As a Agentic AI Engineer who specialize in securing Multi-Agent, Agentic AI systems and LLM against model poisoning, prompt injection, data exfiltration, and adversarial attacks. I apply OWASP Top 10 for LLMs, manage IAM, RBAC, OPA/Rego, secrets, and key management to ensure secure, compliant AI/ML pipelines.
I drive security automation, Vulnerability Management, GRC Engineer Audits and Incident Response, leveraging standards like NIST AI RMF, ISO 27001, SOC 2, HIPAA, PCI-DSS, FedRAMP, CMMC.
As a GRC Engineer, I use AWS, Azure, GCP, Drata, Vanta, Tenable, Qualys, Defender, Python, and Bash to automate governance, risk assessments, and remediation—reducing vulnerabilities and strengthening enterprise defenses.
- Agentic AI Red_Team_Scanner
- Agentic AI SOC Analyst
- Agentic AI Vulnerability_Management
- Agentic AI & LLM & AI/ML GRC Analyst Audit
- Agentic_AI_LLM_Top_10_OWASP_Checker_With_AWS
- Agentic AI Voice Certifications Interviewer App Source Code Walk-Thru
- AWS_Automated_Access_Review
- AWS_Security_Hub_Compliance_ Analyzer
- AWS_Security_Hub_To_Excel_Pipeline
- AWS_Password_Policy_Verification
- AWS_Inactive_Key_Rotation_Check
- AWS_Cloudtrail_Validator
- AWS_Cloud_Encryption_Evidence
- AWS_Least_Privilege_Compliance_Checker
- Implementing a SOC & Honeynet with Azure; Attacking and remediating it (Live Traffic)
- Why KQL Maps Are Essential for CEOs and Non-Tech People
- Setting up Splunk SIEM; Attacking and remediating it (Live Traffic)
- Full Vulnerability Management Program Implementation
- 20+ STIG Implementations Remediations (PowerShell)
- 10+ Ensure-Audit-Remediation-Win-Server for Password, Encryption, Admin (PowerShell)
- 15+ Programmatic Vulnerability Remediations (PowerShell and BASH)
- Vulnerability Management in Azure Sandbox
- Incident Response: Phishing via Fake Software Update
- Incident Response: Threat Hunting (Operation Jackal Spear)
- Incident Response: Zero-Day Ransomware (PwnCrypt)
- Incident Response: Remote Code Execution Detected
- Threat Hunting Incident: Tor Browser Usage
- Incident Response: Create Alert Rule (Brute Force Attempt Detection)
- Incident Response: Email-Phishing (Urgent Account Suspended)
- Incident Response: Email Analysis (Phishing)
- Incident Response: Create Alert Rule (PowerShell Suspicious Web Request)
- Incident Response: Create Alert Rule (Potential Impossible Travel)
- Threat Hunting Incident: Data Exfiltration from PIP'd Employee
- Threat Hunting Incident: Public Facing IP Detection
- Threat Hunting Incident: Sudden Network Slowdowns
- Compliance Framework Implementation (NIST)
- CISSP: Expected Dec. 2025
- CompTIA Security+: Expected Oct. 2025
- CompTIA Network+: Expected Nov. 2025