Security engineering for mission and regulated environments

CYBER + PRIVACY + AI = TRUSTED DELIVERY

Chameleon Technologies is an owner-operated cybersecurity, privacy engineering, and AI assurance firm led by Yarick Tsagoyko with senior engineers Alexander George and Daniel Mirsky. We help federal and regulated organizations design, automate, and operate secure cloud, SOC, CDM, compliance, and AI environments.

Core capabilities

Secure modernization, privacy, and AI readiness in one delivery team.

Chameleon Technologies is an owner-operated cybersecurity, privacy, and AI assurance firm led by Yarick Tsagoyko with senior engineers Alex George and Dan Mirsky. We help federal and regulated organizations design, automate, and operate secure cloud, SOC, CDM, compliance, and AI environments. Core services include Splunk, ArcSight, and Elastic Stack security analytics; CDM data pipelines; RMF/ATO evidence automation; MITRE SAF-based security assessment automation; FedRAMP/NIST/HIPAA control mapping; vulnerability and compliance engineering; AWS/Azure/GCP security architecture; privacy engineering; incident response; threat detection; and secure DevSecOps. We also support responsible AI adoption, including AI governance, model and data privacy reviews, LLM and agent guardrails, secure RAG patterns, AI integration, and risk controls for small and large models, plus post-quantum analysis proposed as a CDM Phase 3 concept to CISA, delivering strategy, engineering, and operations at mission scale.

AI Security & Responsible Adoption

Governance, model and data privacy reviews, secure RAG patterns, agent guardrails, small and large model adoption strategy, LLM risk analysis, and secure AI integration into business workflows.

  • AI governance and compliance
  • AI security and data privacy
  • Secure RAG and agent guardrails
  • Prompt injection and data leakage controls

Security Operations & Detection Engineering

SOC modernization, SIEM and log-platform engineering, telemetry onboarding, incident workflows, detection content, threat hunting support, and executive reporting across regulated environments.

  • Splunk, ArcSight, Elastic Stack
  • Detection engineering
  • Incident response workflows
  • Threat intelligence enrichment

Cloud Security & Zero Trust Engineering

AWS, Azure, and GCP architecture, IAM and secrets patterns, encryption, network segmentation, telemetry pipelines, secure CI/CD, IaC, and zero-trust-aligned platform design.

  • AWS, Azure, GCP
  • IaC and CI/CD automation
  • Identity, network, and data controls
  • Kubernetes and container security patterns

Compliance Automation, Privacy & RMF

RMF/ATO, FedRAMP, NIST, HIPAA, privacy engineering, continuous monitoring, MITRE SAF-driven assessment automation, control evidence pipelines, and audit response support.

  • RMF / ATO / POA&M
  • FedRAMP, HIPAA, NIST
  • MITRE SAF automation
  • Evidence generation and validation
Selected team experience

Focused outcomes across continuous monitoring, SOC operations, cloud security, and automation.

We present these as team experience highlights to show the types of environments and outcomes our personnel have supported.

Federal CDM automation at scale

Centers for Medicare & Medicaid Services

Built evidence and security-data pipelines for 100+ FISMA systems using AWS, Splunk, Python, Ruby, and repeatable IaC patterns. Expanded the workstream with Elastic Stack alignment, MITRE SAF-based assessment automation, and audit-ready POA&M reporting.

Focus areas: CDM, RMF/ATO, Splunk, Elastic, AWS, control validation

SOC modernization and digital forensics

Administrative Office of the U.S. Courts

Led SIEM deployment and migration work for the Security Operations Center, redesigned log collection to achieve full capture, and built C# forensic collection utilities to improve enterprise investigative response.

Focus areas: SOC engineering, incident response, C#, threat intelligence

Enterprise SIEM architecture and analytics

Microsoft / World Bank Group / federal programs

Architected large-scale ArcSight deployments, including a 200k+ EPS environment, and helped teams synchronize content, scale global telemetry, and modernize monitoring workflows across distributed environments.

Focus areas: ArcSight, analytics pipelines, global monitoring, content engineering

Emerging security concepts for next-phase monitoring

CMS / MITRE collaboration

Prepared proofs of concept and white papers for later CDM phases, including a custom SAF automation framework and post-quantum analysis proposed to CISA as a Phase 3 concept.

Focus areas: MITRE SAF, post-quantum analysis, control automation
Markets served

Designed for federal and regulated delivery.

Our team experience spans civilian agencies, healthcare, financial services, investigations, and enterprise modernization programs.

Federal CivilianHealthcareFinancial ServicesJudicial & InvestigationsMission PlatformsEnterprise SaaS
Team

Senior operators who can architect, automate, and deliver.

Chameleon Technologies is built around a compact, senior-only team that combines cybersecurity architecture, SIEM and analytics, cloud engineering, privacy, compliance automation, and AI assurance.

Yarick Tsagoyko
Owner & Principal Security Architect

Senior cybersecurity architect with experience spanning CMS, the Administrative Office of the U.S. Courts, Microsoft, the World Bank Group, and Tenable. Built CDM evidence pipelines for 100+ FISMA systems, led SOC/SIEM modernization, and delivered cloud security, compliance automation, privacy engineering, and AI assurance services.

  • CMS CDM automation, RMF/ATO evidence pipelines, Splunk, AWS CDK, CloudFormation, POA&M reporting
  • U.S. Patent #11,176,625 inventor and OASIS OHDF working-group contributor
  • CISSP, AWS Solutions Architect Associate, AWS Cloud Practitioner, Azure AI-900
Alexander George
Senior Security Architect & SIEM / Analytics Lead

Security architect and operations leader with deep experience across ArcSight, Splunk, Elastic/ELK, Hadoop, AWS, and enterprise security modernization. Team experience spans OPM, IRS, ATF, TSA, Senate, Fannie Mae, and other federal and financial environments.

  • Designed multi-tenant and active/active SIEM platforms in AWS and multiple geographies
  • Led SIEM expansion, migration, integration, content engineering, and continuous monitoring frameworks
  • Credentials include CISSP, ISSAP, ISSMP, CISM, GCIH-Gold, ArcSight certifications
Daniel (Dan) Mirsky
Senior Cloud Security & Automation Engineer

Cloud security and automation engineer with CMS experience building AWS-based CDM collection architectures, custom Splunk apps, CI/CD and compliance automation, plus research in malware analysis and machine learning at the University of Maryland.

  • Architected AWS collection and Splunk integrations for 100+ accounts and updated apps for Splunk CIM
  • Built Ansible, Jenkins, and SonarQube-driven automation to support secure delivery
  • AWS Solutions Architect Associate and Splunk Certified Architect

Need a richer team page? View detailed bios and credentials.

Frameworks & approach

Built around current cybersecurity and AI risk models.

Our AI/security language and service design align with current governance and secure-adoption patterns, while remaining practical for engineering teams and regulated programs.

NIST AI RMF / GenAI Profile

Use risk-based AI governance patterns for secure and responsible adoption, including controls around prompt injection, data exposure, and downstream harm.

Reference source

OWASP LLM Top 10

Map AI controls to current GenAI application risks such as prompt injection, sensitive information disclosure, supply-chain risk, and insecure agent behavior.

Reference source

Georgetown AI Management

Apply current graduate work in AI Governance & Compliance, AI Security & Data Privacy, AI Applications Integration, Data Engineering for AI, Developing AI Solutions, and AI System Design & Architecture.

Reference source

Ready for a simple upload.

This static site package includes an HTML/CSS/JS website with downloadable SBA capability documents, no build step, and no third-party dependencies.