Back to Developers
sarah shaikh

sarah shaikh

AI Security Analyst

Bengaluru East, India
85
Profile Score

About

AI Security Analyst with demonstrated expertise in LLM and RAG security assessments, prompt injection analysis, and adversarial AI threat modeling. Proficient in identifying attack surfaces, conducting vulnerability assessments, and building security documentation frameworks for AI/ML systems. Hands-on experience with SIEM tools (Splunk), network security (Nmap, Metasploit), OSINT, and phishing/social engineering analysis. Adept at applying OWASP Top 10 and AI security standards to real-world enterprise environments.

Skills & Expertise (46)

AI/ML Security Advanced
8.5/10
1
Years Exp
LLM & RAG Security Assessment Advanced
8.0/10
1
Years Exp
AI Threat Modeling Advanced
8.0/10
1
Years Exp
Model Misuse & Abuse Analysis Intermediate
8.0/10
1
Years Exp
Prompt Injection Advanced
7.8/10
1
Years Exp
Adversarial Inputs Advanced
7.8/10
1
Years Exp
Compliance Good Communication GDPR OWASP Top 10 Cybersecurity Ethics Security Documentation Programming & Data Python Data Preprocessing Machine Learning Basics Cybersecurity Principles threat types Phishing malware DDoS Open source intelligence (OSINT) tools Networking Fundamentals Https protocols compliance awareness GDPR basics Nmap CyberSecurity Vulnerability Identification Penetration Testing OSINT Phishing detection Social Engineering Analysis Incident Response SIEM & Tools Splunk Firewall fundamentals Metasploit Log Analysis SIEM fundamentals EDR Concepts Networking TCP/IP DNS HTTPS Network Protocols

Work Experience

Cybersecurity Intern

Avigdor Cybertech

Sep 2025 - Jan 2026

Performed hands-on threat analysis and vulnerability identification, contributing to detection of phishing campaigns and social engineering attempts targeting client organizations. Monitored SIEM logs in Splunk, flagging anomalous activity and escalating indicators of compromise (IoCs) to senior analysts. Conducted OSINT investigations and supported incident triage workflows, building foundational SOC skills.

AI Data Science Intern

NASSCOM Foundation

Oct 2024 - Dec 2024

Engineered ML pipelines using Python (Pandas, NumPy, TensorFlow) on datasets exceeding 50,000 records, performing data cleaning, feature engineering, and model evaluation. Built a crop disease detection model achieving 92% classification accuracy, demonstrating applied ML skills directly relevant to AI security and model behavior analysis.

Recruitment Intern

U&I; Trust

Jun 2025 - Jul 2025

Supported end-to-end recruitment including candidate sourcing, screening, and maintaining updated records in the recruitment database.

AI Security Analyst

Quinine Cybersecurity Ltd

Jan 2026 - Present

Conduct end-to-end security assessments on LLM and RAG-based systems, identifying prompt injection vulnerabilities, adversarial input vectors, and model abuse patterns across client AI deployments. Develop and maintain security documentation templates and assessment frameworks adopted across client AI security engagements, streamlining assessment turnaround. Perform threat modeling on generative AI pipelines, mapping attack surfaces and recommending mitigations aligned with OWASP LLM Top 10 and emerging AI security standards. Produce structured vulnerability reports and risk evaluation summaries delivered to enterprise clients.

Education

B.E in Computer Science - Cambridge Institute of Technology

2021 - 2025 · India

12th - International Indian School

2020 - 2021 · Saudi Arabia

10th - International Indian School

2018 - 2019 · Saudi Arabia

Certifications

cybersecurity professional certificate

avigdor cybertech · 2025

Interested in this developer?

Profile Score Breakdown

📷 Photo 10/10
📄 Resume 10/10
💼 Job Title 10/10
✍️ Bio 10/10
🛠️ Skills 20/20
🎓 Education 10/10
⏱️ Experience 5/15
💰 Rate 0/5
🏆 Certs 5/5
Verified 5/5
Total Score 85/100

Profile Overview

Member sinceMar 2026

Availability Details

Relocation

Open to Relocation

Skills (46)

AI/ML Security LLM & RAG Security Assessment AI Threat Modeling Model Misuse & Abuse Analysis Prompt Injection Adversarial Inputs Compliance Good Communication GDPR OWASP Top 10 +36 more