• Graphic Design
  • Resume
Menu

Josh Deal

joshdeal723@gmail.com
  • Graphic Design
  • Resume

Onit Website Design

Front end web design for onit.com featuring a modular layout with a focus on consistent photo treatment, iconography, and infographic style visual aids.

Onit Screenshot 2.jpg
Onit Screenshot 3.jpg
Onit Screenshot 4.jpg

Onit ebook

An ebook for Onit that guides prospective customers through the process of finding the right Contract Lifecycle Management solution.

Onit-ebook-Modern CLM Solution_Page_01.jpg
Onit-ebook-Modern CLM Solution_Page_03.jpg
Onit-ebook-Modern CLM Solution_Page_04.jpg
Onit-ebook-Modern CLM Solution_Page_06.jpg
Onit-ebook-Modern CLM Solution_Page_09.jpg
Onit-ebook-Modern CLM Solution_Page_10.jpg
Onit-ebook-Modern CLM Solution_Page_11.jpg
Onit-ebook-Modern CLM Solution_Page_12.jpg
Onit-ebook-Modern CLM Solution_Page_16.jpg

Data Archiving

A Collection of spreads from a recent white paper about Data Archiving.

BH-WP_Mock.jpg
BH-WP_Spread_Mock.jpg
bx-Archive-Solution-wp-JD_C2.jpg
bx-Archive-Solution-wp-JD_C3.jpg
bx-Archive-Solution-wp-JD_C4.jpg
bx-Archive-Solution-wp-JD_C5.jpg
bx-Archive-Solution-wp-JD_C6.jpg
bx-Archive-Solution-wp-JD_C9.jpg

ContractWorks ebook

An ebook that reflect the design system of ContractWorks: a contract management software platform.

CW-Ebook-Untapped-Value-Legal_Page_01.jpg
CW-Ebook-Untapped-Value-Legal_Page_02.jpg
CW-Ebook-Untapped-Value-Legal_Page_03.jpg
CW-Ebook-Untapped-Value-Legal_Page_04.jpg
CW-Ebook-Untapped-Value-Legal_Page_05.jpg
CW-Ebook-Untapped-Value-Legal_Page_06.jpg
CW-Ebook-Untapped-Value-Legal_Page_07.jpg
CW-Ebook-Untapped-Value-Legal_Page_08.jpg
CW-Ebook-Untapped-Value-Legal_Page_09.jpg
CW-Ebook-Untapped-Value-Legal_Page_10.jpg
CW-Ebook-Untapped-Value-Legal_Page_11.jpg
CW-Ebook-Untapped-Value-Legal_Page_12.jpg
CW-Ebook-Untapped-Value-Legal_Page_13.jpg

A10 Ebook

An ebook for A10 Networks that provides enterprises with an upgrade path to modernize their application delivery infrastructure.

a10_Ebook_Mock+copy.jpg
A10-EB-1.jpg
A10-EB-2.jpg
A10-EB-3.jpg
A10-EB-4.jpg
A10-EB-5.jpg
A10-EB-6.jpg

The 3 Flavors of DDoS Attacks - ebook

An informative deep dive into into the various methods of DDoS attacks

DDoS-Type_Ebook_Mock copy.jpg
A10-EB-14121-EN_Page_03.jpg
A10-EB-14121-EN_Page_04.jpg
A10-EB-14121-EN_Page_05.jpg
A10-EB-14121-EN_Page_12.jpg
A10-EB-14121-EN_Page_11.jpg
A10-EB-14121-EN_Page_10.jpg
A10-EB-14121-EN_Page_14.jpg
A10-EB-14121-EN_Page_13.jpg

Evolution of the online battlefield

A chronicle of computer security from the earliest days of network exploitation to the current landscape of advanced persistent threat designers. 

Written by Dr. Chase Cunningham

APT_Ebook_Mock copy.jpg
APT_Icons_B.png
Armor-advanced-pesistant-threat-evolution-white-paper_Page_02.png
Armor-advanced-pesistant-threat-evolution-white-paper_Page_03.png
Armor-advanced-pesistant-threat-evolution-white-paper_Page_04 copy.png
Armor-advanced-pesistant-threat-evolution-white-paper_Page_05.png
Armor-advanced-pesistant-threat-evolution-white-paper_Page_06.png
Armor-advanced-pesistant-threat-evolution-white-paper_Page_07.png
Armor-advanced-pesistant-threat-evolution-white-paper_Page_13.png

Application Intelligence Report

The A10 Application Intelligence Report — or AIR — is a global research project that examines the use of apps, behavioral implications on personal security, and the potential effect on corporate security as employee tendencies occur within the work environment.

Screen Shot 2019-06-18 at 5.19.20 PM.png
Screen Shot 2019-06-18 at 5.06.08 PM.png
Screen Shot 2019-06-18 at 5.17.44 PM.png
Screen Shot 2019-06-18 at 5.06.45 PM.png
Screen Shot 2019-06-18 at 5.06.23 PM.png
Screen Shot 2019-06-18 at 5.07.22 PM.png
Screen Shot 2019-06-18 at 5.07.05 PM.png

Social & Web Page Banners

A series of web banners promoting a quarterly publication showcasing professional mock ups.

Radar13 Blog 1920x1080.jpg
Radar-13-1.jpg
Radar-13-2.jpg
DT-Mockup.jpg

Armor Playing Cards

This limited edition security themed playing cards is the fifth in the series and were handed out at Black Hat USA in 2016. The deck features fully custom back design, Ace of Spades, courts and Joker cards which bear the black and red “Hacker”. There are hidden surprises in the artwork. For example, the “suicide king" has "Strike Ratio" on his sash, while the Jack of Hearts represents the various “Points of Risk” and Jack of Clubs is the “Defence” card.
 

File 10-12-16, 22 09 38.jpeg
apc1.jpg
apc2.jpg
apc3.jpg
File 10-12-16, 22 10 04.jpeg

The Fight for Creative IP

A case study for Armored Info and their business relationship with Armor Security. Armored Info secures intellectual property for artists industries such as music and film in order to prevent their work from being leaked to the public. 

Armor-Armored-Info-case-study-1_Page_1.png
Armor-Armored-Info-case-study-1_Page_2.png
Armor-Armored-Info-case-study-1_Page_3.png
Armor-Armored-Info-case-study-1_Page_4.png
Armor-Armored-Info-case-study-1_Page_5.png
Armor-Armored-Info-case-study-1_Page_6.png

Enterprise Legal Reputation Report

ELR-2023-legals evolving role.png
ELR-2023-Ch1-Positive Interaction-C.png
ELR-2023-Ch1-Elevating Efficiency.png

Insider threat infographic

BH IG Insider Crime-B-1 copy.jpg

Armor War Stories

Illustrated true life accounts of Armor's Security Operations Center. These are step-by-step accounts of the wide range of data breach types that exist in today's world. Discover how they are detected, monitored and finally resolved. Attack types include SQL Injections, Malware Attacks and Data Exfiltrations. Each infographic includes an attack-response summary. 

Armor_SQL_Injection copy.png
Armor_E_Commerce_Malware.png

Connect the Clouds

An infographic that illustrates how to carry out a successful multi-cloud strategy. The infographic uses illustrated statistics that define the different type of cloud environments, the threat atmosphere and ultimately the security concerns and solutions.

Armor_Connect-the-Clouds_D-01.png

Data Classification: A New Perspective

An infographic that illustrates the various types of data that exists in an IT environment and how to properly classify it. Designed to show IT professionals the kind of data that has significant value and the risks that exist if it is not properly classified.

Armor-Data-Classification-infographic_Web.png

Promotional T-shirts

T-shirts and Stickers for give away promotional at trade shows

A10-DELL-Dig-Trans_Shirt-A.jpg
A10-DELL-Dig-Trans_Shirt-B.jpg
A10-DELL-Dig-Trans_Shirt-C.jpg
Dig-Trans_Shirt-Mock_B.jpg
Dig-Trans_Shirt-Mock_C.jpg

The Original Oklahoma Breakdown

A documentary premiering at film festivals about a highly skilled guitarist/multi-instrumentalist’s life and career with music.

https://oklahomabreakdown.com

Hosty_Poster_Mock.jpg
Hosty_Laptop copy.jpg
Collage.png

TRU - Threat Resistance Unit

A developed brand for FireHost/Armor's Threat Resistant Unit. The logo is designed to mimic customized military unit patches. TRU was comprised of military-grade cyber security experts who learned the trade at an advanced level in the armed-forces.

Bi-weekly educational videos were posted that explained the latest threat landscape trends and advice on how to stay protected.

TRU_Logo_website.png
TRU_Web_Banners_website.png
TRU_Screenshot.png
TRU_Shirt.png

Events Landing Pages

LP MockupD.jpg
LP MockupC.jpg
LP MockupB.jpg

Game Over - Your Compliance Checklist Amuses Me

A white paper that describes why compliance checklists are not enough to secure your environment. 

Game_Over_Cover.png
Game_Over_1.png
Game_Over_2.png
Game_Over_3.png

Threat Intel Brief Ad

An ad that was utilized to promote Armor's Threat Intelligence. Designed for an ebook, the call to action would lead the reader to sign up for Armor's threat Intelligence briefing. A monthly newsletter that exposes all the latest hacking trends and how they are being tracked by Armor's Security Operations Center.

Theat Intel ad Final.png

Bodhala Print Ad

Bodhala_GCC_Comps_Page_1.png

Kitchen Design Concepts

The logo treatment is a simple solution that conveys design ideas are always turned on at Kitchen Design Concepts.

KDC_logo.png
KDC_stationary.png
prev / next
Back to Graphic Design
Onit-Web_Thumb.jpg
4
Onit Website Design
Onit-ebook_Thumb.jpg
9
Onit ebook
BH-WP.jpg
8
Data Archiving White Paper
CW-ebook_Thumb.jpg
13
ContractWorks ebook
A10-ebook-IG_Thumb.jpg
7
A10 Ebook
DDoS_Type_Ebook_Thumb.jpg
9
DDoS Attack Types
APT_D_EP_Labeled_Thumb.png
9
Evolution of the online battlefield
AIR_Thumb_D.png
7
Application Intelligence Report
4
Social & Web Page Banners
Cards_Thumb_D.png
5
Armor Playing Cards
Armored_Info_D_Labeled_Thumb.png
6
The Fight for Creative IP
ELR-IG-thumb.jpg
3
Enterprise Legal Reputation Report
BH-IG_Thumb.jpg
1
Insider threat infographic
Warstories_D_Labeled_Thumb.png
2
Armor War Stories
CTC_D_Labeled_Thumb.png
1
Connect the Clouds
Data_Classification_D_Labeled.png
1
Data Classification: A New Perspective
Trans Shirt Thumb.jpg
5
Promotional T-shirts
Hosty_Thumb.jpg
3
The Original Oklahoma Breakdown
TRU_D_Labeled.png
4
TRU - Threat Resistance Unit
LP-Thumb.jpg
3
Events Landing Pages
Game_Over_D.png
4
Game Over - Your Compliance Checklist Amuses Me
SecOps_Ad_Labeled_D_Thumb.png
1
Threat Intel Brief Ad
Bodhala Ad_Thumb.jpg
1
Bodhala Print Ad
KDC_Thumb_D.png
2
Kitchen Design Concepts