Founder and CEO Founder and CEO KTLYST Labs Full-timeKTLYST Labs Full-time Oct 2025 - Present 4 mosOct 2025 to Present 4 mos Remote RemoteRemote Remote KTLYST is the missing translation layer between threat intelligence and detection engineering
Founder and CEO Founder and CEO KTLYST Labs Full-timeKTLYST Labs Full-time Oct 2025 - Present 4 mosOct 2025 to Present 4 mos Remote RemoteRemote Remote KTLYST is the missing translation layer between threat intelligence and detection engineering. Security teams generate high-quality intelligence every day incident reports, audit findings, analyst notes, but most of it never becomes detection. Translation is manual, slow, and siloed. Attackers iterate in hours; detection engineering still takes days. We built a deterministic compiler that converts unstructured security narratives into review-ready behavioral detection candidates in under 10 minutes. No hallucinations. Full provenance. Human approval before anything ships. Unlike tools focused on atomic indicators, KTLYST targets attacker behavior-forcing adversaries to change how they operate, not just what IPs they use. Built by a team with 30+ years combined experience building and operating threat intel and detection systems at Google, Meta, LinkedIn, McAfee, and HP.
Founder and CEO Founder and CEO KTLYST Labs Full-timeKTLYST Labs Full-time Oct 2025 - Present 4 mosOct 2025 to Present 4 mos Remote RemoteRemote Remote KTLYST is the missing translation layer between threat intelligence and detection engineering
Founder and CEO Founder and CEO KTLYST Labs Full-timeKTLYST Labs Full-time Oct 2025 - Present 4 mosOct 2025 to Present 4 mos Remote RemoteRemote Remote KTLYST is the missing translation layer between threat intelligence and detection engineering. Security teams generate high-quality intelligence every day incident reports, audit findings, analyst notes, but most of it never becomes detection. Translation is manual, slow, and siloed. Attackers iterate in hours; detection engineering still takes days. We built a deterministic compiler that converts unstructured security narratives into review-ready behavioral detection candidates in under 10 minutes. No hallucinations. Full provenance. Human approval before anything ships. Unlike tools focused on atomic indicators, KTLYST targets attacker behavior-forcing adversaries to change how they operate, not just what IPs they use. Built by a team with 30+ years combined experience building and operating threat intel and detection systems at Google, Meta, LinkedIn, McAfee, and HP.