Security Projects & Case Studies

Real security challenges I've solved for real companies. Each project shows the business problem, technical solution, and measurable impact.

Note: Some details are anonymized or aggregated to protect client confidentiality.

Enterprise IAM Overhaul for Healthcare Platform

THE CHALLENGE:

A healthcare technology platform had outgrown their simple role-based permission system. They needed fine-grained access control where doctors could only see patients they're treating, administrators could manage their facility but not others, and insurance partners could access aggregate data but not PHI. Their existing codebase had permission checks scattered everywhere, making changes risky and slow.

THE SOLUTION:

Migrated from basic RBAC to an attribute-based access control (ABAC) model with centralized policy enforcement.

Key components:

  • Designed ABAC model supporting complex healthcare access rules
  • Centralized policy engine replacing scattered permission checks
  • Database schema migration to support attribute-based queries
  • Policy-as-code framework enabling non-engineers to update rules
  • Comprehensive audit logging for HIPAA compliance

THE RESULTS:

  • Reduced unauthorized access attempts by 42% through better enforcement
  • Cut time to implement new permission rules from 2 weeks to 2 days
  • Reduced permission-related code by 60% through centralization
  • Passed HIPAA audit with zero access control findings
  • Enabled new business model (facility-specific pricing) previously impossible

"Elijah didn't just build us a permission system—he taught us how to think about access control at scale. Six months later, we're still finding new use cases the framework handles elegantly."

Sr SDE, Healthcare Platform

Security Incident Response

THE CHALLENGE:

Customer's platform detected unusual API activity suggesting unauthorized access to customer data. They weren't sure what was compromised, how the attacker got in, or if the breach was still active. With thousands of customers potentially affected and a legal obligation to report within 72 hours, they needed fast, definitive answers.

THE SOLUTION:

Led complete incident response from detection through remediation and post-mortem.

Investigation & Containment:

  • Forensic analysis of application logs, database queries, and Cloud Logs
  • Identified attack vector (exposed API endpoint with weak authentication)
  • Contained breach by rotating credentials and patching vulnerability
  • Collected evidence for potential law enforcement reporting

Remediation & Prevention:

  • Implemented API authentication and rate limiting
  • Added monitoring alerts for similar access patterns
  • Conducted security audit of remaining endpoints
  • Created incident response playbook for future events

THE RESULTS:

  • Fully contained breach within 18 hours of engagement
  • Determined exact scope for accurate customer notification
  • Provided documentation meeting legal reporting requirements
  • Zero additional customer records compromised after containment
  • Company maintained customer trust through transparent, professional response

AI Security Framework for ML Platform

THE CHALLENGE:

An AI-powered product platform was preparing for launch. Leaders were asking detailed questions about AI security: "How do you prevent prompt injection? What's your model governance? How do you secure training data?" The team had strong ML expertise but limited security experience, and generic security consultants didn't understand AI-specific risks.

THE SOLUTION:

Implemented comprehensive AI security framework adapted for their specific business needs.

Key components:

  • Threat model for their specific AI architecture (fine-tuned LLMs for data analysis)
  • Input validation and sanitization to prevent prompt injection attacks
  • Model output filtering to prevent data leakage
  • Secure model training pipeline with data lineage tracking
  • Access controls for model artifacts and training data
  • Monitoring for adversarial inputs and model behavior anomalies

THE RESULTS:

  • Identified and fixed 12 AI-specific security vulnerabilities
  • Passed leadership-level security review with zero critical findings
  • Reduced AI model deployment security review from 2 weeks to 2 days
  • Framework now used for 15+ models in production

More Work Examples

Beyond these detailed case studies, I've worked on:

Insider Threat Detection

Built automated detection system that investigated 200+ potential insider threat incidents, achieving 95% case closure rate within SLA. Created 12 new behavioral detection rules reducing manual investigation time by 66%.

Security Posture Management Tool

Architected tool visualizing security posture for 100,000+ applications, reducing security review time by 15% and enabling real-time risk assessment across AWS organization.

Security Analytics Data Lake

Designed data lake processing 10TB+ daily security events, enabling real-time threat detection and reducing false positives by 30% across 18 security teams.

Cloud Migration Security

Secured cloud migrations for 5+ companies moving from on-premise to AWS/Azure, ensuring zero security incidents during transitions and improved security posture post-migration.

Security Training Program

Designed and launched engineering bootcamp for 25+ junior security engineers, reducing onboarding time by 40% and expanding team capabilities.

Have a Similar Challenge?

These projects show the range of security work I do—from strategic frameworks to hands-on incident response. If you're facing something similar, let's talk about how I can help.