Save up to 50% on your Hosted PBX! Call us at 706-410-2966!

About us

We believe that the Internet has become a crime scene. We were born from that belief and that the same knowledge and skills used by bad people to commit crimes should be used in defense of information, privacy, and security.


Every practice we have and everything we do is centered around security. If a technology doesn't meet our highest standards of protecting the Confidentiality, Integrity, and Availability of information systems, it won't be a part of our offerings to our customers. We are proactive in analyzing emerging threats and deploying defensive measures against them in our Managed Services. We apply these principles to any development and information security work we do as well.


Our team of highly experienced professionals have decades of real-world hands-on knowledge in these industries:


Food and Beverage

Education

Government

Manufacturing

Legal

Banking and Financial

Insurance & Risk


Whether you're a small or medium business, an enterprise, or a consumer, we can work with you to support and leverage technology to grow and protect your business or home in computer forensics to protection and prevention. 


We want to be your partner and not just the "IT people" that show up to do things!


Want to speak with us or learn more? E-mail or call us!


support@firestormcyber.com

+1 (706) 410-2966


Leadership Team

Ehsan Choudhury

After almost 3 decades of continuous experience in almost all aspects of technology and infrastructure for a variety of companies including major multi-unit restaurant chains, manufacturing, and government, Ehsan Choudhury founded Firestorm Cyber with a mission of protecting the confidentiality, the integrity, and the availability of business’ data. A known thought leader in the field, Ehsan’s hands on approach and passion for learning are not only the foundation of his company, but also make him a mentor to technology professionals.

A University of Georgia alumnus, Ehsan speaks four languages fluently and has traveled extensively throughout the United States, Europe, Asia, and Africa. As a Certified Chief Information Security Officer (CCISO), Certified Ethical Hacker (CEH) and a certified Computer Hacking Forensics Investigator (CHFI), Ehsan brings real-world experience and knowledge in the cybersecurity space from both sides of the firewall.

Kimberly Maddox

A service-driven IT professional, Kimberly Maddox has over 11 years in the field with extensive experience in infrastructure operations, unified communications, and technical troubleshooting.  During her career with major multi-unit restaurant chains, she has held positions from Helpdesk Analyst to IT Operations Manager, before joining Firestorm Cyber as VP of Operations.

While rising through the ranks, Kimberly has completed several successful projects to which she has gained a wide-range of technical knowledge in Microsoft Exchange, Office 365, Sophos Intercept X, VMware, and much more.  Don’t let the name-dropping fool you though, she can still get down and dirty taking hardware apart and fixing it too.

The decision to move to a cybersecurity company was an easy one Kimberly says.  “I’m glad to be a part of a team that is there for their customers first and foremost.  It’s unfortunate, but we are living in a time where it’s not if you get hit by cyber threats, but when.  We’re able to get ahead of those threats and be proactive.”

Kimberly is a University of Georgia graduate, and in her spare time she enjoys camping with her family. 

Reagan Thompson

As the Vice President of Risk Management, Reagan brings focused attention and expertise required to effectively mitigate organizational risks associated with matters that have potential to impair a company's integrity, reputation and financial viability. Reagan's primary focus is to protect and provide solutions for companies facing potential losses. Reagan graduated from the University of Georgia and has been practicing Risk Management for over 15 years. Reagan's experience in risk includes operational losses, cyber security, crisis management, disaster recovery and contracts.

On us and information security