Skip to content
View aawinston11's full-sized avatar

Block or report aawinston11

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
aawinston11/README.md

Andre Winston II

Security operations engineer (8 years), CISSP. Building AI-augmented detection and response — agentic triage, prompt-injection-resistant copilots, MCP-driven SecOps tooling, and the detection-as-code and host hardening that hold it up.


Three pillars — agents, detection, foundations. AI-assisted, human-validated. Synthetic data only; nothing here references any employer system or production telemetry.

MCP demo: spawn server, exercise 5 SecOps tools, structured output prints

Project Headline
MCP Security Tooling Server MCP server exposing a synthetic SIEM/EDR API to LLM agents over stdio. 5 read tools, HMAC-chained tamper-evident audit log, 18/18 tests.
LLM Alert Triage Hybrid Anthropic + OpenAI agent over the MCP server. Untuned baseline: Anthropic 67% verdict accuracy / $0.26, OpenAI 53% / $0.06. Three-iteration prompt-tuning arc surfaced a provider-asymmetric regression — writeup.
IR Copilot Single-turn copilot that turns Slack-style incident transcripts into structured IR docs. Three-layer prompt-injection defense: 6/6 red-team cases held on both Anthropic + OpenAI, 100% status accuracy on the happy path.
Detection-as-Code 5 Sigma rules across 5 ATT&CK tactics with positive + negative log fixtures. In-process Sigma evaluator + purple-team runner. 15/15 positives matched, 0/14 false negatives. ATT&CK Navigator coverage export, Splunk SPL conversion.
Linux Hardening Role Idempotent Ansible role for Ubuntu 22.04: SSH, UFW, PAM, auditd, fail2ban, kernel sysctl. Lynis baseline/post evidence + safe rollback.

Posture (post /cso audit, 2026-05-08): SHA-pinned CI actions across all jobs · weekly Dependabot · gitleaks pre-commit hook · main branch-protected with required CI checks · 0 CVEs across all 4 Python projects · audit report committed.


Credentials


Connect

Pinned Loading

  1. security-engineering-portfolio security-engineering-portfolio Public

    Python

  2. MonitoringEnvironmentSplunk MonitoringEnvironmentSplunk Public

  3. VulnerabilityManagementLab VulnerabilityManagementLab Public