Developer turned security engineer turned AI specialist.
I bridge the gap between what AI can do and what it should do.
I started as a developer. Six years building production systems taught me how software really works, not just the happy path, but the edge cases, the failure modes, the ways things break under pressure.
Then I moved into security. Three years doing vulnerability assessments, security architecture, and risk management showed me that most security problems come from the gap between how developers think and how attackers think.
Now I focus on AI. Not because it's trendy, but because I see the same gap forming. Companies are deploying AI systems without understanding their failure modes. Security teams don't know how to evaluate AI risks. And the "AI safety" conversation is dominated by either hype or fear.
I bring practical experience to this problem. I work hands-on with frontier models daily, evaluating outputs, testing boundaries, and understanding what these systems actually do versus what vendors claim they do.
I don't start conversations with fear. AI is a powerful tool that can transform your business. My job is to help you capture that value safely, not to scare you away from innovation.
I've read the papers. I've also deployed the systems. The gap between academic AI safety research and production reality is massive. I focus on what actually works in your environment.
The biggest AI failures happen when technical teams and business stakeholders aren't speaking the same language. I translate between both worlds because I've lived in both.
I'll tell you when AI isn't the right solution. I'll tell you when your risk tolerance is too high. I'll tell you when your vendor is overselling. Honest advice serves you better than what you want to hear.
Foundation certification demonstrating security fundamentals
Hands-on daily work evaluating Claude, GPT, and Gemini outputs
"Stay Smart Stay Safe" available on Amazon. "Stay Smart Stay Human" forthcoming.
Active security researcher participating in public bug bounty programs