Secure Data Consortium Logo Secure Data Consortium

Senior-Practitioner Cybersecurity, Without the Markup

Three practice areas. Project-shaped work with written deliverables, for organizations and individuals who need depth without the coordination overhead of a large firm.

Secure Data Consortium
Start a conversation Browse practice areas

Three practice areas

Secure Data Consortium is a boutique cybersecurity practice based in Jacksonville, Florida, founded in 2008. The practice operates in three deliberately-chosen areas where senior-practitioner depth produces measurably better outcomes than generalist consulting:

LLM Application Development & Security

Custom LLM-backed application builds, on-premises model deployment for security-conscious organizations, RAG pipelines for regulated corpora, and adversarial security testing including indirect prompt injection assessment. Builder-architect background combined with active adversarial research.

Read more →

Mobile Device Forensics

Consent-based Android and iOS device forensic examination for family-law attorneys, domestic violence advocacy organizations, and civil matters. Stalkerware and surveillance-app detection. Deposition-grade written reports. Expert testimony available.

Read more →

Cryptocurrency Investigation & Tracing

Blockchain forensic tracing for scam victims, civil litigation, and attorneys pursuing recovery. Documented methodology, honest scope, no recovery guarantees. Former Chainalysis Customer Success Engineer; FLETC cryptocurrency-investigation co-instructor.

Read more →
Secure Data Consortium

Why a boutique practice

Most cybersecurity work in the market is delivered by firms structured around staff augmentation: bench resources billed at multiples of their cost, junior staff doing the actual work behind senior-titled signatures, and engagement structures designed to maximize billable hours rather than minimize time-to-deliverable.

This practice is structured differently. Every engagement is performed by a single senior practitioner with 19+ years in production systems, application development, infrastructure security, mobile and digital forensics, and cryptocurrency investigation. Every engagement has a written deliverable. Every engagement has a defined scope and timeline at signing.

That structure isn't right for every need. It is right for clients who would rather pay one senior practitioner for one well-scoped deliverable than retain a firm for ongoing access to a rotating bench.

How engagements work

Credentials

CISSP CSSLP CRISC Ex-Chainalysis

The practitioner is a senior security architect and developer with 19+ years across financial services, government, healthcare, and security tooling. Detailed background on the About page.

From the lab

Indirect prompt injection across four open-weight LLMs

A 1,280-trial study characterizing indirect prompt injection susceptibility across Llama 3.1 8B, Mistral 7B, Qwen 2.5 7B, and Qwen 2.5 Coder 7B at two production-realistic temperatures. Key findings: temperature reduction is not a reliable defense on susceptible models; output format constraint achieved 0/40 injection on the most-susceptible model tested.

Read the article on Medium  ·  Reproducible harness on GitHub

Additional research and writeups are published periodically. See the LLM page for current research projects.

Start a conversation

For prospective engagements in any practice area, fill out the form below or schedule a 30-minute scoping call.