I build secure, scalable, and automated cloud solutions with a focus on reliability, security, and clean delivery pipelines. My interests sit at the intersection of cloud infrastructure, CI/CD, infrastructure as code, observability, and security-first engineering.
I enjoy designing systems that are not just functional, but resilient, maintainable, and production-ready.
- Cloud-focused engineer with interests in AWS, Azure, DevOps, and DevSecOps
- Passionate about automation, security, infrastructure as code, and platform reliability
- Interested in building solutions that improve developer experience, governance, and deployment speed
- Continuously learning and exploring modern cloud-native tooling and best practices
- Cloud infrastructure design and deployment
- CI/CD pipeline automation
- Infrastructure as Code with Terraform and CloudFormation
- Containerized application delivery
- Security controls in DevOps pipelines
- Monitoring, logging, and operational visibility
- Identity, access, and secrets management
DSB Capstone Project
Built a GitHub Actions-based DevSecOps pipeline for a simulated fintech platform, using Docker across every testing stage to automate security checks from pull request to staging deployment.
Highlights
- Dockerized unit, integration, smoke, and DAST testing
- Automated SAST, SCA, secrets scanning, and IaC/config scanning
- GitHub Actions workflows for PR gates, staging validation, and nightly audits
- Production and test image separation for cleaner, safer deployments
- Security enforcement built directly into CI/CD for faster, safer releases
Repo: operation-aegis Story operation-aegis
DSB Capstone Project A DSB capstone project that inventories AWS compute and storage resources using boto3, authenticates with temporary credentials only, handles API throttling with retries and pacing, emits structured logs for every AWS API call, stores compliance findings, and exposes an API that can be validated with Postman.
Highlights
- Built AuditTrail SDK, a DSB capstone project for secure AWS compliance auditing
- Used Terraform to provision the full environment and keep it visible in the AWS Console
- Used boto3 to inventory AWS resources such as EC2, EBS, S3, and Lambda
- Enforced temporary credentials only with GitHub Actions OIDC and role-based access
- Avoided static AWS keys completely
- Added retry logic, pacing, and backoff to handle API throttling safely
- Implemented structured JSON logging for every API call
- Created the ability to audit the audit through logging and cloud-side visibility
- Added API endpoints for triggering audits and retrieving results
- Integrated Postman for API validation and operational testing
- Stored compliance findings for review and reporting
- Solved real-world IAM and deployment issues, including:
- Security Hub AccessDeniedException
- corrected s3:GetBucketPublicAccessBlock permission
- DynamoDB GSI index permissions
- Describe* actions requiring Resource: "*"
- OIDC IAM bootstrapping for Terraform CI/CD
- Demonstrated practical skills in AWS, IAM, Terraform, Python, API security, and DevSecOps
Repo: Project Repo Story The Story
- Strengthening cloud security engineering skills
- Building production-style DevOps/DevSecOps portfolio projects
- Expanding expertise in platform automation and reliability
- Exploring scalable cloud architecture patterns
- AWS Certified Cloud Practitioner
- Azure
- DevOps Engineering
- DevSecOps Practices
- Cloud Security
- Infrastructure as Code
- GitHub: [https://github.com/mdixon47]
- LinkedIn: [https://www.linkedin.com/in/malik-dixon/]
Secure it. Automate it. Scale it.


