-database-gold-rush/)
##### The WordPress of the Future
2018-12-28 *SiteLock Blog* [Article](https://www.sitelock.com/blog/2018/12/wordpress-gutenberg/) | [Wayback Archive](https://web.archive.org/web/20190406053041/https://www.sitelock.com/blog/2018/12/wordpress-gutenberg/)
##### When a Good Thing Goes Bad – How Vulnerabilities Were Intentionally Built Into pipdig
2018-04-06 *SiteLock Blog* [Article](https://www.sitelock.com/blog/2019/04/pipdig-vulnerability/) | [Wayback Archive](https://web.archive.org/web/20190406053808/https://www.sitelock.com/blog/2019/04/pipdig-vulnerability/)
##### Malware: The Gift That Keeps on Giving
2017-06-02 *Infosec Island* [Article](http://www.infosecisland.com/blogview/24935-Malware-The-Gift-That-Keeps-on-Giving.html) | [Wayback Archive](https://web.archive.org/web/20170606172629/http://www.infosecisland.com/blogview/24935-Malware-The-Gift-That-Keeps-on-Giving.html)
#### Contributed Content
Articles containing my quotes or research
##### What Does It Take To Be a Cybersecurity Researcher?
2021-04-12 *The Hacker News* [Article](https://thehackernews.com/2021/04/what-does-it-take-to-be-cybersecurity.html) | [Wayback Archive](https://web.archive.org/web/20210412165613/https://thehackernews.com/2021/04/what-does-it-take-to-be-cybersecurity.html)
##### ASIC Cyber Attack Linked to RBNZ Breach
2021-01-26 *The Australian* [Article](https://www.theaustralian.com.au/business/technology/asic-cyber-attack-linked-to-rbnz-breach/news-story/fa4e38dac3db4710bc5c8a46f607aa8d) (requires subscription)
##### ASIC Cyber Attack Linked to RBNZ Breach
2021-01-26 *Daily Telegraph* [Article](https://www.dailytelegraph.com.au/business/asic-cyber-attack-linked-to-rbnz-breach/news-story/fa4e38dac3db4710bc5c8a46f607aa8d) (requires subscription)
##### ASIC sicd by sickening cyber security incident
2021-01-26 *ITWire* [Article](https://www.itwire.com/security/asic-sic-d-by-sickening-cyber-security-incident.html) | [Wayback Archive](https://www.itwire.com/security/asic-sic-d-by-sickening-cyber-security-incident.html)
##### Acronis Cyber Readiness Report: Pandemic reveals cybersecurity gaps, need for new solutions
2020-09-09 *Acronis Blog* [Article](https://www.acronis.com/en-us/blog/posts/acronis-cyber-readiness-report-pandemic-reveals-cybersecurity-gaps-need-new-solutions) | [Report](https://dl.acronis.com/u/rc/WP_Acronis_Cyber_Readiness_Report_EN-US_200908.pdf) | [Wayback Archive (Article)](https://web.archive.org/web/20200910215942/https://www.acronis.com/en-us/blog/posts/acronis-cyber-readiness-report-pandemic-reveals-cybersecurity-gaps-need-new-solutions) | [Wayback Archive (Report)](https://dl.acronis.com/u/rc/WP_Acronis_Cyber_Readiness_Report_EN-US_200908.pdf)
##### VMBlog Expert Interview: Topher Tebow of Acronis Reveals Findings from their 2020 MSP Cybersecurity Readiness Survey
2020-06-09 *VMBlog* [Article](https://vmblog.com/archive/2020/06/09/vmblog-expert-interview-topher-tebow-of-acronis-reveals-findings-from-their-2020-msp-cybersecurity-readiness-survey.aspx) | [Wayback Archive](https://web.archive.org/web/20200619171146/https://vmblog.com/archive/2020/06/09/vmblog-expert-interview-topher-tebow-of-acronis-reveals-findings-from-their-2020-msp-cybersecurity-readiness-survey.aspx)
##### Coronavirus crisis: Online church services attacked by hackers using child pornography
2020-05-16 *Fox News* [Article](https://www.foxnews.com/tech/coronavirus-online-church-services-attacked-child-pornography-hackers) | [Wayback Archive](https://web.archive.org/web/20200515225920/foxnews.com/tech/coronavirus-online-church-services-attacked-child-pornography-hackers)
##### Expert Advice During World Password Day 2020
2020-05-07 *VMBlog* [Article](https://vmblog.com/archive/2020/05/07/expert-advice-during-world-password-day-2020.aspx#.Xsa7HxLQhhH) | [Wayback Archive](https://web.archive.org/web/20200521173300/https://vmblog.com/archive/2020/05/07/expert-advice-during-world-password-day-2020.aspx#.Xsa7WBLANhE)
##### 7 Steps to Web App Security
2019-09-03 *Dark Reading* [Article](https://www.darkreading.com/analytics/7-steps-to-web-app-security/d/d-id/1335695) | [Wayback Archive](https://web.archive.org/web/20190904202018/https://www.darkreading.com/analytics/7-steps-to-web-app-security/d/d-id/1335695)