Our Team
CyberSentry Solutions is built on a partnership that merges high-level vulnerability research with strategic business management. We do not sell security theater; we provide the technical reality of how your organization is viewed by an attacker.
Carleena Willis | Business Manager & Security Liaison
Carleena Willis is the operational lead and primary point of contact for CyberSentry Solutions. She manages the firm’s client relations, project logistics, and merchant operations. Her focus is on bridging the gap between raw technical analysis and the business-critical requirements of our clients.
Dedicated to the resilience of independent and minority-owned businesses in Central Georgia, Carleena ensures that our clients receive clear, actionable data. She translates complex exploitation research into professional strategies that protect assets and reputations without the unnecessary jargon often used to inflate service costs.
Senior Research Lead | Vulnerability Researcher
Our technical operations are directed by an elite researcher specializing in software architecture and manual exploitation. While standard IT firms rely on automated scanners, our lead researcher operates at the system level, identifying vulnerabilities in kernel memory and application logic before they are widely publicized in the mainstream market.
The technical authority of our firm is backed by a public repository of research and tool development, with a specific focus on:
- Windows Kernel memory safety and exploit analysis.
- Proprietary infrastructure development for secure license management.
- Manual assessment of web application logic and high-value payment portals.
Our Mission
The majority of security firms target large corporations with massive budgets, leaving small-to-mid-sized professional firms vulnerable. We have intentionally positioned CyberSentry Solutions to serve the businesses that form the economic backbone of our community.
We are a Black female-owned enterprise that prioritizes technical superiority over marketing fluff. We do not hide behind vague terminology. We identify the threat, prove the vulnerability, and deliver the remediation. Our goal is to ensure that the wealth and data within our community remain secure from external exploitation.