Hi,

I'm Harsh Akshit

AI Security Researcher

Cybersecurity professional specializing in AI Safety, LLM Jailbreaking, and Vulnerability Management

Harsh Akshit, AI Security Researcher from Indiana - specializing in LLM security and vulnerability management

About Me

Cybersecurity professional with strong focus in AI and Application security, vulnerability management, and innovative security solutions. Passionate about travelling and exploring diverse cultures. Featured in Google Bug Hunter Hall of Fame. Known for identifying critical risks and enhancing digital resilience. Want to discuss about security of your product, let's chime in sometime.

Education

Academic journey in cybersecurity and computer science

Master's in Cybersecurity Risk Management

Indiana University Bloomington · August 2024 - May 2026

Advanced studies in cybersecurity, risk assessment, and security architecture. Focus on emerging threats in AI and cloud security.

Bachelor of Technology

Birla Institute of Technology, Mesra · 2018 - 2022

Bachelor's degree, Computer Science. Built a strong foundation in programming, algorithms, and system design.

Certifications & Achievements

Google

Google Bughunter Hall of Fame

Recognition

Recognized for discovering and responsibly disclosing critical security vulnerabilities in Google's infrastructure.

🏆

Amazon AppSec CTF

NAMER - North America

15th
Rank / 143 Teams
10,200
Total Points

Professional Experience

Building secure systems and advancing security research across AI and traditional application security.

AI Security Research Intern

Pillar Security Inc. · September 2025 - December 2025

• Conducting in-depth research on adversarial attacks against large language models (LLMs), focusing on jailbreaks and prompt injection techniques
• Explored security risks associated with Model Context Protocol (MCP) and Agentic AI, utilizing red-teaming methodologies
• Contributing to thought leadership blogs and internal reports, enhancing the community's understanding of AI/ML security threats

Teaching Assistant

Indiana University Bloomington · January 2025 - December 2025

[INFO-I 230 Analytical Foundation of Cybersecurity] Assisted in delivering over 24 foundational security concepts, including cryptography, risk assessment, access control, and secure system design, to undergraduate students. Provided technical support to over 60 students, graded assignments, and facilitated 15+ lab sessions, significantly improving students' practical understanding of foundational cybersecurity concepts

[CSCI A-541: Computing & Technology Bootcamp] Assisted in delivering a high-level introduction to computing, networking, cybersecurity, AI, and cloud technologies for students from non-technical backgrounds. Supported course instruction through clarifying technical concepts, guiding discussions, grading assignments/exams, and helping students build foundational knowledge to engage in policy, business, and legal decision-making around technology

Security Consultant

Synopsys Inc. · June 2022 - June 2024 (2 years 1 month)

• Protected 2M+ consumers across 80+ projects through comprehensive security assessments
• Conducted application security testing (AppSec), software composition analysis (SCA), and static application security testing (SAST)
• Performed vulnerability testing and compliance audits for enterprise clients
• Worked with notable clients including CVS Healthcare, Global Payments, nCino, Prometric, Intuit, and others

Converted to Full-Time

Intern (Technical - Engineering)

Synopsys Inc. · January 2022 - May 2022 (5 months)

Bengaluru, Karnataka, India

Cyber Security Instructor

Devtown · June 2021 - December 2021 (7 months)

Bengaluru, Karnataka, India

Cyber Security Trainee

Castellum Labs · May 2021 - July 2021 (3 months)

Hyderabad, Telangana, India

Security Analyst Intern

Twimbit · March 2020 - July 2020 (5 months)

Noida, Uttar Pradesh

Featured Research

Published work on emerging security threats and vulnerability analysis.

React2Shell Explained

A complete guide to the React2Shell vulnerability (CVE-2025-55182) - the critical 10/10 RCE flaw that scared the internet.

Read more →

LLM Honeypot: Operation Bizarre Bazaar

Low-interaction honeypot to detect LLMjacking attacks campaigns that scan for exposed AI infrastructure to steal compute resources.

View on GitHub →

Deep Dive Into The Latest Jailbreak Techniques We've Seen In The Wild

Deep dive into the latest jailbreak techniques observed in the wild and their implications.

Read more →

Breaking Payment Gateways

In-depth analysis of payment security vulnerabilities and exploitation techniques.

Read more →

Technical Expertise

Comprehensive skill set across AI security, application security, and compliance frameworks.

AI & Cloud Security

AWS Security LLM Security Prompt Injection Cloud Architecture MCP Vulnerabilities

Application Security

Burp Suite OWASP Top 10 SANS Top 25 SAST/DAST API Security

Compliance

HIPAA GDPR PCI DSS SOC 2

Development

Python Bash Git CI/CD Security Docker
← Scroll to explore →

Let's Connect

Feel free to reach out for collaborations, opportunities, or just to chat about security.