Jacob Swinsinski

Co-Founder

Tampa, Florida, United States4 yrs 8 mos experience
Most Likely To Switch

Key Highlights

  • Expert in vulnerability research and exploit development.
  • Founder of multiple cybersecurity ventures.
  • Awarded WWHF: Mile High 2026 Black Badge.
Stackforce AI infers this person is a Cybersecurity expert with a focus on offensive security and vulnerability research.

Contact

Skills

Core Skills

Exploit DevelopmentVulnerability ResearchPenetration TestingOffensive SecurityStart-up LeadershipEntrepreneurshipReverse EngineeringCybersecuritySecurity Solution Architect

Other Skills

Malware DevelopmentAndroid Security Researchbinary exploitationOSINTVulnerability AssessmentNetwork SecurityOpsecSystem hardeningStart-up Venturesandroid hackingFridaSSL/TLS AttacksADBHacking MethodologyNIST 800-171

About

Difficult problems keep me up at night. I’m a cyber security researcher and penetration tester and love tackling complex issues through the eyes of an attacker. By harnessing these skills for good, this allows humans to be able to utilize more secure technologies to further innovation. WWHF: Mile High 2026 Black Badge Winner Notes (GitBook): https://hacking.swizsecurity.com

Experience

4 yrs 8 mos
Total Experience
1 yr 2 mos
Average Tenure
2 yrs 7 mos
Current Experience

Ghost me

Founder

Mar 2025Present · 1 yr 2 mos · Tampa, Florida, United States · Remote

  • Founder of the digital footprint protection agency. We make it significantly harder for criminals to find your public information. Specifically tailored towards high-profile individuals such as professional/NIL athletes, executive-level employees, business owners, and "influencers".

Dark wolf

2 roles

Senior Security Researcher

Promoted

Jan 2025Present · 1 yr 4 mos · Greater Tampa Bay Area · Remote

  • Currently performing vulnerability research and exploit development for various software applications to support ongoing and future red team efforts within a multi-team collaborative environment.
  • More specifically, I am focusing heavily on Windows desktop software exploitation, reverse engineering, and developing post-exploitation capabilities for our red team and beyond!
Malware DevelopmentExploit developmentVulnerability ResearchReverse Engineering

Security Researcher

Oct 2023Jan 2025 · 1 yr 3 mos · Greater Tampa Bay Area · Remote

  • Work primarily consists of performing vulnerability research (VR) including binary exploitation and reverse engineering (mainly focusing on embedded devices). These efforts are for discovering zero day vulnerabilities and creating proof-of-concept (PoC) exploits for both hardware and software-based targets.
  • Previously focused on Android Security Research. Recently pivoted into software security assessments, RE/VR, and malware/exploit development.
Reverse EngineeringExploit developmentAndroid Security ResearchVulnerability ResearchMalware Developmentbinary exploitation+1

Soc llc

2 roles

Cyber Engineer II

Promoted

Dec 2022Oct 2023 · 10 mos · Melbourne, Florida, United States

  • Vulnerability Research & Development
  • Analyzing targets for vulnerabilities and creating proof-of-concept (PoC) exploits for both hardware and software-based targets
  • Man-in-The-Middle (MiTM), Android, & Hardware Attacks
  • CNO Tooling including Computer Network Attack (CNA) and Computer Network Exploitation (CNE)
Reverse EngineeringOPSECandroid hackingFridaSSL/TLS Attacksbinary exploitation+3

Cyber Engineer

Nov 2022Oct 2023 · 11 mos · Melbourne, Florida, United States

  • SOC (Special Operations Contractor)
  • Vulnerability Research & Development
  • https://www.soc-usa.com/security-solutions/cyber

Swiz security

Founder and Penetration Tester

Sep 2022Present · 3 yrs 8 mos · United States · Remote

  • Cyber Security Contractor, focusing primarily on delivering adversarial emulation to clients. Currently utilizing my offensive focused cyber security skill set as an independent freelancer in an ongoing effort to secure networks in a multitude of different environments and states. The work is all free-lanced based and reliant on my free time/weekends.
  • I'm most comfortable with conducting vulnerability and attack surface assessments through network-based penetration testing, wireless-based penetration testing, OSINT, and web application testing.
  • Conducting privacy and digital footprint assessments to ensure customer/client success within the digital and physical world has a higher success rate.
OSINTVulnerability AssessmentPenetration TestingNetwork SecurityOpsecSystem hardening+1

Safehouse 1337

Founder

Jun 2022Present · 3 yrs 11 mos · Greater Tampa Bay Area · Hybrid

  • Cyber Security Club based in the Tampa/St. Pete area. This organization serves as a place for college students, entrepreneurs, young/seasoned security professionals to spark inspiration, motivation, and to share thoughts on current events between one another!
  • Join the official Safehouse 1337 Discord server here: https://discord.gg/DpPY8NnAJm
Start-up LeadershipStart-up VenturesEntrepreneurship

Northrop grumman

Associate Cyber Systems Engineer

May 2022Nov 2022 · 6 mos · Melbourne, Florida, United States

  • Cyber Security Aeronautics Systems
NIST 800-171NIST 800-53Security Solution ArchitectHardeningNetworkingSELinux+3

Ome-resa (ohio mid-eastern regional education service agency)

Information Security Specialist

Sep 2021May 2022 · 8 mos · Steubenville, Ohio, United States

  • Responsibilities include total involvement with ensuring OME-RESA has a strong security posture to maintain healthy relationships with districts. I work next to the Chief Security Officer (CSO) daily to assess security recommendations and strategies. Other roles include red teaming aspects of locating and mitigating network vulnerabilities most notably CVE-2021-44228 (Log4j/Log4Shell) and LLMNR/NBT-NS poisoning that would lead to Pass-The-Hash (PTH) attacks. Utilized security researcher, John Hammond's Log4Shell vulnerability tester to ensure that input fields are not vulnerable within web applications found on school websites.
NIST 800-53Security Solution ArchitectTenable NessusPatching and RemediationCybersecurityBlue Team+2

Education

Pittsburgh Technical College

Bachelor of Science - BS — Information Technology/Cyber Security/Network Administration

Jul 2018Apr 2021

Steubenville High School

High School Diploma

Aug 2014May 2018

Stackforce found 100+ more professionals with Exploit Development & Vulnerability Research

Explore similar profiles based on matching skills and experience