
Senior AI Security Engineer & Co-founder, aisecurity.llc
Advises on AI risk, incident response readiness, and research-informed product security priorities.
Pinned Work & Portfolio Proof
A selection of engagements, research, and assessments available for public review.
Drag or use arrows
Best-fit engagements
Match your decision pressure to the right engagement type.
Service tracks: choose the right path
| Decision pressure | Recommended engagement | Track | Duration | Primary output | |
|---|---|---|---|---|---|
| Launching or reviewing an AI feature | AI App Threat Modeling Sprint | Rapid Assessment | 2–4 weeks | Threat model, risk map, control backlog | View details |
| RAG, retrieval, or knowledge system risk | RAG Security Design Review | Rapid Assessment | 2–5 weeks | RAG threat model, controls, 7 implementation artifacts | View details |
| Agents, tools, delegated action, or workflows | Agent & Tool-Use Control Plane Review | Architecture Review | 3–6 weeks | Control plane review, authZ model, 8 artifacts | View details |
| Prompt injection, RAG abuse, or adversarial validation | Prompt Injection & RAG Red Team | Red Team | 3–6 weeks | Attack findings, reproductions, remediation plan | View details |
| Governance, evidence, or executive pressure | Security Governance Program Advisory | Program Advisory | Monthly | Operating cadence, evidence plan | View details |
| Model, data, supply chain, or regression concerns | Specialized Review | Specialized | 2–8 weeks | Focused risk review & artifacts for your risk | View details |
Expertise buckets
Rate surface
Request quote
$25K – $50K
Public-safe profile; commercial scope and rates are set per engagement.
Service mapping
AI Security Architecture Review
Supports product and application security reviews across modern AI-enabled systems.
Request quote →Fractional Strategy and Executive Advisory
Provides strategic and technical advisory input on AI risk and control priorities.
Request quote →Alex Eisen is a senior security leader with experience across academia, military and intelligence environments, enterprise networks, and startups. His public profile signals strengths in vulnerability research, incident response leadership, and AI risk management with both tactical and strategic depth.
Publications & Resources
View all →
Forescout Device Cloud Elastic/Kibana Analytics Platform
Large-scale connected-device analytics using Forescout Device Cloud, Elastic, Kibana, and security-research workflows to turn millions of device records into report-ready security evidence.

Forescout Connected Medical Device Security Report
Device Cloud research on connected medical-device segmentation, insecure protocols, default credentials, legacy systems, and clinical-network exposure.

Forescout Enterprise of Things Security Report 2020
Device Cloud research identifying the riskiest IoT devices across financial services, government, healthcare, manufacturing, and retail.

Forescout Banking on Security Financial Services Research
Device Cloud research on financial-services device risk, flat networks, IoT/OT proximity, POS exposure, Windows lifecycle risk, and segmentation gaps.
Book a short intro to map your AI security challenge to the right engagement path.