Skip to content

Offensive Security Experts

Customizable solutions to educate clients, identify security risks, inform intelligent business decisions, and enable you to reduce your attack surface digitally, physically and socially.

Red Teaming®

A multi-layered attack simulation designed to measure how well a company’s people and networks, applications, and physical security controls can withstand an attack from an adversary.

Penetration Testing

Inspects your network, application, device, and physical security through the eyes of BOTH a malicious actor and an experienced cybersecurity expert.

Social Engineering

Commonly known as “people hacking,” we aim to identify venerabilities by accessing a system, device, or physical premises.

Is You're Company Compliant?

RedTeam Security are the experts in helping you meet your industry’s security compliance standards, from banking to healthcare, retail and beyond.

PCI Penetration Testing

NERC CIP Compliance

HIPAA Penetration Testing

FDIC Penetration Testing

Cryptocurrency Compliance

Team

We’ve been around since 2008 and though our clients benefit from our experience, wisdom and stability - it’s our partnerships and client-focused approach that we are judged by.  Our performance depends almost entirely on our people, and gratefully, they are amazing! Once you get to know us, give us a call so we can get to know you.

  • Jeremiah Talamantes

    Owner & Principle Ponderer

  • Ryan Manship

    President

  • Kate Talamantes

    Business Operations Director & Managing Partner

  • Kelly Osterberg

    Operations Manager

Close

Jeremiah Talamantes

Owner & Principle Ponderer

Jeremiah has been in the IT industry for nearly 20 years and is the creator of The PlugBot Research Project – a foray into the concept of a hardware botnet. He has a master’s degree in Information Security & Assurance and an executive business education from the University of Notre Dame, Mendoza School of Business. Jeremiah is an active security researcher and an adjunct professor at Norwich University, College of Graduate Studies in Information Security & Assurance. He is the author of The Social Engineer’s Playbook: A Practical Guide to Pretexting and has appeared on national TV news outlet, FOX News Live with Adam Housley. Additionally, he has been quoted and interviewed by CNN, Yahoo! Finance, Houston Chronice, Rigzone, Business Insider, Tech Insider, CIO Magazine, PenTest Magazine, POWER Magazine, LegalNews, Finance & Commerce and others.

Jeremiah was an accepted speaker at Hack In The Box (Amsterdam, Netherlands), Defcon 19 (Las Vegas, NV), Cyber Storm III (Zürich, Switzerland), Hack in Paris (Paris, France), TakeDownCon (Dallas, TX), High Tech Crime Investigation Association International Expo 2015 (Orlando, FL), Hack In Miami 2015 (Miami, FL) and NolaCon 2015 (New Orleans, LA). He is a CISSP, CCISO, CEH, CHFI, CCENT and a pretty swell guy.

Ryan Manship

President

Ryan has a Bachelors of Science degree in Information Technology from Minnesota State University Mankato (MNSU) with an emphasis on Networking and Security. He also minored in both Philosophy and Humanities, which further strengthens his skill sets, both as a security professional and as a leader. As the President of RedTeam, Ryan oversees operations, which includes managing a team of consultants, performing security testing, and providing security guidance to customers. Previous to his role with RedTeam Security, Ryan led the Application Security program at Fair Isaac (FICO).

Ryan holds the Sherwood Applied Business Security Architecture (SABSA) Chartered Foundational Level (SCF) certification.

Ryan ensures he is able to stay current on all things cybersecurity thanks to several organizations. He is a member of the Open Web Application Security Project (OWASP), the SANS Securing the Human (STH) Advisory board, the Information Security and Risk Management Professional Science Masters (ISRM PRM) program advisory board at MNSU, an executive council member of the Minnesota Cyber Careers Consortium (MNC3), is a member of the local chapter of the SABSA World Congress, and is a founding member of the SABSA Institute.

Ryan has appeared on ABC News, Business InsiderTech Insider and has been quoted in Los Angeles Times, Bringmethenews, the Star Tribune, and speaks at a variety of security events.

When he isn’t busy breaking into things or talking about Information Security, Ryan enjoys spending time with his friends and family and playing games, of both the video and board variety. If you’re ever in the mood to get smoked in a game of Settlers of Catan, he’s your guy.

Kate Talamantes

Business Operations Director & Managing Partner

Kate has developed her business acumen over several years while she founded, ran and eventually sold her professional services company after 5 years in operation. She has a bachelor’s degree in Organizational Communications, Business Administration and a master’s degree in Education from University of Wisconsin, River Falls.

Kate is a strong strategic business adviser with a knack for efficient operational tactics. As a co-owner, she assists RedTeam Security in virtually all aspects of business and finance. She also makes great Old Fashioned’s for everyone in the office.

Kelly Osterberg

Operations Manager

Kelly Osterberg is the Operations Manager at RedTeam Security. She possesses a Bachelor of Science degree in Business Management, with an emphasis in Administration.

To best serve RedTeam’s clients, Kelly utilizes her extensive customer service and management background on a daily basis. Her primary focus within this role is making sure client needs are met throughout the course of each engagement. She accomplishes this objective by keeping a watchful eye on the Operations team to keep projects in scope, hit deadlines, and surpass expectations. Her attention to detail helps ensure a smooth client transition from sales to the operational side of the house. From signature to remediation verification, Kelly provides an excellent client experience at every turn.

In addition to the work that takes place within RedTeam’s walls, Kelly works with local organizations in an effort to stay involved in the security community, help provide guidance to those who are new to the industry and provide feedback to the educators who arm our future industry experts.

Most importantly, she keeps the snack cupboard at the office well stocked.

Vertical Wave

Case Studies

Check Out Some Examples Of Our Work Below

Parking Panda

RedTeam met our accelerated timeline needs very well, getting application penetration testing done on an extremely tight timeline while still providing complete coverage for the testing.

Penetration-Testing-case-study

Hunter Management Consulting

We were able to quickly re-mediate issues and ensure the network and applications were secure.

edmentum-security-case-study

Edmentum, Inc.

We have worked closely with RedTeam on similar audits in the past and we’ve always been very happy with the thoroughness and quality of the work performed, as well as how the results were presented.

Certifications

Helping our clients strengthen the security of their networks, applications, premises and people is our top priority. To guarantee we provide offensive security solutions of the highest quality, our team holds a number of industry certifications demonstrating high standards of proficiency.

  • Offensive Security Certified Professional (OSCP)

  • Offensive Security Wireless Professional (OSWP)

  • IACRB Certified Application Security Specialist (CASS)

  • IACRB Certified Penetration Tester (CPT)

  • Certified SCADA Security Architect (CSSA)

  • Certified Information Systems Security Professional (CISSP)

  • Certified Hacking Forensic Investigator (CHFI)

  • Certified Ethical Hacker (CEH)

  • Certified Internet Web Professional (CIW)

Close

Offensive Security Certified Professional (OSCP)

The world’s first completely hands-on offensive information security certification. The OSCP challenges students to demonstrate “understanding of the penetration testing process and life-cycle through an arduous twenty-four (24) hour certification exam.”

Offensive Security Wireless Professional (OSWP)

An OSWP certification proves an individual has the practical ability to perform 802.11 wireless audits using open source tools on several dedicated wireless networks with various configurations and vulnerabilities.

IACRB Certified Application Security Specialist (CASS)

This Information Assurance Certification Review Board certification indicates a knowledge of application security best practices and the ability to identify code vulnerabilities, security threats, and assessment/attack techniques.

IACRB Certified Penetration Tester (CPT)

This Information Assurance Certification Review Board certification addresses penetration testing methodologies, network reconnaissance and protocol attacks, vulnerability identification, Windows and Unix/Linux exploits, covert channels and rootkits, wireless security flaws, and web application vulnerabilities.

Certified SCADA Security Architect (CSSA)

This IACRB certification entails: SCADA security policy development, security standards and best practices, protocol security issues, access control, securing field communications, user authentication and authorization, detecting cyber attacks and vulnerability assessments.

Certified Information Systems Security Professional (CISSP)

The first information security credential to meet the strict conditions of ISO/IEC Standard 17024, the CISSP “focuses on the practical application of cybersecurity knowledge and tools.” Exploring “actual, on-the-job issues and risks,” this certification values a systematic approach to cybersecurity.

Certified Hacking Forensic Investigator (CHFI)

EC-Council’s CHFI certifies computer forensics and the ability to perform incident response and forensics, electronic evidence collections, and digital forensic acquisitions; work on technical examination, analysis and reporting of computer-based evidence; investigate events for evidence of insider threats or attacks, and more.

Certified Ethical Hacker (CEH)

The CEH certification from the EC-Council recognizes an understanding of how to identify weaknesses and vulnerabilities in target systems, and use the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner.

Certified Internet Web Professional (CIW)

 Focuses on the foundational standards related to Internet function including Web design, development, administration, networking, databases, and security.

Vertical Wave