Red Siege Brings on Saunders as Principal Consultant

By Red Siege | May 7, 2018

Red Siege is excited to announce the hiring of Mike Saunders as Principal Consultant to help manage the organization’s growing client list.

Saunders joins Red Siege from Cargill where he served as a senior penetration tester. He also previously worked with Noridian Mutual Insurance as a penetration testing and vulnerability assessment lead.

“We are so happy to have Mike on the team,” said Red Siege founder Tim Medin. “Mike is excellent at his job and is a pleasure to work with as we help organization’s identify and address information security issues.”

Saunders’ role as principal consultant will include performing web application and network pen tests and vulnerability assessments, internal pivot and post-exploitation engagements, red team adversary simulations, and mobile application security assessments.

“I am excited to bring my knowledge and skills to Red Siege,” Saunders said. “Red Siege is doing amazing work finding vulnerabilities before the bad guys, and I look forward to helping organizations identify weaknesses in their systems and improve their security posture.”

Moving beyond T4 – Deconstructing Nmap Tuning

By Red Siege | July 6, 2022

by Alex Norman, Senior Security Consultant Nmap -T4 -iL targets.txt This is a very common scan string that many people use to get initial recon done on assessments and, to […]

Learn More
Moving beyond T4 – Deconstructing Nmap Tuning

Creating a Simple Windows Domain for Offensive Testing: Part 4

By Red Siege | June 23, 2022

By: Justin Palk, Security Consultant This is part four of my series of blog posts on creating a windows domain for offensive security testing. In part 1, I stood up […]

Learn More
Creating a Simple Windows Domain for Offensive Testing: Part 4

Creating a Simple Windows Domain for Offensive Testing: Part 3

By Red Siege | June 15, 2022

by Security Consultant Justin Palk Welcome back to my series on setting up a Windows domain for offensive testing. In the first two installments (Part 1, Part 2), I stood […]

Learn More
Creating a Simple Windows Domain for Offensive Testing: Part 3

Find Out What’s Next

Stay in the loop with our upcoming events.