// ABOUT_US.TXT — CLEARANCE: PUBLIC
OUR ORIGIN STORY
"Every great thing started in a room someone called too small. Ours was a literal server closet in Newark." — Elliot Alderson, Founder
Built In A Closet.
Protecting The World.
Paradox Systems was founded in 2018 by two people who were tired of watching corporations lie to their customers about data breaches. Elliot Alderson and Maya Okonkwo met at a DEFCON session titled "How We Hacked A Fortune 500 In 45 Minutes." They were the presenters.
They built Paradox in a server closet in Newark with $12,000 in savings, four workstations, and an unhealthy amount of coffee. Their first client was a mid-size bank that had been breached three times in two years and did not know it.
"We don't hack for fame. We don't do it for money. We do it because the alternative — a world where the most powerful people can do whatever they want with zero accountability — is unacceptable." — Maya Okonkwo, COO
Today, Paradox employs 180 of the sharpest security engineers on the planet and protects infrastructure serving over 400 million people worldwide. The server closet is still there. We use it for meetings when we want to remember where we came from.
OPEN CHANNELFOUNDED IN A SERVER CLOSET
$12K savings. Two founders. Zero clients. Infinite conviction. The loop begins.
FIRST ENTERPRISE CLIENT
Discovered a 14-month undetected breach at a regional bank. Cleaned it in 72 hours. They told everyone.
AI DIVISION LAUNCHED
Built ORACLE — our neural threat-detection model. It spotted patterns humans couldn't.
QUANTUM RESEARCH BEGINS
Three post-quantum cryptography researchers join. Most called it early. We called it late.
GLOBAL EXPANSION
Opened London, Singapore, and Sao Paulo. Threat actors don't respect time zones. Neither do we.
180 ENGINEERS. ZERO BREACHES ON OUR WATCH.
The loop continues. We protect. They attack. We adapt. The beginning is the end.
The Paradox Principles
Not corporate values from a template. Operational axioms written by the people who actually do the work.
Not "if" — "when." We design every defense assuming the attacker is already inside. Paranoia is not a disorder here. It is a methodology.
We tell you exactly what we found, what it means, and what to do. In plain language. Even the ugly parts. Especially the ugly parts.
We prove it works or we do not ship it. Dr. Kozlov once said: "I have broken this 100 times." We call that the minimum bar.
We will never work for authoritarian governments, surveillance states, or anyone who wants to weaponize our tools against civilians. Full stop.
Security is a cycle. Attack. Defend. Learn. Adapt. Any company that treats it as a one-time project is living in a fantasy.
Every tool we sell, we use internally first. We are both lab and subject. That is how you earn trust.
The Wolves
We hire people dangerous enough to understand the threats and principled enough not to become them.
Former NSA contractor. Speaks to his rubber duck before every major architecture decision. The duck has never been wrong. HR has stopped asking about it.
// ALIAS: MR_ROBOTPhD from MIT. Has memorized the OSI model and will recite it at you if your solution violates Layer 4. Frequently. Loudly. Without apology.
// ALIAS: THE_QUEEN34 published papers. Once spent 45 minutes explaining to the board why their password policy was "statistically equivalent to a screen door." They gave him a raise.
// ALIAS: SCHRODINGERBuilt ORACLE in a 96-hour session fueled by ramen and spite. The model now monitors 2.4M threat vectors simultaneously. She is unreasonably proud of this. Correctly so.
// ALIAS: ORACLE_PRIMEMakes sure none of our 180 engineers accidentally commit a felony. Has a mug that says "I Void Warranties." Raised 7 compliance concerns at the last all-hands. Six were valid.
// ALIAS: THE_COMPLIANCE_UNITSuccessfully breached 100% of client systems in pen tests. Calls this a normal Tuesday. Keeps a scoreboard. The scoreboard has never lost. Clients are terrified of her. Correct response.
// ALIAS: GHOST_PROTOCOLSAY OUR NAME.
YOU KNOW WHO WE ARE.
You don't end up on this page by accident. Let's talk about what we can do before someone else does it to you.