We’ve expanded our partnership with Mandiant, now part of Google Cloud, to help our users operationalize and prioritize threat intelligence. READ THE PRESS RELEASE >

company

About SnapAttack.

The Problem: In today’s threat landscape, the journey to “proactive cybersecurity” is riddled with barriers.

there's a people problem

Because between the talent shortage and high turnover in security operations, finding the right people is hard enough. And it doesn’t help when teams are playing a constant game of “gotcha” instead of working towards the same objectives.

there's a data problem

Because if your data isn’t accurate, adequate, centralized, or actionable, it is next to impossible to measure or improve your security coverage – let alone have any meaningful confidence in it.

there's a tools problem

Because yes, there may be an abundance of tools that claim to solve problems, but differing query languages and clunky integrations often create more problems than solutions.


These challenges, coupled with rapid digital transformation, the rise of cryptocurrency, and the mobilization of cybercriminal enterprises have created a perfect storm for companies and public sectors alike.

We may not want to admit it, but bad actors got something right. They’ve learned from each other. They’ve simplified their processes and built entire enterprises on the dark web. And, they’ve removed barriers to scale every step of the way.

Meanwhile, an industry-wide duplication of effort exists around building detections. Everyone is so focused on protecting their reputation that they’re missing out on a huge collaboration opportunity.

That’s why we created SnapAttack.

cybersecurity storm
our story

SnapAttack was built to attack hackers with a hacker mindset.

snapattack team

SnapAttack was born out of Booz Allen’s Dark Labs – an incubator housed within one of the largest cybersecurity consultancies in the world. The resources of BAH enabled SnapAttack to mobilize an elite team to examine the problems facing public sectors, enterprises, and cybersecurity companies. Our goal was simple: come up with an innovative, practical solution – one that could leverage our experience with commercial and nation-state-level cyber operations to help organizations stop a cyberattack before it occurs.

And that’s what we did.

But make no mistake, SnapAttack has carved out its own path since its inception. In 2021, SnapAttack established itself as a standalone company. Since then, we’ve been hard at work, rapidly evolving the platform, enabling proactive threat hunting, removing barriers to detection as code, and advocating for purple teaming – all in one, integrated platform.

Proud of where we came from. Excited for where we’re going.

before + after snapattack
vulnerability exposure

Before SnapAttack: 7 days
After SnapAttack: 1 day

detection testing + deployment

Before SnapAttack: 12 hours
After SnapAttack: 1 hour

threat intel curation

Before SnapAttack: 75 hrs / week
After SnapAttack: 20 hrs / week

leadership team + board of advisors

Built BY security leaders, threat hunters, and red teamers FOR security leaders, threat hunters, and red teamers.

Peter Prizio

Peter Prizio

Chief Executive Officer
Fred Frey

Fred Frey

Co-Founder + Chief Technology Officer
Clayton Barlow Wilcox

Clayton Barlow-Wilcox

Chief Operating Officer
Tim Nary

Tim Nary

Co-Founder + Chief Platform Officer
investors
Venture Capital
Individual
patrick gorman

Patrick Gorman

EVP, Booz Allen Hamilton

Former CISO, Bank of America

Former Chief Security Officer, Bridgewater Associates

mike mcconnell

Mike McConnell

Former: Director, NI; Director, NSA; Vice Chairman, Booz Allen Hamilton

bob rose

Bob Rose

Advisory Council, Department of Homeland Security

snapattack man crossing arms
SnapAttack turns your team into cyber ninjas.
“We have built a machine that turns your team into cyber ninjas. We’re operators… that’s why we built SnapAttack to go beyond just reporting and shelfware.”

Clayton Barlow-Wilcox
Chief Operating Officer, SnapAttack
careers

Join the team.

We’ve built a team comprised of hard workers, continuous learners, and challengers of the status quo.

Interested in becoming a part of it? We’re rapidly growing and always looking for software engineers, cyber experts, and other talented professionals. Shoot us your resume. Let’s have a conversation.

matt
Matt Bowen
Frontend Engineer
Jordan Camba
Jordan Camba
Senior Solutions Architect
Paul Carrillo
Paul Carrillo
Sr. Security Engineer
jacob
Jacob Delgado
Sr. Backend Engineer
person
Michael Drinkwater
Sr. Backend Engineer
person
Tessa Georgen
Content Automation
Steven Gerry Headshot
Steven Gerry
VP of Sales
kevin johnson frontend
Kevin Johnson
Frontend Engineer
justin
Justin Kaldenbach
Sr. Full Stack Engineer
Claire Robertson Headshot
Claire Robertson
Customer Success Manager
russell
Russell Schaffer
Director of IT
trenton
Trenton Tait
Threat Researcher
jonathan
Jonathan Woodell
Backend Engineer
AJ Jones
AJ King
Director of Threat Research
beesly
Beesly
Chief Morale Officer
careers

Join the team.

We’ve built a team comprised of hard workers, continuous learners, and challengers of the status quo.

Interested in becoming a part of it? We’re rapidly growing and always looking for software engineers, cyber experts, and other talented professionals. Shoot us your resume. Let’s have a conversation.

why snapattack?

Built to enable the good guys to do good work with dozens of direct integrations.

Partners
Integrations

DOWNLOAD: SNAPATTACK INTEGRATIONS

SnapAttack was built to power not just one tool, but to help you get the most out of any security tool. Legacy tooling has driven cybersecurity teams into a cycle of constantly buying, configuring, and managing tool after tool, new ones hitting the market every day as existing ones become obsolete. Explore the platform’s 30+ direct integrations to understand what SnapAttack can do for you.

Power up your threat detection.

About Peter Prizio

Peter brings over 15 years of experience in product leadership and management with a focus on cybersecurity collaboration platforms. Before SnapAttack, Peter served as the Head of Product for King & Union’s Avalon (acquired) and the VP of Product at CyberGRX. He believes cybersecurity is a problem everyone faces and is passionate about making advanced security products accessible to the masses. Peter loves spending time outdoors, college basketball (go UCONN!), and playing with his kids.

About Fred Frey

Fred is a visionary leader with a drive to push the boundaries of what’s possible. In his over 2 decades at Booz Allen he’s done everything from hunting nation-state actors for the intelligence community, to building a threat hunting capability from the ground up as the technical director of Dark Labs. He’s passionate about community and believes the only way to stop advanced threats is through sharing knowledge. Fred enjoys home improvement and automation projects, coaching his son’s little league team, and relaxing with his family.

About Clayton Barlow-Wilcox

Clayton Barlow Wilcox has spent over 15 years leading cybersecurity and risk management teams at both large organizations and startups, advising executive leadership across government, healthcare, and financial sectors. He’s focused on leading operations and client delivery for the company. Clayton is dedicated to using data and technology to help drive tangible change in cybersecurity. Clayton enjoys playing “competitive” basketball, cooking with his family, and supporting sports teams from his hometown of Boston.

About Tim Nary

Tim has been leading red teams, penetration tests, and security engineering across both government and commercial sectors for over a decade. He created the very first prototype of SnapAttack while working in Booz Allen’s Dark Labs, to help his red team collaborate more effectively with threat hunters. He’s passionate about the details and refuses to compromise on quality or security. Tim is a proud Penn State Alum. He enjoys competing in CTFs, drinking craft beer, and spending time with his wife and 2 dogs.