About Us

We take great pride in the exceptional individuals who comprise our team – each with a unique and impressive background.

Our Team

Our team of engineers boasts an array of experiences, including serving in Army Special Operations, teaching at the NSA, and collaborating with Microsoft to enhance Windows kernel security. Through their diverse expertise and unwavering attention to detail, our team is dedicated to delivering the highest quality results for our clients.

Dedicated. Experienced.

Focused.

 

At White Knight Labs, we serve a diverse clientele that spans numerous industries. Our client base ranges from dynamic tech startups that are conscious about their security to Fortune 1000 companies that require robust and advanced security solutions.

Engagement strategy

At White Knight Labs, the process starts with a comprehensive understanding of the elements driving the client’s security needs. Every penetration test we undertake is custom-tailored to achieve each client’s specific objectives. Whether the aim is SOC2 compliance, meeting vendor requirements, or conducting a secure code review prior to a product launch, we ensure that each assessment aligns with the specific business needs of the client.

Co Founder

Co Founder

During the last 10 years he has worked in the following roles: blue team lead, developer, senior penetration tester, and red team lead. Focused mostly on exploit development and offenisve cyber operations, he has led red team engagements in highly complex Fortune 500 companies. Worked hand-in-hand with Microsoft to increase kernel security for the Windows 10 operating system. He has led training at BlackHat and DerbyCon.

Holds the following certificates: Offensive Security Certified Professional (OSCP), Offensive Security Certified Expert (OSCE), Certified Red Team Expert (CRTE).

Co Founder

Co Founder

His time in Army special operations and teaching at the NSA gives him a unique background for conducting full-scope offensive cyber operations. He has led over 200 penetration tests that include network, cloud, mobile, web app, API technologies. Has authored and taught courses at DerbyCon and Calvin University.

He holds the following certifications:GIAC Certified Penetration Tester (GPEN),GIAC Exploit Researcher and Advanced Penetration Tester (GXPN), GIAC Web Application Penetration Tester (GWAPT), and Certified Red Team Professional (CRTP).

cyber-security expertise portrayed by individual point at locked shield in front of laptop, tablet and phone image.

Security Experts

Passionate and forward-thinking, our engineers brings decades of technical experience as world-class offensive cyber experts.

Drawing from experience working in major cybersecurity firms, government agencies, and testing Fortune 500 organizations, our engineers are industry leaders that give back to the security community.

Research and Technical Depth

Radical dedication to learning allows us to bring hyper-current and oftentimes unknown TTPs to bare during engagements.

Our unwavering dedication to completing the mission and a ‘never satisfied’ attitude separates us from other security firms.

We pride ourselves on both depth and breadth of offensive security capabilities.

Research and Technical Depth of White Knight Labs portrayed by image of tech holding up large card of information
Outstanding Cyber Security reporting portrayed by image of locked shield with graphics and presentation visible in the background.

Refined, Professional Reporting

The engineers at White Knight Labs use a business risk based approach during reporting.

Our reports focus on the likelihood of exploitation and the impact on the business.

All reports include the following items: scanning results, csv file with findings and mitigations, Executive Summary, and final report in pdf format.

Let’s Chat

Want to know more about our team of experts that include former Special Operations talent, NSA educators, and cybersecurity industry leaders?

At White Knight Labs, we take pride in our diversity, skill depth, and commitment to your business’s safety. We’re more than happy to address your queries and help you understand how we can tailor our services to protect your digital environment most effectively.