Located inside of the historic Union Depot building in St. Paul, Minnesota, RedTeam Security has been providing premier information security services since 2008. Focusing on Penetration Testing, Social Engineering, Physical Security and Red Teaming, our team of highly-skilled analysts bring a wealth of experience, wisdom, and stability to every project. Driven by a dedication to helping organizations discover and address their security vulnerabilities, RedTeam Security leaves clients in a defensible position, ready to face security threats head-on.

  • Jon Anderson


  • Kevin Keane

    Executive Vice President

  • Diana LaValle

    Vice President of Sales

  • Meeghan McGahan

    Vice President of Operations

  • Misha Smith

    Vice President of Marketing

  • Angie Dean

    Director of Sales

  • Jeremiah Talamantes


  • Brian Halbach

    Security Analyst

  • Jonathan Studebaker

    Security Analyst

  • Thomas Pierigastini

    Security Analyst

  • Van Sice

    Security Analyst

Jon Anderson - RedTeam Security

Jon Anderson


Jon Anderson is an entrepreneurial leader who develops award-winning sales and service teams. Before joining RedTeam Security, Jon held the roles of President and CEO of popular boutique technology companies, growing these companies into multi-million dollar organizations in less than three years. Jon’s success stems from his ability to build innovative strategies that not only meet market demands but provide best-in-class customer responsiveness and overall client experiences. Jon’s solid reputation is based on recruiting and developing high-performing sales and operations teams who consistently deliver on the customer promise.

As a leader, Jon values and models flexibility, superior execution and creativity. Jon’s enthusiasm and drive are contagious, and his teams continue to thrive through his commitment to ongoing training and embracing innovation that aligns sales and service. Jon’s people-first and value-driven approach is evident in every RedTeam engagement.

Kevin Keane - RedTeam Security

Kevin Keane

Executive Vice President

Kevin Keane is a cybersecurity attorney, tech-startup investor and Executive Vice President at RedTeam Security. Kevin has more than 3 decades of experience facilitating success for entrepreneurs and has held the role of CEO for an international trade association and president of a franchising company. Kevin brings his deep-rooted expertise in cyberlaw and privacy; franchising and licensing to RedTeam as well as his passion for sharing knowledge. Kevin writes and speaks to hundreds of small business owners each year on topics of interest, including such diverse areas as Augmented Reality, Cyber Risk Management, and Interactive Retail.

Diana LaValle - RedTeam Security

Diana LaValle

Vice President of Sales

Diana is an accomplished IT professional with a diverse industry background. Having spent 10+ years in the IT and Security space, Diana is driven to help organizations make important security decisions to protect and secure their information, customers and business.

As the Vice President of Sales at RedTeam, Diana uses her strong roots in software development and passion for helping others to fuel her work with talented teams across the country to ensure the delivery of high-quality information security projects. Diana holds a Master of Science degree in Software Engineering from the University of St. Thomas.

Meeghan McGahan - RedTeam Security

Meeghan McGahan

Vice President of Operations

Meeghan is a solid operation and project manager with significant experience in IT security within two of the largest banking institutions in the US. Meeghan has worked successfully with cross-functional teams to leverage technology and business knowledge to create and maintain comprehensive, innovative and supportable solutions for her clients. Though practical leadership and a compelling vision of excellence, Meeghan develops teams that are laser-focused on delivering superior results.

With formal training in Lean and Agile, Meeghan consistently draws on her background and experience as foundations for her process improvement programs. Because of her solid understanding of the benefits of a sustainable process re-architecture, RedTeam Security and our clients recognize significant benefits including competitive pricing, cutting edge products, and better overall customer experiences. Internally, Meeghan’s teams have adopted her enthusiasm and “work smarter not harder” mentality and the pride in their work shows.

Misha Smith - RedTeam Security

Misha Smith

Vice President of Marketing

Misha Smith is the Vice President of Marketing for RedTeam Security. Misha has been working in the information security industry for the past four years and is passionate about educating individuals and organizations on cybersecurity best practices. Misha brings a creative perspective to marketing and communications at RedTeam and is guided in her work by a code of providing quality information to clients that is relevant to their business and ultimately puts them in a more defensible position to face cyber threats.

Angie Dean - RedTeam Security

Angie Dean

Director of Sales

Angie Dean is the Director of Sales at RedTeam Security. Angie is a creative solution professional with a passion for the work she does for her clients. As great as her passion is for creating a successful solution for her clients, Angie’s greatest asset is building relationships and trust quickly with her partners and clients by committing and delivering on what she says she will do by a specific deadline. Angie has over 20 years of experience in sales with 5 years of Cybersecurity Sales expertise. Outside of work, Angie loves spending time with her wonderful family and her Chinese Pug named Otis.

Jeremiah Talamantes - Founder RedTeam Security

Jeremiah Talamantes


Jeremiah has been in the IT industry for nearly 20 years and is the creator of The PlugBot Research Project – a foray into the concept of a hardware botnet. He has a master’s degree in Information Security & Assurance and executive business education from the University of Notre Dame, Mendoza School of Business. Jeremiah is an active security researcher and an adjunct professor at Norwich University, College of Graduate Studies in Information Security & Assurance. He is the author of The Social Engineer’s Playbook: A Practical Guide to Pretexting and has appeared on the national TV news outlet, FOX News Live with Adam Housley. Additionally, he has been quoted and interviewed by CNN, Yahoo! Finance, Houston Chronicle, Rigzone, Business Insider, Tech Insider, CIO Magazine, PenTest Magazine, POWER Magazine, LegalNews, Finance & Commerce and others.

Jeremiah was an accepted speaker at Hack In The Box (Amsterdam, Netherlands), Defcon 19 (Las Vegas, NV), Cyber Storm III (Zürich, Switzerland), Hack in Paris (Paris, France), TakeDownCon (Dallas, TX), High Tech Crime Investigation Association International Expo 2015 (Orlando, FL), Hack In Miami 2015 (Miami, FL) and NolaCon 2015 (New Orleans, LA). He is a CISSP, CCISO, CEH, CHFI, CCENT and a pretty swell guy.

Brian Halbach - RedTeam Security

Brian Halbach

Security Analyst

Brian Halbach is a security consultant at RedTeam Security in Saint Paul, MN. A graduate of the University of Wisconsin-Stout with a Bachelor of Science in Information Technology Management and a minor in Computer Science. Brian’s previous experience as a lead security engineer and systems administrator has given him a perspective into network and systems administration that brings a unique viewpoint to his security and penetration testing skillset and allows him to think outside the box.

Industry Certifications include; Cisco Certified Networking Associate (CCNA), Cisco Certified Networking Associate Security (CCNA Security), Cisco Certified Networking Associate Cyber Ops (CCNA Cyber Ops), and Comptia Security+.

Jonathan Studebaker - RedTeam Security

Jonathan Studebaker

Security Analyst

Jon Studebaker currently works as a Security Consultant for RedTeam Security. Before joining RedTeam Security, Jon worked as a Senior Computer Systems Administrator at the University of Nevada, Reno. In addition to system administration tasks, Jon focused on security-related duties including incident response and remediation, end-user education and training, system hardening, and penetration testing. In addition to his systems administrator position, Jon has held roles in data analysis and software development. Jon holds a Bachelor of Science in Computer Science from the University of Nevada, Reno and is an Offensive Security Certified Professional (OCSP). 

Credentials: OCSP

Thomas Pierigastini - RedTeam Security Analyst

Thomas Pierigastini

Security Analyst

Thomas Pieragastini currently works as a security consultant with RedTeam Security. Before this role, Thomas was a penetration tester at PNC Bank with a focus on web applications and APIs. Thomas has also worked in threat intelligence and threat analysis in the financial industry, analyzing attack data, performing open-source intelligence gathering and research and constructing strategic approaches to mitigate threats. Before moving into information security, Thomas obtained a Ph.D. in Philosophy from Binghamton University and taught university-level philosophy courses with a focus on logic, epistemology and contemporary theory.

Thomas is a regular speaker at the Northeast Ohio Security Forum and B-Sides Cleveland, with topics ranging from the history of information security and the use of port scanning for geopolitical research to the structure of kernel modifications and security-based modifications in secure Linux builds.

Credentials: GWAPT (GIAC Web Application Penetration Tester) and OSCP (Offensive Security Certified Professional).

Van Sice _ RedTeam Security

Van Sice

Security Analyst

Van Sice currently works as a security consultant with RedTeam Security. Before this role, Van tested web applications and APIs for PNC Bank. Van has also been mentoring SANS Immersion Academies and works for them as a Subject Matter Expert. Van moved into information security after reading an Electronic Frontier Foundation article discussing how marketers observed what people entered into forms on and has been a data privacy advocate ever since.

Industry Certifications include; GIAC Security Essentials (GSEC), GIAC Certified Incident Handler (GCIH), GIAC Python Coder (GPYC), GIAC Web Application Penetration Tester (GWAPT) and GIAC Certified Web Application Defender (GWEB).

Vertical Wave

Case Studies

Check Out Some Examples Of Our Work Below


Parking Panda

RedTeam met our accelerated timeline needs very well, getting application penetration testing done on an extremely tight timeline while still providing complete coverage for the testing.


Hunter Management Consulting

We were able to quickly re-mediate issues and ensure the network and applications were secure.


Edmentum, Inc.

We have worked closely with RedTeam on similar audits in the past and we’ve always been very happy with the thoroughness and quality of the work performed, as well as how the results were presented.


Helping our clients strengthen the security of their networks, applications, premises and people is our top priority. To guarantee we provide offensive security solutions of the highest quality, our team holds a number of industry certifications demonstrating high standards of proficiency.

  • Offensive Security Certified Professional (OSCP)

  • Offensive Security Wireless Professional (OSWP)

  • IACRB Certified Application Security Specialist (CASS)

  • IACRB Certified Penetration Tester (CPT)

  • Certified SCADA Security Architect (CSSA)

  • Certified Information Systems Security Professional (CISSP)

  • Certified Hacking Forensic Investigator (CHFI)

  • Certified Ethical Hacker (CEH)

  • Certified Internet Web Professional (CIW)


Offensive Security Certified Professional (OSCP)

The world’s first completely hands-on offensive information security certification. The OSCP challenges students to demonstrate “understanding of the penetration testing process and life-cycle through an arduous twenty-four (24) hour certification exam.”

Offensive Security Wireless Professional (OSWP)

An OSWP certification proves an individual has the practical ability to perform 802.11 wireless audits using open source tools on several dedicated wireless networks with various configurations and vulnerabilities.

IACRB Certified Application Security Specialist (CASS)

This Information Assurance Certification Review Board certification indicates a knowledge of application security best practices and the ability to identify code vulnerabilities, security threats, and assessment/attack techniques.

IACRB Certified Penetration Tester (CPT)

This Information Assurance Certification Review Board certification addresses penetration testing methodologies, network reconnaissance and protocol attacks, vulnerability identification, Windows and Unix/Linux exploits, covert channels and rootkits, wireless security flaws, and web application vulnerabilities.

Certified SCADA Security Architect (CSSA)

This IACRB certification entails: SCADA security policy development, security standards and best practices, protocol security issues, access control, securing field communications, user authentication and authorization, detecting cyber attacks and vulnerability assessments.

Certified Information Systems Security Professional (CISSP)

The first information security credential to meet the strict conditions of ISO/IEC Standard 17024, the CISSP “focuses on the practical application of cybersecurity knowledge and tools.” Exploring “actual, on-the-job issues and risks,” this certification values a systematic approach to cybersecurity.

Certified Hacking Forensic Investigator (CHFI)

EC-Council’s CHFI certifies computer forensics and the ability to perform incident response and forensics, electronic evidence collections, and digital forensic acquisitions; work on technical examination, analysis and reporting of computer-based evidence; investigate events for evidence of insider threats or attacks, and more.

Certified Ethical Hacker (CEH)

The CEH certification from the EC-Council recognizes an understanding of how to identify weaknesses and vulnerabilities in target systems, and use the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner.

Certified Internet Web Professional (CIW)

 Focuses on the foundational standards related to Internet function including Web design, development, administration, networking, databases, and security.

Vertical Wave