The Problem: In today’s threat landscape, the journey to “proactive cybersecurity” is riddled with barriers.
there's a people problem
Because between the talent shortage and high turnover in security operations, finding the right people is hard enough. And it doesn’t help when teams are playing a constant game of “gotcha” instead of working towards the same objectives.
there's a data problem
Because if your data isn’t accurate, adequate, centralized, or actionable, it is next to impossible to measure or improve your security coverage – let alone have any meaningful confidence in it.
there's a tools problem
Because yes, there may be an abundance of tools that claim to solve problems, but differing query languages and clunky integrations often create more problems than solutions.
These challenges, coupled with rapid digital transformation, the rise of cryptocurrency, and the mobilization of cybercriminal enterprises have created a perfect storm for companies and governments alike.
We may not want to admit it, but bad actors got something right. They’ve learned from each other. They’ve simplified their processes and built entire enterprises on the dark web. And, they’ve removed barriers to scale every step of the way.
Meanwhile, an industry-wide duplication of effort exists around building detections. Everyone is so focused on protecting their reputation that they’re missing out on a huge collaboration opportunity.
That’s why we created SnapAttack.
SnapAttack was built to attack hackers with a hacker mindset.
SnapAttack was born out of Booz Allen’s Dark Labs – an incubator housed within one of the largest cybersecurity consultancies in the world. The resources of BAH enabled SnapAttack to mobilize an elite team to examine the problems facing governments, enterprises, and cybersecurity companies. Our goal was simple: come up with an innovative, practical solution – one that could leverage our experience with commercial and nation-state-level cyber operations to help organizations stop a cyberattack before it occurs.
And that’s what we did.
But make no mistake, SnapAttack has carved out its own path since its inception. In 2021, SnapAttack established itself as a standalone company. Since then, we’ve been hard at work, rapidly evolving the platform, enabling proactive threat hunting, removing barriers to detection as code, and advocating for purple teaming – all in one, integrated platform.
Proud of where we came from. Excited for where we’re going.
before + after snapattack
Before SnapAttack: 7 days
After SnapAttack: 1 day
detection testing + deployment
Before SnapAttack: 12 hours
After SnapAttack: 1 hour
threat intel curation
Before SnapAttack: 75 hrs / week
After SnapAttack: 20 hrs / week
leadership team + board of advisors
Built BY security leaders, threat hunters, and red teamers FOR security leaders, threat hunters, and red teamers.
Chief Operating Officer, SnapAttack
Join the team.
We’ve built a team comprised of hard workers, continuous learners, and challengers of the status quo.
Interested in becoming a part of it? We’re rapidly growing and always looking for software engineers, cyber experts, and other talented professionals. Shoot us your resume. Let’s have a conversation.
Sr. Backend Engineer
Sr. Backend Engineer
Sr. Frontend Engineer
Sr. Full Stack Engineer
Director of Artificial Intelligence
Director of IT
Customer Success Engineer
Chief Morale Officer
Built to enable the good guys to do good work with dozens of direct integrations.
Power up your threat detection.
About Peter Prizio
Peter brings over 15 years of experience in product leadership and management with a focus on cybersecurity collaboration platforms. Before SnapAttack, Peter served as the Head of Product for King & Union’s Avalon (acquired) and the VP of Product at CyberGRX. He believes cybersecurity is a problem everyone faces and is passionate about making advanced security products accessible to the masses. Peter loves spending time outdoors, college basketball (go UCONN!), and playing with his kids.
About Fred Frey
Fred is a visionary leader with a drive to push the boundaries of what’s possible. In his over 2 decades at Booz Allen he’s done everything from hunting nation-state actors for the intelligence community, to building a threat hunting capability from the ground up as the technical director of Dark Labs. He’s passionate about community and believes the only way to stop advanced threats is through sharing knowledge. Fred enjoys home improvement and automation projects, coaching his son’s little league team, and relaxing with his family.
About Clayton Barlow-Wilcox
Clayton Barlow Wilcox has spent over 15 years leading cybersecurity and risk management teams at both large organizations and startups, advising executive leadership across government, healthcare, and financial sectors. He’s focused on leading operations and client delivery for the company. Clayton is dedicated to using data and technology to help drive tangible change in cybersecurity. Clayton enjoys playing “competitive” basketball, cooking with his family, and supporting sports teams from his hometown of Boston.
About Tim Nary
Tim has been leading red teams, penetration tests, and security engineering across both government and commercial sectors for over a decade. He created the very first prototype of SnapAttack while working in Booz Allen’s Dark Labs, to help his red team collaborate more effectively with threat hunters. He’s passionate about the details and refuses to compromise on quality or security. Tim is a proud Penn State Alum. He enjoys competing in CTFs, drinking craft beer, and spending time with his wife and 2 dogs.
About Paul Caiazzo
Paul brings 25 years of cybersecurity experience to the team across a variety of disciplines spanning secops, threat detection, and incident response. He also brings an entrepreneurial pedigree to the team, having founded, led and successfully exited TruShield, an MSSP recognized for fast growth and expertise in SOC operations. Paul is passionate about beating the bad guys and has helped hundreds of organizations defend against threats from APTs to ransomware. When not reading intelligence briefings, Paul enjoys turning wrenches on his project cars, growing nuclear-level spicy peppers, cooking, and playing with his Westie, Leonard.