I am a TPM at Microsoft. I build security for AI agent communication protocols, and I own ML pipelines end to end (evaluation design, data generation, model training, iteration).
PM who ships code. Hands on the ML pipeline.
Lima → New York → San Francisco
About
/aboutI work on AI security at Microsoft. Both sides of it: AI for security (detecting threats with ML) and security for AI (defending agent communication protocols).
I am not a typical TPM. I own the ML pipeline end to end for security agents: evaluation scenario design, synthetic data generation, model training, iterative evaluation. I also consult with researchers on parameter-efficient fine-tuning (LoRA / QLoRA) because the pipeline decisions are mine to make.
My path here was not straight. I started in corporate finance in Peru, pivoted to CS at Indiana University (3.86 GPA), and joined Microsoft in 2023. The finance years taught me to read the business behind the tech: where time and resources go, what's worth building, what actually matters. That lens still shapes how I ship software.
I also build things on the side. Small personal technical explorations. I do them because I like shipping code and because a TPM who writes code makes better decisions than one who does not.
Experience
/workTechnical Program Manager
Agent evaluation
Expanded evaluation frameworks across additional agent services, building on the end-to-end ML pipeline pattern.
Adversarial input detection
Designed adversarial input detection systems for multi-agent AI environments. Led threat modeling, evaluation design, and the detection roadmap end-to-end.
AI agent communication protocol security
Led design of security platforms for emerging AI agent communication protocols. Inspection and enforcement of AI agent tool-call traffic across local and remote environments.
Package revocation workflow
Built a package revocation workflow that integrates real-time security signals to block malicious packages and enable clean rollback. Usable by third-party security vendors to enforce signals on MCPs.
AI-powered threat detection
Designed and drove a detection system using fine-tuned Small Language Models on system telemetry. Defined confidence thresholds and human-in-the-loop workflows to balance precision with scaled coverage.
Win32 App Isolation
Shipped from technical design to production. OS-level traffic filtering and identity-bound policy enforcement. Achieved first-party app adoption. Featured on the Microsoft YouTube channel.
End-to-end ML pipeline ownership
Owned the full ML pipeline as PM for two security agents: evaluation scenario design, synthetic data generation, model training, iterative evaluation. Consulted researchers on parameter-efficient fine-tuning (LoRA / QLoRA) for large-scale security data.
Cross-functional leadership
A constant across the programs above: cross-functional teams of 5+ engineers and 15+ stakeholders per initiative. Not one team, a pattern.
Program Manager Intern
Cloud asset telemetry
Designed and shipped a telemetry pipeline surfacing cloud asset visibility from internal studios to Defender SecOps teams. Enabled centralized monitoring and incident response.
Commercial Analyst
Capital planning
Built financial models for capital investment projects exceeding $300M. Market analysis to support executive decision-making.
Commercial modeling
Built financial models for gas-station and mining clients that the sales team used to shape commercial proposals. Daily Excel reports (pivot tables, macros) the sales team ran in the field.
Financial Planning & Marketing — Finance Assistant
Financial modeling
Modeled financial impacts of business strategies. Identified marketing optimizations that delivered approximately £2M in savings.
P&L ownership
Controlled expenses and P&L reporting for the marketing finance area against business targets.
Projects
/sideReal-time social prototype
Education
/eduSkills
/skillsContact
/pingGet in touch.
I like hearing about AI security work, ML pipeline problems, and well-crafted side projects. I wish you are doing well.
