Welcome to my online portfolio.

Listed below are details about myself, including my personal projects.

Hero Imgs
About

Elijah Winter

Dedicated and highly motivated skilled Cyber Security Specialist, seeking a challenging off-hours position as a Cyber Security Specialist, IT Consultant, Backend Engineer and Data Scientist that promotes learning and growth.

Skills

img

Hardware

  • HP
  • Dell
  • Apple
  • Lenovo

img

Operating Systems & Cloud Environments

  • AWS
  • Azure
  • Linux
  • Docker
  • OSX
  • Windows

img

Programming Languages

  • C
  • CSS
  • Java
  • HTML
  • Python
  • Javascript

img

Machine Learning

  • NLP (Topic Modeling)
  • Sentiment Analysis
  • Large Language Models (LLMs)

img

Software

  • FTK
  • NMap
  • Kibana
  • Encase
  • Ansible
  • VMWare
  • Wireshark
  • Metasploit
  • Aircrack-ng

img

Databases

  • SQL
  • ElasticSearch
  • PostgreSQL

img

Networking

  • VPNs
  • DHCP
  • VLANs
  • Routing
  • Subnetting
  • Switching
  • IP Addressing

img

Standards

  • FISMA
  • NIST 800
  • CIS 20 Controls
  • MITRE Attack Framework

My Personal Projects

Personal projects that I work on during my free time.

img

Cloud Access Analyzer

Created a tool that will analyze your cloud environment and give you a report of potential access control issues, including outlining any trust boundary crossings.

View Source Code
img

NetSecure Dashboard

Created an HTML dashboard for my network. It is a landing page for all services but also has some different features.

View Source Code
img

Enron Data Science

Used the Enron Email dataset to practice data science. With this dataset I have done LDA and communication Clustering.

View Source Code (LDA)
View Source Code (Clustering)
img

NetSecure Home Lab

Created and managed an enterprise network called NetSecure. The link below will show a basic network map of NetSecure.

More Info

Experience

Senior Security Engineer


  • Worked with developer teams to use ABAC + FGAC for authorization
  • Advised healthcare businesses on ways to enhance security and privacy
  • Created tool to manage and visualize an application’s security posture at scale
  • Created tool to standardize security and privacy detections
  • Worked with application security teams to review new products to ensure secure launches
  • Spoke with customers to advise them on the security of their products and companies

Senior AI Security Engineer


  • Assisted in creating Amazon’s AI Security Org
  • Created standards and guidance for AI Security across Amazon
  • Created builder guidance on how to develop AI securely
  • Assisted in creating tooling to automate security of AI
  • Created metrics framework and automation to monitor security of developed AI systems
  • Consulted on Application Security issues across the company
  • Worked with VPs and CISOs to ensure AI Security Bar is met on internally developed software
  • Completed Secure Design Reviews for developed systems with Software Development Engineers
  • Created data discovery and classification tool
  • Applied Cyber Security best practices to systems

Insider Threat Security Engineer


  • Built foundation for investigations team:
  • Methodology
  • Scope Definition
  • Policy Creatio
  • SOPs
  • Investigated insider threat issues from machine and human reported events
  • Created new insider threat detections
  • Created automated response workflows
  • Created automated communicate bots to gather information
  • Created Risk Scoring Tool

Cyber Security Specialist


  • Researched APTs and IOCs, creating a correlation database
  • Worked in automating tasks to improve work efficiency
  • Created new workflows for data analytics
  • Coordinated efforts with other offices
  • Worked on Data Science projects
  • Was a Systems Administrator on several networks
  • Applied Cyber Security best practices to systems

Digital Forensics Engineer Intern


  • Researched new file formats, mobile devices and storage devices
  • Assisted with scientific research, collection, processing, analyzing and presented findings in support of vulnerability mitigation, data recovery, and assessing and identifying malicious behaviors within digital datasets
  • Wrote scripts/code to help develop new information recovery techniques and threat identification methods

E-Discovery and Digital Forensics Intern


  • Prepped assets for imaging
  • Preserved data from assets and documented Chain of Custody
  • Updated Licenses
  • Imaged computers for internal use