A cybersecurity incident doesn't pause while your team figures out what to do next. Every minute an attacker remains in your environment, they have more time to expand their foothold, exfiltrate data, or encrypt additional systems — and the business is losing money the entire time. But here's the critical nuance most organizations miss: the goal isn't to start recovering as fast as possible. It's to understand what you're dealing with and contain the incident first.
Corey Staas
As an Incident Response Engineer, Corey is the cyber-sleuth you want on your side when the digital dust settles after a cyber incident. With expertise in solving complex puzzles, he thrives in investigating security breaches, uncovering how attackers gained access, and identifying everything that follows. His IT journey spans from computer repair to systems administration to incident response, giving him a well-rounded toolkit of skill. He finds great satisfaction in helping clients navigate challenging situations and appreciates the impact he can make within ProCircular’s collaborative team environment.
In his time off, he spends time with his wife – watching movies, and engaging in his passion for sim-racing. Competing in races that can last up to 24 hours, he brings the same attention to detail and focus to his hobby as he does to his work in incident response. Corey values continuous learning, knowing that mastering new tools and techniques is key to staying ahead in the ever-evolving field of cybersecurity.
Proven Core Proficiencies
Investigating breaches to determine initial access and actions taken by malicious actors.
Conducting proactive threat hunting to identify IoCs detected via automated systems.
Developing signatures to improve detection capabilities.
GIAC Certified Forensic Analyst (GCFA)
ISC2 CISSP, SSCP
Security Blue Team BTL2, BTL1
CompTIA CySA+, Pentest+, Security+
Recent Posts
When Every Minute Counts: A Guide to Incident Recovery
Posted by
Corey Staas on Mar 12, 2026 7:45:00 AM
0 Comments Click here to read/write comments
Topics: Data Breach, Information Security, Incident Response, cybersecurity insurance, Cybersecurity Consulting
