Security Projects & Case Studies

Real security challenges I've solved for real companies. Each project shows the business problem, technical solution, and measurable impact.

Note: Some details are anonymized or aggregated to protect client confidentiality.

Security Automation Platform for Growing SaaS Company

B2B SaaS Startup | 6 Weeks | Python, AWS Lambda, Terraform

THE CHALLENGE:

A Series A SaaS company with 200+ customers was conducting security reviews manually for every new feature launch. Reviews took 3-5 days, slowing down development velocity and frustrating product teams. With plans to triple their customer base, they needed security to scale without adding headcount.

THE SOLUTION:

Built an automated security review platform that integrated into their CI/CD pipeline, providing immediate security feedback to developers without manual intervention.

Key components:

  • Automated static code analysis integrated into GitHub pull requests
  • Dynamic API security testing in staging environments
  • Dependency vulnerability scanning with auto-remediation recommendations
  • Security metrics dashboard showing trends and high-risk areas
  • Custom detection rules for their specific compliance requirements (HIPAA)

THE RESULTS:

  • Reduced security review time from 3-5 days to <4 hours (95% reduction)
  • Caught 40+ vulnerabilities before production in first 90 days
  • Freed security team to focus on architecture instead of repetitive reviews
  • Enabled 2x increase in deployment frequency without compromising security
  • Zero security incidents in the 12 months following implementation

Enterprise IAM Overhaul for Healthcare Platform

Healthcare Tech Company | 8 Weeks | Node.js, PostgreSQL, AWS Cognito

THE CHALLENGE:

A healthcare technology platform had outgrown their simple role-based permission system. They needed fine-grained access control where doctors could only see patients they're treating, administrators could manage their facility but not others, and insurance partners could access aggregate data but not PHI. Their existing codebase had permission checks scattered everywhere, making changes risky and slow.

THE SOLUTION:

Migrated from basic RBAC to an attribute-based access control (ABAC) model with centralized policy enforcement.

Key components:

  • Designed ABAC model supporting complex healthcare access rules
  • Centralized policy engine replacing scattered permission checks
  • Database schema migration to support attribute-based queries
  • Policy-as-code framework enabling non-engineers to update rules
  • Comprehensive audit logging for HIPAA compliance

THE RESULTS:

  • Reduced unauthorized access attempts by 42% through better enforcement
  • Cut time to implement new permission rules from 2 weeks to 2 days
  • Reduced permission-related code by 60% through centralization
  • Passed HIPAA audit with zero access control findings
  • Enabled new business model (facility-specific pricing) previously impossible

"Elijah didn't just build us a permission system—he taught us how to think about access control at scale. Six months later, we're still finding new use cases the framework handles elegantly."

VP Engineering, Healthcare Platform

Security Incident Response for E-commerce Platform

E-commerce Startup | 10 Days | Digital Forensics, Python, AWS

THE CHALLENGE:

An e-commerce platform detected unusual API activity suggesting unauthorized access to customer data. They weren't sure what was compromised, how the attacker got in, or if the breach was still active. With thousands of customers potentially affected and a legal obligation to report within 72 hours, they needed fast, definitive answers.

THE SOLUTION:

Led complete incident response from detection through remediation and post-mortem.

Investigation & Containment:

  • Forensic analysis of application logs, database queries, and AWS CloudTrail
  • Identified attack vector (exposed API endpoint with weak authentication)
  • Determined scope: 1,247 customer records accessed over 6 days
  • Contained breach by rotating credentials and patching vulnerability
  • Collected evidence for potential law enforcement reporting

Remediation & Prevention:

  • Implemented API authentication and rate limiting
  • Added monitoring alerts for similar access patterns
  • Conducted security audit of remaining endpoints
  • Created incident response playbook for future events

THE RESULTS:

  • Fully contained breach within 18 hours of engagement
  • Determined exact scope for accurate customer notification
  • Provided documentation meeting legal reporting requirements
  • Zero additional customer records compromised after containment
  • Prevented estimated $200K+ in potential regulatory fines through proper handling
  • Company maintained customer trust through transparent, professional response

AI Security Framework for ML Platform

AI/ML SaaS Company | 5 Weeks | Python, MLOps, AWS SageMaker

THE CHALLENGE:

An AI-powered analytics platform was preparing for Series B funding. Investors were asking detailed questions about AI security: "How do you prevent prompt injection? What's your model governance? How do you secure training data?" The team had strong ML expertise but limited security experience, and generic security consultants didn't understand AI-specific risks.

THE SOLUTION:

Implemented comprehensive AI security framework based on Amazon's AI security standards, adapted for their startup scale.

Key components:

  • Threat model for their specific AI architecture (fine-tuned LLMs for data analysis)
  • Input validation and sanitization to prevent prompt injection attacks
  • Model output filtering to prevent data leakage
  • Secure model training pipeline with data lineage tracking
  • Access controls for model artifacts and training data
  • Monitoring for adversarial inputs and model behavior anomalies

THE RESULTS:

  • Identified and fixed 12 AI-specific security vulnerabilities
  • Passed investor security review with zero critical findings
  • Closed Series B at $18M valuation (security cited as competitive advantage)
  • Reduced AI model deployment security review from 2 weeks to 2 days
  • Framework now used for 15+ models in production
  • Zero AI security incidents in 18 months since implementation

"As ML engineers, we knew our models worked—but we didn't know if they were secure. Elijah brought real-world experience from Amazon's AI Security org. His framework gave us credibility with enterprise customers we couldn't have built ourselves."

CTO, AI/ML Platform

SOC 2 Compliance Preparation

Series A SaaS Company | 12 Weeks | Multi-Cloud, Policy Development

THE CHALLENGE:

A fast-growing SaaS company needed SOC 2 Type II certification to close enterprise deals, but had been moving too fast to think about compliance. They had 6 months until their largest prospect's deadline and no idea where they stood on SOC 2 requirements.

THE SOLUTION:

Conducted gap analysis and implemented security controls to achieve SOC 2 Type II compliance.

Key components:

  • Access control policies and implementation (principle of least privilege)
  • Encryption at rest and in transit across all data stores
  • Logging and monitoring infrastructure for audit trails
  • Incident response procedures and documentation
  • Vendor risk management program
  • Security awareness training program
  • Business continuity and disaster recovery plans
  • Change management and code review processes

THE RESULTS:

  • Passed SOC 2 Type II audit on first attempt with zero findings
  • Completed in 5.5 months (ahead of 6-month deadline)
  • Closed $1.2M enterprise deal that required certification
  • Unlocked 12+ additional enterprise sales opportunities
  • Improved actual security posture (not just paperwork compliance)
  • Built compliance foundation for future certifications (ISO 27001, HIPAA)

More Work Examples

Beyond these detailed case studies, I've worked on:

Insider Threat Detection (Amazon)

Built automated detection system that investigated 200+ potential insider threat incidents, achieving 95% case closure rate within SLA. Created 12 new behavioral detection rules reducing manual investigation time by 66%.

Security Posture Management Tool (Amazon)

Architected tool visualizing security posture for 100,000+ applications, reducing security review time by 15% and enabling real-time risk assessment across AWS organization.

Security Analytics Data Lake (Amazon)

Designed data lake processing 10TB+ daily security events, enabling real-time threat detection and reducing false positives by 30% across 18 security teams.

Cloud Migration Security (Multiple Clients)

Secured cloud migrations for 5+ companies moving from on-premise to AWS/Azure, ensuring zero security incidents during transitions and improved security posture post-migration.

Security Training Program (Amazon)

Designed and launched engineering bootcamp for 25+ junior security engineers, reducing onboarding time by 40% and expanding team capabilities.

Have a Similar Challenge?

These projects show the range of security work I do—from strategic frameworks to hands-on incident response. If you're facing something similar, let's talk about how I can help.