Echelon was born from the idea that cybersecurity isn’t something that a professional services firm can just dabble in. Cybersecurity, privacy and technology risk present major threats that disrupt our way of life. That threat is constantly evolving, so we are too. We see it as our calling to stem the tide. We are all in.
Echelon was built with a purpose. While other cybersecurity professional services firms tout what they do, few can articulate why they do it. We know exactly what drives us - protecting your basic right to security and privacy.
Our origin story begins with our name. The echelon formation creates a staggered but unified front, used to successfully provide excellent range of vision and protection to each participant. From our name, to how we conduct and manage ourselves on a day-to-day basis, we are built to be that trusted ally.
We are Echelon.
Navigating the cybersecurity landscape can be very confusing and overwhelming without the right experience and guidance. A trusted and honest partner can help you to define your cybersecurity and technology risk strategies with confidence. We set ourselves apart from our competition by focusing on relationships and service above all.
Managing cybersecurity, privacy and technology risk is at the core of what we do. It is all we do.
Our clients choose us not only for what we do, but why we do it. It’s our personal mission to make our clients stronger and smarter.
We focus on your needs, not our solutions. By identifying the areas most at risk, we can achieve outcomes with solutions that are tailored for you.
Our team takes pride in contributing and participating in our cyber community. It gives us an edge that helps our team and clients stay vigilant.
The cyber threat landscape is littered with persistent and sophisticated actors who are benefitting by disrupting our government, major institutions, privately held businesses, public companies and our individual safety and privacy. SolarWinds and Colonial Pipeline are just the latest headlines.
The organizations constantly bombarded by threats are the same organizations that make it possible for us to fill our cars with gas so we can make tee-ball practice. They hold our life’s savings, they produce the software that runs the flow of traffic on our streets and the grid that powers our homes.
There is only so much difference one person, one idea, one firm can make. This is why, as we serve our clients, we also pledge to serve the greater cybersecurity community that is fighting this battle along with us. We take our mission to heart.
We believe the best cybersecurity teams are made up of people from varied backgrounds. Diverse backgrounds mean diverse experiences, and flexible thinking in the face of threats.
Dan is CEO & Managing Partner at Echelon. With nearly 20 years of experience in IT, audit, risk and cybersecurity, he has led and built highly focused cybersecurity teams at top professional service firms before joining Echelon. Dan’s experience establishing and offering new and innovative lines of cybersecurity services not only provides leadership across the industry and organization, it’s the reason Echelon was built and serves as its vision for growth.
A seasoned information security and risk management professional, Chris’ 20-year career has spanned multiple industries and disciplines at Fortune 100 corporations, two of the ten largest banks in the world, and Big 4 consulting. Chris has also designed and taught graduate courses in data analytics and security at Ohio State’s Fisher College of Business and brings unique knowledge of application architectures and design to every engagement.
Luke is a Senior Manager at Echelon with over 12 years of experience in developing and implementing Cybersecurity, Governance, Risk & Compliance (GRC), and Business Continuity strategies. He has consulted with numerous clients in the financial services, insurance, and healthcare industries, and has a proven track record of delivering successful projects while maintaining a customer-focused approach.
With over 10 years of cyber-attack and defense experience, Dahvid has previously worked as a Red Team Operator with a Big 4 consulting firm, leading and conducting Adversarial Emulation exercises. He also previously served as an operator and liaison for the Joint Special Operations Command to other DoD agencies and several intelligence agencies, providing mission-critical planning and coordination of special operation cyber activities.
Nick has over 15 years of professional experience in assessing and developing information security programs and designing value-derived security solutions in high-security environments. He specializes in a real-world approach to information security and compliance, striving to provide unique insights and customized organizational solutions.
Ross enjoys helping our clients achieve measurable cybersecurity improvements in their businesses. Ross’ previous experience leading Disaster Recovery, Incident Response and Risk Management initiatives for a Fortune 200 international manufacturing organization, shaped his holistic approach to addressing security concerns. He equally prioritizes people, processes and technology to tailor fit solutions across highly complex technology environments.
James brings extensive experience performing Offensive Security assessments covering the full range of the MITRE ATT&CK framework. As a prior Red Team Operator at a Big 4 consulting firm, he has performed assessments and developed tradecraft to compromise organizations spanning the healthcare, automotive, consumer goods and government / public sector industries.
Breanna has broad experience delivering cyber security services in both the private and public sectors, from a major aerospace research company to a Fortune 500 financial institution. She has experience in assessing and analyzing nation-wide security standards, such as NIST, to assist in building an Incident Response framework from the ground up as well as a CASB administration.
Jake has extensive experience in both building and pen testing web applications and network infrastructure. His work with bug bounties and the Bugcrowd platform has resulted in over 70 discovered vulnerabilities in Fortune 500 companies throughout the banking, retail and government industries.
Conner began his career at a Top 100 Accounting Firm working in the IT and cybersecurity departments. His experience providing audits, security consulting and compliance services across various industries, provides versatile guidance when delivering IT audit, risk and cybersecurity services.
Lily is an Offensive Security Consultant. She began her career on the business side with experience in sales, marketing, and client success. Her passions for privacy and problem solving led her to webapp and network penetration testing. In her free time, she enjoys growing her offensive security knowledge, playing CTFs, and watching Auburn football.