Sevco Team

Founded by industry veterans from Carbon Black and Cylance. Joined by experienced leaders from Proofpoint, Sophos, and JASK. Backed by leading cybersecurity venture firms: SYN Ventures, 406 and Accomplice.

Leadership Team

Jeremiah Clark

Chief Architect

Jeremiah is the Chief Architect at Sevco Security. He brings more than two decades of security experience from the U.S. Navy, U.S. Government Agencies and Microsoft. Prior to Sevco, he was the Chief Architect at Carbon Black.

James Darby

Vice President of Customer Success

“Darb” is the Vice President of Customer Success, leading field engineering and customer success functions at Sevco Security. A 23-year veteran in the USAF IT organization, Darb joined the founding team at Carbon Black and built the IR and MSSP Partner Programs.

Greg Fitzgerald

Chief Experience Officer & Co-Founder

“Fitz” is the Chief Experience Officer and co-founder of Sevco Security. He is a veteran IT and Security executive with successful tours at TippingPoint, BMC Software, Fortinet and Sourcefire. Fitz was the founding CMO at Cylance and JASK.

Lori Fitzpatrick

Director of Finance

Lori leads the Finance and Accounting at Sevco Security. She is an experienced startup finance leader previously leading teams at Threat Stack, Industrial Defender and Thermo Fisher Scientific.

J. J. Guy

CEO & Co-Founder

J.J. is the CEO and co-founder of Sevco Security. After spending a decade as an intelligence officer, J.J. joined the founding team of Carbon Black, blazing the trail to create the EDR market. Most recently, J.J. was the Chief Operating Officer of JASK.

Ken Liao

Vice President of Marketing

Ken is the Vice President of Marketing at Sevco. He brings in over 13 years of information security experience. Ken spent nearly eight years leading product marketing efforts at Proofpoint, followed by executive roles at Malwarebytes, JASK and Abnormal Security.

Dean Mekkawy

Head of Product

Dean is the Head of Product at Sevco Security. An experienced cybersecurity product leader, he co-founded Spotflux, a security provider acquired by Invincea. He went on to build and lead product teams at Invincea and Sophos before joining Sevco.

Board of Directors and Advisors

Jay Leek

General Partner, SYN Ventures

Greg Dracon

General Partner, 406 Ventures

Mike Viscuso

Venture Partner, Accomplice

Bill Wood

Founder and General Partner, Bill Wood Ventures

Kevin Cunningham

Founder & President, Sailpoint

Bill Murphy

Former CTO, Blackstone

Bill Fallon

Former Navy Admiral, Commander, CENTCOM

Resources and

Latest News

Security 3 min read
A CMDB is a foundational tool for managing an enterprise’s IT operations environment. They enable powerful workflows for handling a variety of business processes, such as change management, incident management, and problem management. And because they provide visibility into the interdependencies between the organization’s people, processes, applications, and IT infrastructure, CMDBs are essential for making...
Security 3 min read
For most organizations, the onslaught of vulnerabilities can be overwhelming. Enterprises can go line by line through the CISA list and compare it against their inventory of known IT assets, and the likelihood is that there will still be opportunities for malicious actors to access their network.
Security 3 min read
For most organizations, the onslaught of vulnerabilities can be overwhelming. Enterprises can go line by line through the CISA list and compare it against their inventory of known IT assets, and the likelihood is that there will still be opportunities for malicious actors to access their network.
Security 3 min read
A CMDB is a foundational tool for managing an enterprise’s IT operations environment. They enable powerful workflows for handling a variety of business processes, such as change management, incident management, and problem management. And because they provide visibility into the interdependencies between the organization’s people, processes, applications, and IT infrastructure, CMDBs are essential for making...
Security 3 min read
For most organizations, the onslaught of vulnerabilities can be overwhelming. Enterprises can go line by line through the CISA list and compare it against their inventory of known IT assets, and the likelihood is that there will still be opportunities for malicious actors to access their network.
Security 3 min read
For most organizations, the onslaught of vulnerabilities can be overwhelming. Enterprises can go line by line through the CISA list and compare it against their inventory of known IT assets, and the likelihood is that there will still be opportunities for malicious actors to access their network.