https://obscuritylabs.com/wp-content/uploads/2018/04/Alex-2.jpg

Co-founderAlexander Rymdeko-Harvey

Chief Executive Officer (CEO)

Alex has extensive experience in the cyber security field. He has worked in the specialized field of adversary emulation in both Government and private organizations. Alex brings extensive knowledge from his experience on the Discover and Counter Infiltration Team for the Department of Defense (DoD) and as a senior cyber-security engineer on the Red Team for a Fortune 100 company. He has authored and co-authored several tools for the Cyber community with the most notable of which being the Empyre and SimplyEmail projects.

Our experts
are certified

OSCP
Offensive Security Certified Professional (OSCP) is the certification for Penetration Testing with Kali Linux, the world’s first hands-on InfoSec certification
CISSP
Certified Information Systems Security Professional (CISSP) is an independent information security certification granted by the International Information System Security Certification Consortium, also known as (ISC)².
GIAC GNFA
GIAC Network Forensic Analyst (GNFA). The GNFA certification is for professionals who want to demonstrate that they qualified to perform examinations employing network forensic artifact analysis.
CEH
Certified Ethical Hacker (CEH) is a qualification obtained by assessing the security of computer systems, using penetration testing techniques.
GIAC GCIA
GIAC Certified Intrusion Analyst (GCIA). Security Professionals that want to demonstrate they are qualified for IT systems hands-on roles with respect to security tasks.
CCNA
Cisco Certified Network Associate Routing & Switching (CCNA) validates the ability to install, configure, operate, and troubleshoot medium-size routed and switched networks, including implementation and verification of connections to remote sites in a WAN.
GIAC GCCC
GIAC Critical Controls Certification (GCCC) is the only certification based on the Critical Security Controls, a prioritized, risk-based approach to security.
GIAC GCIH
GIAC Certified Incident Handler (GCIH). The GCIH certification focuses on detecting, responding, and resolving computer security incidents
CCNP
Cisco Certified Network Professional (CCNP) Routing and Switching certification validates the ability to plan, implement, verify and troubleshoot local and wide-area enterprise networks and work collaboratively with specialists on advanced security, voice, wireless and video solutions.

Co-founderKeelyn Roberts

Chief of Staff (COS)

Keelyn is an active Red Team Operator and cybersecurity researcher. He develops both offensive and defensive cybersecurity tool-sets. His prior experience includes roles as a senior information system analyst and a senior cybersecurity analyst. He has spent over 13 years working within the DoD and a Fortune 100 company. In addition to that, he has also worked on advanced cybersecurity research projects with Smart Information Flow Technologies (SIFT) ranging from new conolic and symbolic fuzzing techniques to advanced cyber analytics.

https://obscuritylabs.com/wp-content/uploads/2018/04/Keelyn.jpg
https://obscuritylabs.com/wp-content/uploads/2018/04/Alex-2.jpg

Co-founderAlexander Rymdeko-Harvey

Chief Executive Officer (CEO)

Alex has extensive experience in the cyber security field. He has worked in the specialized field of adversary emulation in both Government and private organizations. Alex brings extensive knowledge from his experience on the Discover and Counter Infiltration Team for the Department of Defense (DoD) and as a senior cyber-security engineer on the Red Team for a Fortune 100 company. He has authored and co-authored several tools for the Cyber community with the most notable of which being the Empyre and SimplyEmail projects.

Our experts
are certified

OSCP
Offensive Security Certified Professional (OSCP) is the certification for Penetration Testing with Kali Linux, the world’s first hands-on InfoSec certification
CISSP
Certified Information Systems Security Professional (CISSP) is an independent information security certification granted by the International Information System Security Certification Consortium, also known as (ISC)².
GIAC GNFA
GIAC Network Forensic Analyst (GNFA). The GNFA certification is for professionals who want to demonstrate that they qualified to perform examinations employing network forensic artifact analysis.
CEH
Certified Ethical Hacker (CEH) is a qualification obtained by assessing the security of computer systems, using penetration testing techniques.
GIAC GCIA
GIAC Certified Intrusion Analyst (GCIA). Security Professionals that want to demonstrate they are qualified for IT systems hands-on roles with respect to security tasks.
CCNA
Cisco Certified Network Associate Routing & Switching (CCNA) validates the ability to install, configure, operate, and troubleshoot medium-size routed and switched networks, including implementation and verification of connections to remote sites in a WAN.
GIAC GCCC
GIAC Critical Controls Certification (GCCC) is the only certification based on the Critical Security Controls, a prioritized, risk-based approach to security.
GIAC GCIH
GIAC Certified Incident Handler (GCIH). The GCIH certification focuses on detecting, responding, and resolving computer security incidents
CCNP
Cisco Certified Network Professional (CCNP) Routing and Switching certification validates the ability to plan, implement, verify and troubleshoot local and wide-area enterprise networks and work collaboratively with specialists on advanced security, voice, wireless and video solutions.

Co-founderKeelyn Roberts

Chief of Staff (COS)

Keelyn is an active Red Team Operator and cybersecurity researcher. He develops both offensive and defensive cybersecurity tool-sets. His prior experience includes roles as a senior information system analyst and a senior cybersecurity analyst. He has spent over 13 years working within the DoD and a Fortune 100 company. In addition to that, he has also worked on advanced cybersecurity research projects with Smart Information Flow Technologies (SIFT) ranging from new conolic and symbolic fuzzing techniques to advanced cyber analytics.

https://obscuritylabs.com/wp-content/uploads/2018/04/Keelyn.jpg
Call Now Button