Skip to content
View w8mej's full-sized avatar

Block or report w8mej

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
w8mej/README.md

SecureSQL — Digital Highways

John Menerick (W8MEJ)

Staff/Principal Security Engineer — Detection & Response • Integrity-first telemetry • Confidential / Trusted Compute for AI/ML

Cypherpunk pragmatist: I turn messy operational reality into resilient operational excellence.

Portfolio LinkedIn

Twitch Status YouTube Views

Creator note: I stream incident response labs + resilient comms builds.

⚡ What I do

  • Ship detection & response systems that hold up under real adversaries, real outages, and real constraints.
  • Build tamper-evident / privacy-preserving telemetry for regulated, high-sensitivity environments.
  • Secure AI/ML compute pipelines using strong isolation boundaries, policy enforcement, and verifiable integrity.

📌 Proof points (sanitized)

  • Reduced alert MTTR by ~78% by tightening detection quality, testing, routing, and on-call runbooks (global-scale, multi-cloud).
  • Handled incidents impacting 1,000s–1,000,000s of services and 10K–90M+ users (severity triage → containment → postmortem-driven hardening).
  • Built detections covering 20,000+ tactics/behaviors across endpoint + identity + cloud telemetry, with measurable precision/recall tuning.

🧭 Right now

  • Building: MPC/ZK integrity primitives, IR workflows, emergency ops comms
  • Learning: Morphogenesis & developmental dynamics
  • Exploring: non-terrestrial edge compute (NTN / satellite) + constrained environments

🧪 Featured builds

  • zk-Autograd — verifiable / integrity-minded zero-knowledge multi-party compute for ML training experiments
  • Mimir — security research + systems thinking, packaged as a real repo
  • GhostTelemetry — tamper-evident telemetry pipelines & trust primitives
  • persuadable-defender — adversarial/behavioral security experiments with assured agentic alignment
  • InfoSec Blueprints — practical, copy/paste-ready security playbooks & blueprints

🛠️ Tools I actually reach for


🎙️ Community / signal


📫 Contact


📈 GitHub by the numbers

Pinned Loading

  1. ProofOfCoffee ProofOfCoffee Public

    A dangerously functional collection of experiments. This repository exists at the intersection of “I wonder if this works” and “oh no, it worked”. Expect questionable Terraform, overly caffeinated …

    3

  2. InfoSec-Blueprints InfoSec-Blueprints Public template

    Essential playbooks & runbooks for cybersecurity operations. A dynamic resource for security pros to navigate digital threats, with best practices, incident management protocols, and community-driv…

    Jupyter Notebook 13 3

  3. TheTorProject/lepidopter TheTorProject/lepidopter Public

    lepidopter: raspberry pi image for conducting OONI network measurements

    Python 51 20

  4. Threat_Modeling_Bank Threat_Modeling_Bank Public

    A curated threat modeling library collection

    23 4

  5. ThreatPlays ThreatPlays Public

    Sharing Threat Hunting runbooks

    25 7

  6. gyoisamurai/GyoiThon gyoisamurai/GyoiThon Public

    GyoiThon is a growing penetration test tool using Machine Learning.

    Python 800 304