Skip to content

Jayson E Street Joins CovertSwarm

The man who accidentally robbed the wrong bank in Beirut is now part of the Swarm. Jayson E Street joins as Swarm Fellow to help us prove continuous offensive security is the only honest answer to how adversaries operate.

Jayson E Street joins CovertSwarm

We don’t do announcements for the sake of announcements. But this one matters.

Jayson E Street, DEF CON Global Ambassador,  the ethical hacker who walked into banks and government facilities on five continents without getting stopped, has joined CovertSwarm as Swarm Fellow.

Not as a figurehead. Not for a keynote cameo. As the person who’ll advise our ethical hacker teams on full-spectrum attack methodology, mentor on physical security and social engineering techniques, and help us prove to the industry that continuous offensive security isn’t a nice-to-have, it’s the only honest answer to how adversaries actually operate.

Why Jayson joined: the philosophy match

Here’s what Jayson said when we asked him why he made this move:

“For me, this isn’t just a new role – it’s a natural alignment of philosophy. A shared belief in curiosity, collaboration, and using real-world adversarial thinking to educate and empower people. Their approach of continuous offensive security reflects the reality of today’s threat landscape. It’s about challenging assumptions, uncovering blind spots, and helping organizations experience risk the way adversaries actually operate.”

That last sentence is the whole point.

Traditional red team engagements happen once a year, maybe twice. They tell you what was true six months ago, hand you a report, then leave. Meanwhile, adversaries are persistent, adaptive, and don’t wait for your next annual pen test to start probing again.

Jayson’s spent 20+ years proving that security testing should reflect real adversary behaviour, not the sanitized, scoped, point-in-time theatre most organizations settle for. When someone with his track record says our approach matches his philosophy, it’s not validation. It’s acceleration.

What Jayson brings: full-spectrum offensive expertise

Jayson’s background isn’t just digital. It’s everything.

Physical penetration testing across five continents. Banks, biochemical facilities, government buildings. 100% success rate. Not because he’s superhuman, but because human nature and organizational security assumptions are predictable if you know how to look.

Social engineering as a discipline, not a party trick. He’s autistic (something he discusses openly) and credits it with giving him an “outsider’s eye” for observing and exploiting human behaviour patterns most people take for granted. His work in this space is respected at the practitioner level, not just the conference circuit.

Security awareness engagements. One of the first offensive practitioners to pioneer red teaming explicitly for education, not exploitation. His philosophy: the red team exists to make the blue team better. Ours too.

DEF CON Groups Global Ambassador. This isn’t honorary. He’s the bridge between the central DEF CON organization and hundreds of local hacker chapters worldwide. Direct access to grassroots hacker communities globally. That network matters.

As Swarm Fellow, he’ll work with us to refine how we think about full-spectrum attacks (physical, digital, social), help prove the case for continuous offensive security in the US market, and push our methodology to stay ahead of where adversaries are actually going.

What this means for our mission

Our COO Luke Potter put it plainly:

“Jayson accelerates our mission to redefine what offensive security means. His practitioner credibility and ability to help organizations learn from real adversary behaviour gives us the voice we need to challenge legacy testing models. He strengthens everything we’re building.”

We’re not interested in incremental improvements to the status quo. We’re interested in replacing it.

Annual pen tests tell you what broke yesterday, not what’s breaking now. They test a frozen snapshot of your environment, not the living attack surface adversaries see. They give you compliance checkboxes and false confidence.

Constant Cyber Attack is the alternative: subscription-based, continuous red teaming that matches adversary persistence with defender resilience. Offensive security as a permanent feedback loop, not an annual audit.

Bringing in someone like Jayson isn’t a marketing move. It’s a statement of intent.

We’re building the offensive security model that should have existed all along. Now we’re doing it with one of the people who spent 20 years showing the industry why it’s needed.

Welcome to the Swarm, Jayson.