PORTFOLIO

Ebony S. Muhammad | Human-Centered AI/ML & Cybersecurity

Ebony S. Muhammad

Human-Centered Prompt Engineer (AI/ML) · Cybersecurity Analyst · Threat Responder

Professional Summary

Cybersecurity Analyst & Human-Centered Prompt Engineer (AI/ML) with expertise in incident response, insider threat mitigation, and phishing simulation, as well as designing AI prompts that generate meaningful, safe, and empathetic user experiences. Proven ability to remove live threats, capture red team objectives, and translate complex risks into actionable strategy, while also blending clarity, empathy, and safety into AI systems that deliver measurable real-world impact. My work is guided by a single principle: technology should protect, empower, and serve people with compassion, precision, and dignity.

Cybersecurity Focus

Experienced in real-world SOC operations, incident response, and threat containment. Skilled at phishing simulations, social engineering red team exercises, and risk analysis that strengthens organizational resilience. Track record includes removing live adversaries from systems, capturing double the required number of red team flags, and creating playbooks that reduce incident response time. I bring both technical precision and a people-first approach to cyber defense.

Human-Centered Prompt Engineering

My prompt engineering work focuses on designing AI interactions that go beyond text generation — they create safe, empathetic, and outcome-driven experiences. By blending clarity, empathy, and guardrails, I help unlock the full potential of AI in sensitive fields such as healthcare, customer support, education, and re-entry programs. Rooted in my psychology background, this approach ensures technology serves people with compassion, precision, and dignity.

Prompt Engineering Cases

Example 1: Healthcare / Nutrition Support

Scenario: A health-tech app wants GPT to provide safe, empathetic responses to users asking about nutrition.

Design Goals:

  • Prioritize empathy when discussing sensitive health topics
  • Provide safe, accurate advice
  • Ensure compliance by deferring to licensed professionals when needed

Prompt:

"You are a holistic nutrition and wellness expert. Respond with compassion, empathy, and accuracy…"

Why It Works:

  • Defines role (holistic nutrition expert)
  • Embeds empathy and safety as core values
  • Adds a guardrail for compliance
  • Ensures user feels heard before advice is given

Example 2: Customer Support for Frustrated Users

Scenario: A SaaS product team wants prompts that generate thoughtful replies to angry customer emails.

Design Goals:

  • De-escalate user frustration
  • Show empathy while still being informative
  • Ensure clarity and accountability in the response

Prompt:

"You are a customer support specialist for [Product]. Your task is to reply…"

Why It Works:

  • Starts with empathy and acknowledgment
  • Provides clarity with step-by-step resolution
  • Includes an escalation path to rebuild trust
  • Designed to reduce repeat tickets and escalations

Example 3: Education / Learning Coach

Scenario: An ed-tech platform wants GPT to act as a supportive learning assistant for adult students studying for professional exams.

Design Goals:

  • Provide step-by-step explanations
  • Encourage persistence and reduce discouragement
  • Personalize responses for adult learners

Prompt:

"You are a patient, encouraging learning coach helping adult students prepare…"

Why It Works:

  • Defines role (coach, not lecturer)
  • Balances clarity and encouragement
  • Uses examples to make learning practical
  • Reinforces confidence-building

Threat Response Case Studies

Insider Threat Containment

  • Context: Internal user exhibiting suspicious behavior
  • Action: Conducted log analysis, terminated access, documented incident
  • Outcome: Escalated to leadership; prevented data leakage

Live Threat Neutralization

  • Context: Detected unauthorized access in client environment
  • Action: Identified threat, isolated host, removed malicious access
  • Outcome: Restored system integrity; issued remediation recommendations

Labs & Technical Tools

  • TryHackMe Labs: Blue Team, Threat Intelligence, Splunk Basics
  • Tools Used: Splunk, ServiceNow, Proofpoint

Certifications & Training

  • Proofpoint AI/ML Specialist
  • Proofpoint Insider Threat Specialist
  • Proofpoint Security Awareness Specialist
  • Proofpoint AI Email Security Specialist
  • TryHackMe Cyber Defence Pathway

Resume & Contact