Joe Black
CEO/Founder/RedTeam Lead

About Joe

Joe has 14 years of in-depth experience and knowledge in the field of information security including but not limited to networking penetration from basic exploitation to full network compromise, application testing, wireless network cracking, physical location penetration, human hacking, etc.
Joe has demonstrated leadership qualities, with the ability to lead and motivate a diverse team of professionals in a fast-paced multi-cultural environment, utilizing their strengths and weakness to see them to their full potential as well as providing guidance to his colleagues and continuing to grow with every project. His primary focus is in network infiltration, post-exploitation, and social engineering/human hacking.


Before founding JBS, he previously worked at Cisco Israel and Cisco Korea as a Information Security Engineer in the Cisco Center of Excellence RedTeam. Prior to that, he has held positions with the South Korean Government as a security consultant, RedTeam lead with boutique security firms, and assistant director of MIS in a Las Vegas Casino.

Nathan Yim
Business Planner / Social Engineering Lead

About Nathan

Nathan has been working in the cyber security field for 11 years. His main focus is in Cyber Security Consulting, with an expertise in Social Engineering and Cyber Security Education. Through many years of security consulting, his perspective of cyber security has been focused on social engineering more and more.
He likes Christopher Hadnagy and never hesitate to recommend his teaching for anyone who wants to study social engineering. As a business director in Joe Black security company(especially in Korea), he is making efforts to introduce people to what real cyber security consulting is. Different from other security consulting companies, JBS approaches security consulting from a new and creative angle.


Before security consulting, Nathan has worked in the network system field for 10 years as a business director. He has good relationships with overseas WhiteHat Hackers as well as Korean WhiteHats.