
Our Red Team Experts

Amr Thabet and Grant Knoetze may lead Third Option’s Red Team, but it's the team behind them that truly makes Third Option. With Amr’s role in uncovering high-profile nation-state attacks like Stuxnet and Grant’s expertise in training US law enforcement agencies on advanced digital and network forensics, they set the standard.
Yet, it’s the combined expertise of their globally renowned team that delivers unmatched protection to governments and S&P500 corporations, defending against the most sophisticated cyber threats. Together, they offer cutting-edge solutions that make Third Option the top choice for organizations serious about cybersecurity.
​
Together, they offer cutting-edge solutions, backed by the watchful eye of the SOC, making Third Option the choice for organizations dedicated to their cybersecurity.

Amr Thabet
Amr Thabet is a cybersecurity powerhouse, with over a decade of experience in malware research and vulnerability analysis. He’s held key roles at top-tier companies like Symantec and Tenable, and authored Mastering Malware Analysis, a respected guide in the industry. Amr has been instrumental in uncovering major cyber threats, including the NSA-backed Stuxnet, which was used to sabotage Iran's nuclear program in 2010 and Regin, as well as North Korea’s Contopee.
As the founder of MalTrak, he’s driven to empower security professionals and regularly speaks at major events like DEFCON and Blackhat, shaping the future of cybersecurity.
​

Grant Knoetze
Grant Knoetze is a cybersecurity expert with a sharp focus on Digital Forensics and Incident Response (DFIR). He’s trained international cybersecurity professionals and U.S. law enforcement in digital forensics, and excels in IT programs like Python, PowerShell, and advanced system administration. Grant’s expertise extends to network forensics, and he’s contributed to platforms like IT Pro Today.
As a co-presenter at high-profile events like Hack in the Box, alongside Amr Thabet, Grant continues to shape the field with his deep knowledge and hands-on experience.
​

Lars Magnusson
Lars Magnusson brings over two decades of international expertise, with experience spanning the USA, England, France, Sweden and South Africa. Throughout his career, he has held roles at the New York Stock Exchange, contributed to smart city development initiatives, and provided strategic consulting and risk mitigation for various businesses across Africa.
​
Renowned for his vast network in Sub-Saharan Africa, Magnusson excels at bridging the gap between cybersecurity strategies and operational execution. His leadership ensures the seamless integration of digital security with physical and infrastructural safeguards, positioning him as a forward-thinking leader delivering comprehensive security solutions in an ever-evolving landscape.
Security Operations Center Operators
The SOC team at Third Option is a highly skilled and reliable group of cybersecurity professionals, specializing in threat detection, digital forensics, and incident response. With expertise in advanced IT systems like Python, PowerShell, and network forensics, we develop our own AI-powered algorithms to identify and evaluate cyber threat intelligence. Our hands-on experience extends to managing centralized networks and responding to complex malware attacks. We consistently provide dependable protection against the most sophisticated threats, delivering comprehensive reports to our clients. Every SOC engagement is tailored to meet the specific needs of each client, ensuring customized solutions for optimal security.

Cybersecurity in Real Life - Your Weakest Link is Your Staff, We will find that Individual, Our Operators will use:
-
Psycholinguistics: Decode hidden meanings and intentions through advanced language and psychological techniques.
-
Advanced Vetting: Conduct strategic risk vetting, continuous monitoring, and assessment of high-risk personnel.
-
Interrogation with Real-Life Exercises: Master advanced interrogation techniques with practical, high-pressure scenarios.
-
HUMINT & SIGINT: Acquire expertise in gathering and analyzing intelligence from human and electronic sources, crucial for security.
-
Counter-Surveillance Techniques: Detect and evade surveillance to safeguard sensitive information and personnel.