Christopher Elliott

Senior Software Engineer specializing in low-level systems and distributed architectures, with expertise in C/C++ development across Windows and Linux environments. Experienced in Windows internals, networking, and performance-critical software, with a background in security-focused engineering and adversarial environments. Proven ability to design, integrate, and deploy production AI systems that accelerate development and drive measurable outcomes.

About

Senior Software Engineer with experience building low-level systems and distributed software across Windows and Linux environments, including work in security-focused and adversarial contexts. Specialized in Windows internals and Win32 API development, with a focus on reliability and performance in constrained environments. Leads agile development for a team of four engineers, managing delivery and stakeholder expectations end-to-end.

Proven track record designing and delivering system-level capabilities, leading large-scale cybersecurity operations planning, and developing solutions that improve visibility into enterprise network performance and security posture.

Proven AI integration expertise — from architecting LLM-powered pipelines and deploying production inference APIs to embedding AI-assisted workflows that cut development cycles and surface actionable intelligence faster. Want to see it firsthand? Feel free to talk to the AI assistant on this page.

Clearance
TS/SCI w/ CI Polygraph
Location
Atlanta, GA
Certs
OSCP+, CISSP
Languages
English (native), Turkish (conversational — DLPT 1+/2)
Christopher Elliott

Skills

Languages

C Python C++ C# Matlab

Certifications

OSCP+ CISSP

Tools & Technologies

Git GitLab CI/CD Docker CMake Make Poetry LaTeX Mathematica

Domains

Win32 API Offensive Cyber PE Format DCO Network Assessment Agile Dev

Experience

Senior Software Engineer

Aug 2024 — Apr 2026

780th Military Intelligence Brigade · Fort Gordon, GA

  • Specialized in Windows userland capability development in C/C++ via the Win32 API, with depth in custom network protocol design, persistence techniques including reflective loading, and custom implants and proxies for offensive cyber operations.
  • Led low-level systems engineering in C and C++ targeting the Windows platform, delivering two tools adopted as organizational standards and integrated into the section's authoritative capability suite.
  • Built two independent AI tools — a web front-end providing direct access to a self-hosted LLM, and a RESTful file-server enabling on-premise agentic code assistance — together driving full AI adoption across a 10-person section and reducing research-and-drafting cycles by an estimated 35%.
C C++ Python Win32 API PE Format Windows Internals GitLab CI/CD Virtualization

Software Engineer (Contractor)

Feb 2026 — Present

White Knight Labs · Atlanta, GA (Remote)

  • Refactored and extended an RPC-based client-server architecture supporting secure distributed communication, improving reliability under modern endpoint security controls and realistic testing conditions.
C C++ Python Win32 API RPC Windows Internals

Software Engineer

Jun 2023 — Aug 2024

U.S. Army Cyber Protection Brigade · Fort Gordon, GA

  • Managed end-to-end development, testing, and deployment of a containerized TTP analytic and knowledge management solution that cut analyst workflow setup time by approximately 40% and was validated as a reference implementation for the Army CIO's GitLab cDSO pipeline.
  • Built a PowerShell module emulating FTP network traffic for the Brigade's Cyber Threat Emulation cell; deployed across 4 red teams during the Brigade's premier annual exercise with zero execution failures.
  • Developed and maintained 5 capability components in C and Python across Linux and Windows platforms, covering networking, encryption, file system operations, and thread management under live-exercise deployment constraints.
C Python Docker GitLab CI/CD PowerShell

Assistant Operations Officer

Jun 2022 — Jun 2023

U.S. Army Cyber Protection Brigade · Fort Gordon, GA

  • Built an operational reporting dashboard that reduced mission reporting time from 3 days to under 4 hours; model was adopted and implemented enterprise-wide across USCYBERCOM within 6 months of deployment.
  • Planned and synchronized DCO activities for a battalion of 549 personnel across 10+ simultaneous missions supporting USCYBERCOM, DoDIN, and multiple combatant command priorities — sustaining zero missed deployment windows across a 12-month operational cycle.
DCO Operations Network Assessment USCYBERCOM

Mission Element Lead

Jun 2021 — Jun 2022

U.S. Army Cyber Protection Brigade · Fort Gordon, GA

  • Led two enterprise-level network assessments — USSOUTHCOM and a ministry-level partner nation engagement — identifying over 30 critical findings across both missions and delivering remediation roadmaps that directly improved defensive security posture.
Network Assessment DCO USSOUTHCOM

Cyber Operations Officer Trainee

Jul 2020 — Jun 2021

U.S. Army Cyber Training Battalion · Fort Gordon, GA

  • Completed formal pipeline training to become a qualified Cyber Operations Officer (17A).
17A Cyber Operations

Projects

A selection of open-source work I've built or contributed to recently — tools and proof-of-concepts that reflect my focus on Windows internals and offensive capability development.

// Tool

NT-AUTH-NewPrompt

Windows capability leveraging NT AUTHORITY mechanisms to spawn an elevated prompt. Demonstrates advanced Win32 API usage including token manipulation and privilege escalation techniques at the user-level.

C Win32 API Token Manipulation
View on GitHub
// Tool

SeRestoreAbuse

Proof-of-concept demonstrating abuse of SeRestorePrivilege in Windows environments. Enables targeted file system manipulation for privilege escalation scenarios, implemented in C against the Win32 API.

C Win32 API Windows PrivEsc
View on GitHub

Education

B.S. Chemical and Biomolecular Engineering

Georgia Institute of Technology · Atlanta, GA

2019
  • Program ranked 2nd nationally by U.S. News & World Report
  • GPA: 3.8
  • Award for Exemplary Academic Achievement — School of Chemical & Biomolecular Engineering (awarded to approximately 30 of 900 students)

// internship_experience

2026

Security Research Intern

White Knight Labs

Retained for part-time contract work after delivering high-impact results during an Army-sponsored internship.

2018

Research Intern

University of South Florida

Helped develop a catalyst for syngas reformation for use in a $2M pilot plant.

2017

Process Engineering Intern

Resolute Forest Products

Enabled conversion of main paper machine to alkali process; chemical dosage calculations yielded approximately $5M in annual savings.

2014

Research Intern

Oak Ridge National Laboratory

Developed a technique improving accuracy in mass spectrometry data evaluation, saving approximately 10% of analysis time for researchers worldwide.

Contact

Open to discussing roles in offensive security, capability development, or red team engineering.