About the role
Role Overview The AI/ML Threat Modeler & Design Reviewer will lead security-safe architectural assessments of AI systems—from data ingestion to deployment. You'll map threats, identify attack surfaces, and propose mitigation strategies rooted in known frameworks like MITRE ATLAS or STRIDE.
Key Responsibilities
- Conduct threat modeling workshops and architecture reviews for AI/ML/LLM systems
- Analyze model training workflows, inference environments, data pipelines, and cloud deployments
- Identify AI-specific risks: data leakage, adversarial inputs, model misuse
- Map threats to frameworks (e.g., STRIDE, MITRE ATLAS) and recommend mitigations
- Collaborate with AI Governance and engineering teams on secure AI integrations
- Produce detailed reports, threat diagrams, risk analyses, and remediation roadmaps
Required Qualifications & Skills
- 3+ years in threat modeling, secure architecture, or security design reviews
- Solid understanding of ML workflows, LLMs, and cloud‑native AI infrastructure
- Knowledge of privacy risks (re‑identification, leakage) and data protection measures
- Experience with AWS/Azure/GCP secure design
- Strong written/verbal communication and system diagramming ability
Preferred (Bonus) Qualifications
- Hands-on experience designing privacy-preserving ML (e.g., federated learning, differential privacy)
- Familiarity with governance frameworks and compliance standards for AI-safe deployments
About ioSENTRIX
ioSENTRIX is a Cybersecurity Consulting firm.
Right now, a lot of businesses are looking at ioSENTRIX because they're faced with growing fears of data breaches and committed to protecting their customer's data from hackers and ransomware. We are helping a good number of companies who are concerned their current cybersecurity posture may no longer be adequate.
Here's who we work with: • CISOs and Deputy CISOs – Do you struggle to ensure that your organization and/or customer's data is secure? We offer vulnerability assessment, penetration testing, and Fullstack assessments to uncover the hidden vulnerabilities and measure the effectiveness of implemented security controls.
• VP/Director/Head of Product Development – Is your team producing software, but you don't know if it's secure or not? We can help integrate security into you SDLC whether waterfall or agile to ensure defense in depth. Whether you are building one product or suites of products, we can design an application security program that fits your organization needs.
• Manager/Sr. Managers – Are you migrating to Cloud? Do you need to know whether server-side encryption is better or client-side encryption to protect your data? We offer Secure Design Reviews that evaluate flaws in your application's architecture and propose remediation strategies to mitigate the outstanding risks.
• Innovators – Are you looking to build a serverless solution for your company? Have you developed a complex Thick Client solution such as virtual appliance, security device, medical device, a mobile application such as MDM or Cloud Solution such as online call center? We can help secure your application and infrastructure with our custom consulting services ranging from secure code review to DDOS testing.
If you are interested in cybersecurity consulting services such as penetration testing, vulnerability assessment, and training, email us at sales@iosentrix.com
About the role
Role Overview The AI/ML Threat Modeler & Design Reviewer will lead security-safe architectural assessments of AI systems—from data ingestion to deployment. You'll map threats, identify attack surfaces, and propose mitigation strategies rooted in known frameworks like MITRE ATLAS or STRIDE.
Key Responsibilities
- Conduct threat modeling workshops and architecture reviews for AI/ML/LLM systems
- Analyze model training workflows, inference environments, data pipelines, and cloud deployments
- Identify AI-specific risks: data leakage, adversarial inputs, model misuse
- Map threats to frameworks (e.g., STRIDE, MITRE ATLAS) and recommend mitigations
- Collaborate with AI Governance and engineering teams on secure AI integrations
- Produce detailed reports, threat diagrams, risk analyses, and remediation roadmaps
Required Qualifications & Skills
- 3+ years in threat modeling, secure architecture, or security design reviews
- Solid understanding of ML workflows, LLMs, and cloud‑native AI infrastructure
- Knowledge of privacy risks (re‑identification, leakage) and data protection measures
- Experience with AWS/Azure/GCP secure design
- Strong written/verbal communication and system diagramming ability
Preferred (Bonus) Qualifications
- Hands-on experience designing privacy-preserving ML (e.g., federated learning, differential privacy)
- Familiarity with governance frameworks and compliance standards for AI-safe deployments
About ioSENTRIX
ioSENTRIX is a Cybersecurity Consulting firm.
Right now, a lot of businesses are looking at ioSENTRIX because they're faced with growing fears of data breaches and committed to protecting their customer's data from hackers and ransomware. We are helping a good number of companies who are concerned their current cybersecurity posture may no longer be adequate.
Here's who we work with: • CISOs and Deputy CISOs – Do you struggle to ensure that your organization and/or customer's data is secure? We offer vulnerability assessment, penetration testing, and Fullstack assessments to uncover the hidden vulnerabilities and measure the effectiveness of implemented security controls.
• VP/Director/Head of Product Development – Is your team producing software, but you don't know if it's secure or not? We can help integrate security into you SDLC whether waterfall or agile to ensure defense in depth. Whether you are building one product or suites of products, we can design an application security program that fits your organization needs.
• Manager/Sr. Managers – Are you migrating to Cloud? Do you need to know whether server-side encryption is better or client-side encryption to protect your data? We offer Secure Design Reviews that evaluate flaws in your application's architecture and propose remediation strategies to mitigate the outstanding risks.
• Innovators – Are you looking to build a serverless solution for your company? Have you developed a complex Thick Client solution such as virtual appliance, security device, medical device, a mobile application such as MDM or Cloud Solution such as online call center? We can help secure your application and infrastructure with our custom consulting services ranging from secure code review to DDOS testing.
If you are interested in cybersecurity consulting services such as penetration testing, vulnerability assessment, and training, email us at sales@iosentrix.com