Introducing our new Digital Marketing Assistant: James Burlton

May 27, 2021

To end the month of May, we at JC Cyber Security are thrilled to introduce the newest member to the team: James Burlton our Digital Marketing Assistant. 

Walsall born and bred, James is a courteous, eager, and geeky digital marketer who has successfully worked with a variety of high-profile clients including Jack Whitehall, Google/YouTube, Russell Brand, The San Diego County Fair, and many other clients across the UK. Passionate about all things IT, James spends his free time looking up the latest hardware and software-related trends predicting and speculating how they may impact our everyday lives. 

Some of James' greatest achievements include:

  • Playing an active role in British comedian and actor, Jack Whitehall’s online presence by growing his online following on Facebook, Twitter, Instagram, and YouTube up to 8.4m followers

  • Creating and completing social media marketing campaigns for Netflix specials: Travels with my Father series 1 & 2, Sky One’s: Bounty Hunters, and BBC’s: Decline and Fall

  • Working alongside Google/YouTube to launch and promote YouTube original series: Training Days

  • Helping design, develop and maintain 50+ client websites including Jimmy Carr, Sarah Millican, Russell Brand, Frankie Boyle, Micky Flannagan, and The San Diego County Fair

James' early career and introduction to the world of Cyber Security

James’ first introduction to working life officially started in 2017 at a distinguished Oxford-based marketing agency, Mass Impressions. James and the team oversaw the transition from a web development-based business approach to a marketing-based business model due to the needs of their clientele. 


This transitional period introduced James to the world of marketing as he embarked on the journey of mastering many of the core components of digital marketing such as SEO, social media management, analytics and reporting, photo/video editing, and content marketing.

Newfound passion for cyber security

After returning to his hometown in the Midlands, James identified and developed a burning passion for Cyber Security. Learning from his past experiences and with the introduction of the GDPR legislation, James understood the potential risks the future may hold as the world continues to become more dependent on technology. 

To kickstart his way into the industry, James undertook a 6-month training course to achieve a certificate in Information Security Management Principles (CISMP). This passion and commitment to the world of Cyber Security is exactly why we at JC Cyber Security believe James will be an incredible fit for our growing team of cyber experts.

Want to become the next member of JC Cyber Security? We are hiring!

Are you within the Kickstarter requirements? Do you want the opportunity to start your career through an exciting paid work placement while developing your skills & employability? Then we have a great opportunity for you! 

JC Cyber Security is looking for someone to help provide protection, understanding, and peace of mind from cyber threats for all types of businesses. 

If you feel that you would be a good fit at JC Cyber Security as a Cyber Security Engineer, then click
here to find out more.

Follow Us

Be the first to know

You might also like

October 14, 2024
DevOps is a popular practice, especially among large organizations. However, while it comes with numerous benefits, it presents numerous risks as well. One notable challenge is the increased velocity of deployment, which often complicates how developers implement and ensure application security throughout the development and deployment process. DevOps is a popular practice, especially among large organizations. However, while it comes with numerous benefits, it presents numerous risks as well. One notable challenge is the increased velocity of deployment, which often complicates how developers implement and ensure application security throughout the development and deployment process. According to a recent survey, almost 80% of CIOs expressed concerns about the difficulty of discerning trusted elements from untrusted ones within DevOps environments. In particular, the pressure to deliver services at a faster pace sometimes prompts DevOps teams to take security shortcuts, resulting in potentially costly repercussions. These include data breaches, application downtime, and compliance violations.  So, how can you strike a balance between the demand for agile DevOps practices and the need to maintain robust security measures?
October 4, 2024
Testing applications for security flaws during production is a vital process of the development lifecycle, and this is where Dynamic Application Security Testing (DAST) comes in. DAST is a security testing approach in application security (AppSec), in which testers assess an application in real-time, while it’s actively running. This process can be conducted even without testers knowing the application’s internal interactions or system-level designs. Applications fuel the engine of the world’s economy, but enterprises can encounter substantial hurdles when striving to retain a competitive advantage in a rapidly changing digital landscape. Businesses must continuously pursue inventive solutions, even as they contend with sophisticated adversaries looking to exploit opportunities to disrupt operations, compromise vital information, and inflict harm. According to recent research, approximately 17% of cyberattacks aim to exploit vulnerable web applications. Yet, 98% of web applications are susceptible to attacks that can lead to malware infection or redirect users to malicious websites. All the while, 72% of these vulnerabilities result from coding errors. Testing applications for security flaws during production is a vital process of the development lifecycle, and this is where Dynamic Application Security Testing (DAST) comes in. DAST is a security testing approach in application security (AppSec), in which testers assess an application in real-time, while it’s actively running. This process can be conducted even without testers knowing the application’s internal interactions or system-level designs.  This is because DAST tools operate without access to the application’s source code. Instead, they emulate genuine attacks, akin to those carried out by real hackers, to identify security weaknesses. This “black box” testing method examines the application from an external perspective, scrutinises its runtime behaviour, and observes how it reacts to simulated attacks. These simulations help evaluate whether the application exhibits vulnerabilities and if it is potentially susceptible to malicious attacks.
September 25, 2024
In this blog post we look back at the origin of the term “hacking”, as well as how activities that might be described as hacking have existed throughout history, even prior to the advent of computer systems – and what if anything these can teach us today. Hacking is attacking and breaking into computer systems illegally… isn’t it? The meaning of the term “hacking” has in fact changed substantially over time, morphing from describing essentially benign (or at worst mildly disruptive) activities into its modern attribution to largely criminal and illegal activities. What’s more, in its original usage, “hacking” doesn’t necessarily even need to involve computer systems at all.  In this blog post we look back at the origin of the term “hacking”, as well as how activities that might be described as hacking have existed throughout history, even prior to the advent of computer systems – and what if anything these can teach us today.
More Posts
Share by: