Led high-stakes security research programs with external sponsors. Deep experience with cutting-edge offensive-security techniques. Fluent across AI/ML infrastructure (data, training, inference, schedulers, accelerators). Ability to threat-model end-to-end. Operate independently, align diverse teams, and deliver on tight timelines. Communicate clearly and concisely with experts and decision-makers.