The team behind ThreatPulsar

Four people who spent years running SOC operations before deciding to build the tooling they needed.

Elena Vasquez

Elena Vasquez

CEO & Co-Founder

Former SOC lead at a Virginia-based financial services firm where she managed a team of 11 analysts and responded to a Cobalt Strike intrusion that directly motivated ThreatPulsar's creation. Six years of threat hunting experience across financial services and critical infrastructure environments. Holds CISSP and GCIA certifications.

Marcus Osei

Marcus Osei

CTO & Co-Founder

Built the original parallel enrichment prototype that became ThreatPulsar's core engine. Previously a detection engineering lead at a federal contractor, where he developed SIEM correlation rules covering 14 ATT&CK tactics for a DoD network environment. Contributes to the open-source Sigma rule repository.

Priya Menon

Priya Menon

Head of Threat Research

Leads the team responsible for ATT&CK technique mapping accuracy and threat feed quality scoring. Previously a senior threat intelligence analyst at a global MSSP covering APAC and North American client environments. Published research on DGA detection methodologies used to inform ThreatPulsar's C2 beaconing engine.

How we work

Security engineers first

Everyone on the team has worked in an operational security environment. Product decisions are grounded in what actually happens in a SOC during an active incident, not what looks good in a sales demo.

Small and intentional

Four people. Seed stage. We're not hiring for headcount — we're hiring for specific capabilities the platform needs. If we add a role, it's because we've identified a clear gap in what we can build without it.

Arlington, VA — on purpose

Located one mile from Rosslyn Metro. Proximity to the DC defense and intelligence community is a deliberate choice — our first customers and most of our product feedback come from that ecosystem.

Interested in joining the team?

We're a seed-stage company, which means equity is real and every role matters. If you've worked in detection engineering, threat intelligence, or SOC operations and want to build tooling instead of just using it — talk to us.

Get in Touch