Real security challenges I've solved for real companies. Each project shows the business problem, technical solution, and measurable impact.
Note: Some details are anonymized or aggregated to protect client confidentiality.
A healthcare technology platform had outgrown their simple role-based permission system. They needed fine-grained access control where doctors could only see patients they're treating, administrators could manage their facility but not others, and insurance partners could access aggregate data but not PHI. Their existing codebase had permission checks scattered everywhere, making changes risky and slow.
Migrated from basic RBAC to an attribute-based access control (ABAC) model with centralized policy enforcement.
Key components:
"Elijah didn't just build us a permission system—he taught us how to think about access control at scale. Six months later, we're still finding new use cases the framework handles elegantly."
— Sr SDE, Healthcare Platform
Customer's platform detected unusual API activity suggesting unauthorized access to customer data. They weren't sure what was compromised, how the attacker got in, or if the breach was still active. With thousands of customers potentially affected and a legal obligation to report within 72 hours, they needed fast, definitive answers.
Led complete incident response from detection through remediation and post-mortem.
Investigation & Containment:
Remediation & Prevention:
An AI-powered product platform was preparing for launch. Leaders were asking detailed questions about AI security: "How do you prevent prompt injection? What's your model governance? How do you secure training data?" The team had strong ML expertise but limited security experience, and generic security consultants didn't understand AI-specific risks.
Implemented comprehensive AI security framework adapted for their specific business needs.
Key components:
Beyond these detailed case studies, I've worked on:
Built automated detection system that investigated 200+ potential insider threat incidents, achieving 95% case closure rate within SLA. Created 12 new behavioral detection rules reducing manual investigation time by 66%.
Architected tool visualizing security posture for 100,000+ applications, reducing security review time by 15% and enabling real-time risk assessment across AWS organization.
Designed data lake processing 10TB+ daily security events, enabling real-time threat detection and reducing false positives by 30% across 18 security teams.
Secured cloud migrations for 5+ companies moving from on-premise to AWS/Azure, ensuring zero security incidents during transitions and improved security posture post-migration.
Designed and launched engineering bootcamp for 25+ junior security engineers, reducing onboarding time by 40% and expanding team capabilities.