Thomas Pieragastini

As senior technical lead at K2 Integrity/Leviathan Security Group, Thomas Pieragastini specializes in infrastructure security, operating system security and exploitation, and the testing of new or novel targets. He leads complex engagements focused on identifying and mitigating critical vulnerabilities across enterprise systems and cloud and AI infrastructure. Tom’s technical expertise spans operating system and domain […]

Phil Pena

Man smiling, wearing a checkered shirt

As a senior security consultant with K2 Integrity/Leviathan Security Group’s technical services team, Phil Pena brings extensive expertise in hardware security and reverse engineering. He leads a wide range of security engagements, including open‑ and closed‑source application penetration testing, hardware security auditing, code review, and security best‑practice training. At K2 Integrity/Leviathan Security Group, Phil leverages […]

Tom Overbey

Overbey, Tom 644 x 466

Tom Overbey is a senior security risk advisor and team lead for K2 Integrity/Leviathan Security Group. He works with clients to understand their security risk maturity and response agility, identify how to close their vulnerability gaps, and reduce their overall risk. Tom’s expertise has been developed around the strategy and deployment of tabletop exercises by […]

Juliette D. Moss

Juliette D. Moss is a senior member of K2 Integrity/Leviathan Security Group’s technical services team, where she specializes in complex application security penetration testing, secure code review, threat modeling, and attack surface analysis. She brings more than two decades of hands-on experience in system IT maintenance, programming, and virtual machine configuration, combining deep technical knowledge […]

Robee Krishan

Krishan Robee 644x466

Robee Krishan is a senior security risk advisor for K2 Integrity/Leviathan Security Group. With expertise in cybersecurity, privacy compliance, and risk management, Robee helps organizations safeguard their data and navigate complex security frameworks. She specializes in conducting risk assessments and developing policies and procedures, as well as guiding clients through standards such as ISO 27001, […]

Frank Heidt

Heidt Frank 644x466 2

A recognized expert in the fields of information assurance, network security, and systems penetration, Frank Heidt brings together security professionals with diverse backgrounds from premier consultancies, industries, and government agencies to design and deliver cybersecurity services and programs that impact the world’s most influential companies. Prior to forming K2 Integrity/Leviathan Security Group, Frank was a […]

Paul Griffith

Paul Griffith is a senior security consultant with K2 Integrity/Leviathan Security Group, where he provides expert guidance in security architecture; leads complex black-, grey-, and white-box application penetration tests; and supports comprehensive security auditing efforts. Before joining K2 Integrity/Leviathan Security Group, Paul served as an NSA-certified computer network operations (CNO) operator conducting Cyber Warfare Operations […]

Brandon Gnash

Brandon Gnash is a senior security consultant with expertise in offensive security, application security, and advanced vulnerability research. He has extensive experience identifying, analyzing, and exploiting complex security flaws across diverse technologies. Brian recently rejoined K2 Integrity/Leviathan Security Group after a few years in other roles outside the firm. Before returning to Leviathan, Brandon served […]

Brian Campbell

Brian Campbell leads technology strategy for K2 Integrity/Leviathan Group, overseeing the development and adoption of emerging technologies and driving technical excellence across service delivery. He also heads K2 Integrity/Leviathan Security Group’s Technical Services group, guiding its vision, operational performance, and continued growth. With more than 25 years in the technology industry—including over two decades in […]

Martin Bogomolni

Martin Bogomolni is a senior security consultant with more than two decades of experience in firmware engineering, embedded systems security, and low-level platform architecture. At K2 Integrity/Leviathan Security Group, he leads complex assessments of embedded platforms, focusing on firmware reverse engineering, secure bootloader analysis, hardware attack surface evaluation, and privilege‑mapped system design. His work helps […]