Security · Forensics · LLM Engineering

We build it, secure it, and prove it.

Three focused areas: LLM application security, mobile device forensics, and cryptocurrency investigation. Each handled with experienced, hands-on expertise and clear accountability from first scope to signed report. Project-based engagements with written deliverables.

PrincipalArchitect & Developer
CISSPCSSLP · CRISC
Ex-Chainalysis Engineer

Think like an attacker. Write like an expert witness. Ship like an engineer.

Deposition-Grade
Written reports
Builder & Breaker
Code that ships

Forensic and adversarial work for the people who need it most, from a practice that can build the tool and break the system.

Shirley Singleton, Principal of Secure Data Consortium
Shirley Singleton
Principal · CISSP, CSSLP, CRISC
Who We Are

A builder and architect with adversarial depth

Secure Data Consortium is an independent cybersecurity practice based in Jacksonville, Florida. The practice combines over a decade building production systems across financial services, government, and security tooling with active adversarial research and digital forensics.

Most LLM-adjacent consulting comes from one of two directions: security generalists who don't ship code, or developers who don't think about security architecture. This practice is both: builder-architect expertise paired with CISSP-level security depth.

Every engagement is project-shaped, handled by experienced, hands-on expertise from start to finish, and delivered as a written report.

More About the Practice
Practice Areas

Three areas where depth beats breadth

Deliberately narrow. Each area rewards experienced, hands-on expertise that has actually built and broken the systems in question.

Credentials & frameworks the work is grounded in

CISSPCSSLPCRISC OWASP LLM Top 10MITRE ATLASEU AI ActEx-Chainalysis
Why Work With Us

Experienced and hands-on, accountable end to end

Hands-On Expertise

Experienced, hands-on attention on every engagement, from first scope to final report.

Builder & Breaker

Production code and adversarial research together, a rare combination that LLM work demands.

Written Deliverables

Every engagement ends in a clear, defensible written report, built on CISSP-grade documentation discipline.

Project-Shaped

Defined scope, fixed timeline, fixed or capped fee. No open-ended retainers or staff-augmentation arrangements.

From the Lab

Independent research, published in the open

Public writeups are proof of work, the same methodology that goes into client engagements.

Prompt Injection · 1,280 trials

Temperature is not a defense: indirect prompt injection across four open-weight LLMs

A 1,280-trial study of indirect prompt injection susceptibility across Llama 3.1 8B, Mistral 7B, Qwen 2.5 7B, and Qwen 2.5 Coder 7B. Key finding: temperature reduction is not a reliable defense; output-format constraint achieved 0/40 injection on the most-susceptible model tested.

In Progress

Locally-hosted LLM monitoring for IoT data exfiltration

An active research project applying self-hosted LLMs to network traffic and log analysis for detection of unauthorized data exfiltration from IoT and media devices, a detection layer that does not depend on cloud traffic analysis. Writeup planned once methodology is stable.

Start a Conversation

Tell us what you're working on

For prospective engagements in any practice area, send a note below or schedule a 30-minute scoping call.

Schedule a Scoping Call