Saurabh Swaroop — DevOps Manager
Staff Security Researcher with \~12 years of extensive experience spanning web / network cybersecurity, AI security, firmware security, reverse engineering, threat modeling, secure code review, red teaming, fuzzing (custom, driver-level on Windows & Linux), and malware analysis. Security for AI systems - OWASP TOP 10 FOR LLMS,MITRE ATLAS. Publications and Highlights Intel MITRE Research Lead – AI PC security blog: [Intel Community Blog](https://community.intel.com/t5/Blogs/Tech-Innovation/Artificial-Intelligence-AI/Intel-AI-PCs-Deliver-an-Industry-Validated-Defense-vs-Real-World/post/1650954) Contributor to MITRE ATLAS TTPs ,Intel Lead for joint AI Security project: [MITRE ATLAS Contributor Page](https://atlas.mitre.org/resources/contribute) Published research on Linux malware (XorDDoS) with Microsoft Security Blog: [Rise in XorDDoS – Microsoft Security Blog](https://www.microsoft.com/security/blog/2022/05/19/rise-in-xorddos-a-deeper-look-at-the-stealthy-ddos-malware-targeting-linux-devices/) Presented on IoT security at BSides Zurich 2018: [BSides Zurich Archive](https://bsideszh.ch/archive/welcome-2018/agenda/abstracts/) AI/LLM Security Defense-in-depth strategies for AI agents and multi-agent frameworks Prompt injection mitigation, guardrail fine-tuning Identity/authentication controls and secure plugin ecosystems Compliance with emerging standards (NIST AI RMF, OWASP LLM Top 10, ISO/IEC 42001) LLM input/output sanitization, data provenance & attribution in RAG pipelines Reverse Engineering & Malware Analysis Windows and Linux rootkit analysis Firmware security (IoT, UEFI, BIOS) SANS FOR610 (Reverse-Engineering Malware) Binary analysis: Format string exploits, GOT/PLT Forensics and memory analysis Fuzzing & Vulnerability Research Written Custom fuzzers for drivers (Windows, Linux) AFL and other fuzzing frameworks Standalone binaries security analysis Security Domains Threat modeling, application vulnerability assessments, penetration testing (web, network, mobile, thick client) Secure code reviews Countermeasure design against a wide range of attacks PCI DSS compliance UEFI/BIOS security assessments IoT security, UART/SPI/I2C debugging Assembly, C, Python development Hardware security and reverse engineering training (Alexander Bolshev, Hardwear.io Berlin 2019) Delivered security training on network pen testing and Python 2.2 years in Norway (EVRY ASA) on professional penetration testing assignments
Stackforce AI infers this person is a Cybersecurity expert specializing in AI security and malware analysis.
Location: Bengaluru, Karnataka, India
Experience: 12 yrs 3 mos
Skills
- Ai Security
- Threat Modeling
- Malware Analysis
- Penetration Testing
- Vulnerability Assessment
Career Highlights
- Expert in AI security and threat modeling.
- Published research on Linux malware analysis.
- Led contributions to MITRE ATLAS for AI security.
Work Experience
Intel Corporation
Senior Security Researcher (3 yrs 7 mos)
Security Researcher (3 yrs)
Security Engineer (L&T Consultant) (5 mos)
Microsoft
Security Researcher 2 (1 yr 10 mos)
EVRY India
Senior Security Analyst (3 yrs 8 mos)
Education
at United College of Engineering and Research
at Guru nanak English school