Saurabh Swaroop

DevOps Manager

Bengaluru, Karnataka, India12 yrs 3 mos experience
Most Likely To SwitchHighly Stable

Key Highlights

  • Expert in AI security and threat modeling.
  • Published research on Linux malware analysis.
  • Led contributions to MITRE ATLAS for AI security.
Stackforce AI infers this person is a Cybersecurity expert specializing in AI security and malware analysis.

Contact

Skills

Core Skills

Ai SecurityThreat ModelingMalware AnalysisPenetration TestingVulnerability Assessment

Other Skills

Security researchThreat modellingRed teamingAI for securityFuzzingForensicsReverse EngineeringThreat Intelligence GatheringSecurity Code ReviewApplication Vulnerability AssessmentsWeb Services SecurityNetwork Penetration TestingArtificial Intelligence (AI)MitreComputer Security

About

Staff Security Researcher with \~12 years of extensive experience spanning web / network cybersecurity, AI security, firmware security, reverse engineering, threat modeling, secure code review, red teaming, fuzzing (custom, driver-level on Windows & Linux), and malware analysis. Security for AI systems - OWASP TOP 10 FOR LLMS,MITRE ATLAS. Publications and Highlights Intel MITRE Research Lead – AI PC security blog: [Intel Community Blog](https://community.intel.com/t5/Blogs/Tech-Innovation/Artificial-Intelligence-AI/Intel-AI-PCs-Deliver-an-Industry-Validated-Defense-vs-Real-World/post/1650954) Contributor to MITRE ATLAS TTPs ,Intel Lead for joint AI Security project: [MITRE ATLAS Contributor Page](https://atlas.mitre.org/resources/contribute) Published research on Linux malware (XorDDoS) with Microsoft Security Blog: [Rise in XorDDoS – Microsoft Security Blog](https://www.microsoft.com/security/blog/2022/05/19/rise-in-xorddos-a-deeper-look-at-the-stealthy-ddos-malware-targeting-linux-devices/) Presented on IoT security at BSides Zurich 2018: [BSides Zurich Archive](https://bsideszh.ch/archive/welcome-2018/agenda/abstracts/) AI/LLM Security Defense-in-depth strategies for AI agents and multi-agent frameworks Prompt injection mitigation, guardrail fine-tuning Identity/authentication controls and secure plugin ecosystems Compliance with emerging standards (NIST AI RMF, OWASP LLM Top 10, ISO/IEC 42001) LLM input/output sanitization, data provenance & attribution in RAG pipelines Reverse Engineering & Malware Analysis Windows and Linux rootkit analysis Firmware security (IoT, UEFI, BIOS) SANS FOR610 (Reverse-Engineering Malware) Binary analysis: Format string exploits, GOT/PLT Forensics and memory analysis Fuzzing & Vulnerability Research Written Custom fuzzers for drivers (Windows, Linux) AFL and other fuzzing frameworks Standalone binaries security analysis Security Domains Threat modeling, application vulnerability assessments, penetration testing (web, network, mobile, thick client) Secure code reviews Countermeasure design against a wide range of attacks PCI DSS compliance UEFI/BIOS security assessments IoT security, UART/SPI/I2C debugging Assembly, C, Python development Hardware security and reverse engineering training (Alexander Bolshev, Hardwear.io Berlin 2019) Delivered security training on network pen testing and Python 2.2 years in Norway (EVRY ASA) on professional penetration testing assignments

Experience

12 yrs 3 mos
Total Experience
3 yrs 1 mo
Average Tenure
3 yrs 7 mos
Current Experience

Intel corporation

3 roles

Senior Security Researcher

Promoted

Oct 2022Present · 3 yrs 7 mos · Bengaluru, Karnataka, India

  • Security research,
  • Threat modelling,
  • Red teaming,
  • AI for security,
  • Security for AI systems, Contributed to MITRE ATLAS TTPs
  • prompt injection ,model inversion, data poisoning etc.
  • Forensics and Reverse Engineering
  • Fuzzing
  • MITRE ATLAS & ATT&CK Framework
  • Contributor to MITRE ATLAS TTPs ,Intel Lead for joint AI Security project with MITRE:
  • [MITRE ATLAS Contributor Page](https://atlas.mitre.org/resources/contribute)
  • Intel Blog : https://community.intel.com/t5/Blogs/Tech-Innovation/Artificial-Intelligence-AI/Intel-AI-PCs-Deliver-an-Industry-Validated-Defense-vs-Real-World/post/1650954
Security researchThreat modellingRed teamingAI for securityFuzzingForensics+3

Security Researcher

Promoted

Mar 2018Mar 2021 · 3 yrs

  • Leading PenTesting team
  • Thick Client Penetration testing
  • Web App PenTesting
  • Reverse Engineering
  • Security Code Review
  • Debugging and disassembly
  • Scripting security tools
  • Firmware security analysis
  • Basic HW security testing
Penetration TestingReverse EngineeringSecurity Code Review

Security Engineer (L&T Consultant)

Sep 2017Feb 2018 · 5 mos

  • Worked at Intel Corporation as L&T Consultant

Microsoft

Security Researcher 2

Feb 2021Dec 2022 · 1 yr 10 mos · Bengaluru, Karnataka, India

  • Research Blog : XorDDoS rootkit analysis , ioctls etc.
  • https://www.microsoft.com/en-us/security/blog/2022/05/19/rise-in-xorddos-a-deeper-look-at-the-stealthy-ddos-malware-targeting-linux-devices/
  • Malware Analysis - Static and Dynamic
  • Deep Malware research
  • Writing signatures
  • Reverse Engineering
  • Disassembly and Debugging
  • Red Teaming - Exploit writing , bypassing defenses, remote exploits, etc
  • Knowledge of MITRE TTPs and implementations
  • Linux malware analysis
  • Threat Intelligence Gathering
  • Forensics and incident investigation for RCA
Malware AnalysisReverse EngineeringRed TeamingThreat Intelligence Gathering

Evry india

Senior Security Analyst

Dec 2013Aug 2017 · 3 yrs 8 mos · Bengaluru, Karnataka, India

  • Industrial work experience in Application Vulnerability Assessments, Web Services Security, Network, Mobile and Thick Client Vulnerability Assessments
  • Experience on Web Application Penetration testing in both Manual and Automated Testing
  • Certified Ethical Hacker v9 , EC Council
  • Experience on Network Penetration Testing
  • Experience on Mobile Application Penetration Testing
  • Experience on Web Services Security testing
  • Social engineering penetration testing – Phishing Test
  • In depth knowledge on Android and IOS Mobile Application Penetration testing(Native App & Web App)
  • Visited EVRY ASA Norway for around1.8 years to perform penetration testing on at customer site
Application Vulnerability AssessmentsWeb Services SecurityNetwork Penetration TestingVulnerability Assessment

Education

United College of Engineering and Research

Guru nanak English school

Stackforce found 100+ more professionals with Ai Security & Threat Modeling

Explore similar profiles based on matching skills and experience