Senior AI Security Engineer & Co-founder, aisecurity.llc
Backend, observability, and secure logging support for AI-enabled systems.
Service tracks: choose the right path
| Decision pressure | Recommended engagement | Track | Duration | Primary output | |
|---|---|---|---|---|---|
| Launching or reviewing an AI feature | AI App Threat Modeling Sprint | Rapid Assessment | 2–4 weeks | Threat model, risk map, control backlog | View details |
| RAG, retrieval, or knowledge system risk | RAG Security Design Review | Rapid Assessment | 2–5 weeks | RAG threat model, controls, 7 implementation artifacts | View details |
| Agents, tools, delegated action, or workflows | Agent & Tool-Use Control Plane Review | Architecture Review | 3–6 weeks | Control plane review, authZ model, 8 artifacts | View details |
| Prompt injection, RAG abuse, or adversarial validation | Prompt Injection & RAG Red Team | Red Team | 3–6 weeks | Attack findings, reproductions, remediation plan | View details |
| Governance, evidence, or executive pressure | Security Governance Program Advisory | Program Advisory | Monthly | Operating cadence, evidence plan | View details |
| Model, data, supply chain, or regression concerns | Specialized Review | Specialized | 2–8 weeks | Focused risk review & artifacts for your risk | View details |
Expertise buckets
Rate surface
Request intro
$25K – $50K
Study-side technical support; public rates are not published.
Service mapping
AI Security Architecture Review
Supports backend-system notes, test cases, and implementation cleanup.
Request quote →John is a junior engineering student in Greece focused on backend systems, observability, and security tooling. He is best suited for technical support, implementation cleanup, and build-adjacent work while continuing his studies. The profile is intentionally lightweight and designed to represent an entry-stage technical contributor in the people directory.
Book a short intro to map your AI security challenge to the right engagement path.