Author: Jamie Christian II
Region: us-east-1
Email: Jamiechristian557@gmail.com
GitHub: https://github.com/JamieChristian22
Welcome to my AWS Security & Networking portfolio β a collection of real, deployed, security-focused cloud projects built using Terraform and validated directly in the AWS Console.
This repository demonstrates hands-on experience in:
- Secure network architecture
- Identity & access governance
- Detection & analytics pipelines
- Serverless security
The main portfolio folder contains multiple production-relevant projects:
π aws-security-networking-portfolio/
Inside it youβll find:
Hub-and-spoke VPC design with centralized inspection and egress control.
Focus: Transit Gateway, AWS Network Firewall, VPC Flow Logs.
Identity governance with permission boundaries, break-glass access, and CloudTrail alerting.
Focus: IAM policies, roles, least privilege.
Security telemetry pipeline with GuardDuty, Security Hub, EventBridge, and OpenSearch.
Focus: Detection engineering and alert automation.
API Gateway + Cognito + WAF with private Lambda and VPC endpoints.
Focus: Application security and serverless best practices.
This repository includes verified AWS console screenshots that prove real infrastructure deployment.
π Evidence Location: Images/
Validated components include:
- VPC security groups and networking
- IAM policies and service roles
- Lambda functions with SQS triggers
- API Gateway POST endpoints
- Amazon RDS (PostgreSQL)
- Amazon Athena queries over S3 data
These artifacts demonstrate that the projects are deployed, tested, and observable.
AWS Services
- VPC, Transit Gateway, Network Firewall
- IAM Policies & Roles
- CloudTrail, GuardDuty, Security Hub
- EventBridge, OpenSearch
- Lambda, API Gateway, Cognito, WAF
- Athena, S3, RDS (PostgreSQL)
- SNS, CloudWatch
Security Domains
- Network Security
- Identity & Access Management
- Detection Engineering
- Incident Response
- Secure Serverless Architecture
- Infrastructure as Code (Terraform)
Each project includes its own README with full deployment instructions.
cd aws-security-networking-portfolio/projects/01-network-core/iac/terraform/envs/dev
terraform init
terraform plan -var-file=dev.tfvars
terraform apply -var-file=dev.tfvars
β οΈ SNS email subscriptions require confirmation after deployment.
Jamie Christian II
π§ Jamiechristian557@gmail.com
π https://github.com/JamieChristian22
β Tip: Pin this repository on your GitHub profile to showcase real, deployable AWS security engineering work.