Jeff Birnbach is the Managing Director and a Partner in the Sylint Group. His background includes over 30 years in senior leadership roles in software and emerging technologies. Jeff has extensive experience in information security, incident response, analytics, and investigations. In his current role, he oversees cyber security and digital data forensics teams focused on intrusion detection, incident response, cyber breach investigation, security assessment, malware identification and remediation. Recent investigations include cyber extortion, ransomware, nation-state attacks, Medicare fraud, credential trafficking, celebrity stalking and child exploitation.
Jeff is a licensed Private Investigator (FL), and is a frequent speaker on cyber security, incident response and investigations to diverse audiences. Jeff has conducted presentations and briefings to a wide range of groups including U.S. Special Operations Command (SOCOM), U.S. Secret Service – Electronic Crimes Task Force, FBI Infragard, and the American Bar Association, as well as conducted training seminars on cyber-crime investigations for law enforcement officers. He has been repeatedly interviewed to provide context and on-air commentary to emerging news stories related to cyber security incidents. A patented inventor of micro-accelerometry based locating and tracking technologies, Jeff has also served as a cyber security expert in state and federal court cases.
Sylint (pronounced sīlənt) is a nationally recognized cyber security and digital data forensics firm, with a penchant for discretely addressing some of today’s biggest headline-grabbing data breaches, cyber incidents, and precedent-setting court cases. The firm’s clients include Fortune 500 companies, AmLaw 100 firms, NGO’s, celebrities, non-profits and government entities. Sylint’s leadership has extensive experience gained at the NSA, DoD/Air Force, commercial entities and law enforcement. Founded in 1999, Sylint is an agile team, expert in advanced technologies, techniques and proven investigative protocols to uncover fraud, malicious conduct, sabotage and other nefarious activities.