Threat modeling + remediation (operational and organizational failure risk)
Audit work for systems that operate under low trust: adversarial access, coercion risk, incentive pressure, and degraded operational reality.
Most security output fails at the moment it matters: it’s too abstract, too compliance-shaped, or too disconnected from real adversaries and real operator constraints.
This work focuses on exploitability, incentive-driven failure, and operational collapse vectors. The goal is to produce remediation that is testable and survivable, not performative.
Start with boundaries and incentives: define assets, actors, and the minimum conditions required for safety. If those conditions don’t hold, the system must fail safe.
Model the attack surface (network, dependencies, authn/authz, data flows, key material, privileged paths) and the operational surface (on-call reality, logging, rollback, incident response).
Convert risks into a prioritized remediation plan with verification steps: patches + tests + observable evidence that the failure mode is actually closed.