We help not only find the talent you need to be successful but also manage, train and maintain the high levels of expertise required in today’s security operations center.
JASK Special Ops is a force multiplier for your existing team, offering both mentoring and direct support. There when you need them, JASK Special Ops offers instant access to an elite cyber threat hunting team with the ability to create low-density, high-demand assets that would otherwise be too costly to create in your own environment.
Made up of top talent from elite cyber units across industry-leading cybersecurity companies, the JASK Special Ops team is armed with the latest equipment and top-tier training to eliminate quickly-evolving threats.
The JASK Special Ops team operates with deep knowledge of the current cyber battlespace. Through its work across customer environments, the team has a broad understanding of emerging threats and applies that intelligence to protecting your environment.
Knowing that network compromise is inevitable, the JASK Special Ops team is on-call 24/7 to support you when it happens. Our elite team of threat hunters is armed with the most innovative technology to combat any threat.
As lead threat analyst, Kevin Stear is responsible for the day-to-day operations of JASK Special Ops. Kevin is a seventeen-year veteran of the U.S. Department of Defense (DoD). He first served as a US Navy Chief, where he was deployed three times, and then continued his service in the civilian ranks until 2015. Since his departure from government service, Kevin prototyped the Hadoop-based security data analytics framework at Aetna and then led threat research and content development efforts for RSA Firstwatch. Kevin holds degrees from Georgetown (B.A. ‘98) and New York University (M.S. ‘06), speaks English and German, lives with his family in Denver, and needs at least 20 days on the mountain.
Brian Gardiner is a senior threat analyst on the JASK Special Ops team. Brian has over eight years of experience in cybersecurity with previous positions which include vulnerability analyst and security engineer, across both public and private sectors. Prior to JASK, Brian worked as a senior incident response analyst with IBM X-Force IRIS and at Aetna as the information security advisor for the Security Data Analytics team. Brian earned a Bachelor of Arts degree from The University of Pittsburgh and a Master of Science degree from Carnegie Mellon University.
Greg Longo is a senior threat analyst on the JASK Special Ops team. Greg has over a decade of experience in cybersecurity with previous positions which include global cyber threat management lead and information security specialist. He served almost 10 years in the Air National Guard as a cyber operations officer of the 166th Network Warfare Squadron and commander of the 166th Communications Flight. Greg earned a Master of Science degree from Carnegie Mellon University along with a Bachelor of Business Administration degree from The University of Pittsburgh and a Master of Business Administration degree from Wright State University.
Darren Spruell is a threat analyst on the JASK Special Ops team, bringing experience in threat analysis and incident response with a focus on helping customers control risk through insights into the threat landscape they face. Prior to JASK, Darren was a threat researcher with RiskIQ, where he led technical research efforts in a number of fields and with companies of all sizes. Darren brings deep experience using intelligence-driven countermeasures to help customers build defensible environments and instruments that provide visibility and control. Darren also previously held technical positions at Charles Schwab, Apollo Group, Honeywell and Dell. He earned a Bachelor of Arts degree from Utah Valley University and a Bachelor of Science degree in Information Technology from Capella University.
Ellie Soto is a threat analyst on the JASK Special Ops team, bringing to the role over seven years of experience with the U.S. Department of Defense (DoD) as a digital network vulnerability analyst. Through her research at the DoD, Ellie pioneered a number of Computer Network Exploitation (CNE) techniques and investigated malware strains. Part of Ellie’s tenure with the DoD was held while deployed in Afghanistan and while stationed at Fort Meade in Maryland. Ellie was also previously a senior instructor with Cyberspace Solutions, where she curated and taught technical SIGINT analysis techniques to deploying soldiers. Ellie holds a Bachelor of Science degree from Saint Francis University.