Cameron Wade, Developer in Salt Lake City, UT, United States
Cameron is available for hire
Hire Cameron

Cameron Wade

Verified Expert  in Engineering

Cloud Security Developer

Location
Salt Lake City, UT, United States
Toptal Member Since
February 22, 2022

Cameron is a cloud and security professional with over ten years of information technology experience. He's helped companies design and implement secure AWS cloud architectures that scale efficiently. With a master's of science degree in cyber security operations and two AWS certifications—AWS-SAA and AWS Security Specialty—Cameron believes in simplifying processes to enable software engineers to build superior products.

Portfolio

Color Health, Inc.
Amazon Web Services (AWS), Terraform, GitHub, Git, Python 3, Django...
Alteryx
Cloud Security, Compliance, Amazon Virtual Private Cloud (VPC)...
PagerDuty
AWS SDK, Ruby, Python, Linux, Chef, Amazon Web Services (AWS), Security...

Experience

Availability

Part-time

Preferred Environment

Amazon Web Services (AWS), GitHub, Python, Terraform, MacOS, Slack, Docker, AWS SDK, Cloud Security, Cloud Infrastructure

The most amazing...

...platform I've built consisted in taking a legacy on-premise infrastructure stack and moving it to a cloud-based platform that included EC2, Serverless, and EKS.

Work Experience

Senior Security Engineer

2022 - PRESENT
Color Health, Inc.
  • Refactored all audit trail logging for identity and cloud systems to be delivered to a SIEM with priority alerts related to the activity going to PagerDuty. This involved moving all configurations into Terraform and following AWS best practices.
  • Fixed critical identity and access management policies and permissions and implemented new roles following least privilege principles.
  • Researched, tested, and deployed a new phishing service for the company to improve phishing detection in corporate mailboxes. This improved email phishing detection throughout the company and provided a lot of value when reporting phishing.
  • Provided product and application security guidance for core products running on Python 3 with Django. Reviewed and implemented best practices for code scanning or using secure modules.
Technologies: Amazon Web Services (AWS), Terraform, GitHub, Git, Python 3, Django, Identity & Access Management (IAM), Okta, Security

Senior Cloud Security Architect

2021 - 2022
Alteryx
  • Designed controls for cloud security components and created plans for their implementation.
  • Deployed a DaemonSet-based security agent to Kubernetes clusters for security monitoring.
  • Worked with the senior leadership and architecture team to create solutions that meet organizational long-term goals.
Technologies: Cloud Security, Compliance, Amazon Virtual Private Cloud (VPC), Amazon Web Services (AWS), Architecture, Security, Identity & Access Management (IAM)

Security Engineer

2021 - 2021
PagerDuty
  • Deployed and maintained security tooling and features for cloud infrastructure that include cloud-native tooling and licensed applications.
  • Provided architectural guidance and review on security features for product or internal tooling.
  • Owned identity and access management processes and built processes around provisioning the least privileged roles and users.
Technologies: AWS SDK, Ruby, Python, Linux, Chef, Amazon Web Services (AWS), Security, Identity & Access Management (IAM)

Platform Security Engineer

2020 - 2021
CHG Healthcare
  • Integrated security into CI/CD pipelines to provide code scanning and vulnerability management.
  • Owned the architecture and engineering of security solutions to protect cloud deployments running on AWS and Kubernetes.
  • Implemented and maintained tooling to deploy intrusion detection and vulnerability management solutions into AWS at scale.
Technologies: Terraform, Cloud Security, Python, SaltStack, AWS CloudFormation, Kubernetes, Amazon Virtual Private Cloud (VPC), Amazon Web Services (AWS), Security, DevOps, Identity & Access Management (IAM)

Platform Engineer

2018 - 2020
CHG Healthcare
  • Built CI/CD pipelines for engineering teams to efficiently deliver products on multiple public and private clouds like on-premise, Heroku, and AWS.
  • Developed Terraform modules to deploy various AWS services and cloud infrastructure at scale.
  • Managed enterprise tooling such as Elastic Cloud, AWS, SaltStack, GitHub, Okta, and supported engineering teams with integrations to these tools.
Technologies: SaltStack, Terraform, AWS CloudFormation, GitHub, GitLab, Continuous Delivery (CD), Continuous Integration (CI), Amazon Virtual Private Cloud (VPC), Amazon Web Services (AWS), DevOps, Identity & Access Management (IAM)

Domain Monitoring

The business domains were commonly spoofed, and the security team wanted to find similar newly registered DNS names efficiently to combat spoofing.

I worked with our registrar vendor to track new domains similar to ours so that we could file abuse complaints and work with legal to have them removed. This action protected our brand and prevented our customers from falling into phishing attacks that appeared to be us. Additionally, I used DNSTwist and simplified the process with Python to search for domains, validate what the registrar found, and find other domains it may have missed.

AWS Organization Migration

I created an AWS organization to replace the on-premise services that the organization used. The AWS organization includes a landing zone with enterprise-level networking, Transit Gateway, VPN, GuardDuty, SecurityHub, CSPM, EKS, Lambda, CloudFront, and several other AWS services.

Route53 Domain Transfer

https://github.com/cbztech/r53-transfer
I needed a quick solution to move a route53 domain between AWS accounts. This solution was implemented using the AWS SDK (boto3) and can be run using a user or role with Route53 access.

Start by running the transfer.py with credentials for Account A and then run the accept.py with credentials for Account B.

AWS & Terraform Solution for Interview Challenges

https://github.com/cbztech/dvwa-ecs-tf
When interviewing other clients, I wanted to be able to do a security challenge with the interviewee. I used the Damn Vulnerable Web App to challenge the interviewee with different OWASP Top 10 vulnerabilities.

Because I did not want to keep a DVWA hosted on the AWS infrastructure, I built this out in Terraform on AWS Elastic Container Service so it could be easily spun up and down for interviews.

Languages

Python, Ruby, Python 3

Tools

GitHub, Terraform, Slack, AWS SDK, Amazon Virtual Private Cloud (VPC), Chef, SaltStack, AWS CloudFormation, GitLab, VPN, Amazon Elastic Container Service (Amazon ECS), Git

Paradigms

DevOps, Penetration Testing, Continuous Delivery (CD), Continuous Integration (CI)

Platforms

MacOS, Amazon EC2, Amazon Web Services (AWS), Docker, Linux, Kubernetes

Other

Cloud Security, Cloud Infrastructure, IT Infrastructure, Architecture, Security, Web Development, Secure Coding, Compliance, NIST, DNS, IP Protection, Planning, Implementation, Amazon Route 53, Identity & Access Management (IAM), Okta

Frameworks

Django

Storage

Database Management

2018 - 2020

Master's Degree in Cyber Security Operations and Leadership

University of San Diego - San Diego, CA, USA

2013 - 2018

Bachelor's Degree in Management Information Systems

Utah State University - Salt Lake City, Utah, USA

NOVEMBER 2020 - NOVEMBER 2023

AWS Certified Security – Specialty

Amazon Web Services

MAY 2019 - MAY 2022

AWS Certified Solutions Architect Associate

AWS

Collaboration That Works

How to Work with Toptal

Toptal matches you directly with global industry experts from our network in hours—not weeks or months.

1

Share your needs

Discuss your requirements and refine your scope in a call with a Toptal domain expert.
2

Choose your talent

Get a short list of expertly matched talent within 24 hours to review, interview, and choose from.
3

Start your risk-free talent trial

Work with your chosen talent on a trial basis for up to two weeks. Pay only if you decide to hire them.

Top talent is in high demand.

Start hiring