Ryan Speers

Computer Security Researcher with a focus on embedded hardware, networks, and RF mediums. Experience in vulnerability analysis on software and hardware systems. Experienced startup founder and leader with demonstrated experience in complex delivery, specialized team growth, and business development.

My professional background is in applied cyber security across a broad range of missions and environments, primarily in research & development but also with significant experience in operations.



Security Research
  • Reverse engineering
  • Vulnerability research
  • Hardware penetration testing
  • Network traffic analysis
  • Radio frequency exploitation, including IEEE 802.15.4/ZigBee
Leadership and Business Development
  • Executive leadership and growth of a small startup from founding to exit
  • Proposed, won, and delivered innovative projects in both commercial and government markets
  • Trusted advisor to various C-suite decision makers on product security
Secure Systems Architecture
  • Applied cryptography
  • Systems engineering and architecture
Software Development
  • Able to balance quick-prototypes with production engineering needs
  • Wide variety of languages including Python, C, C++, C#, Assembly, etc.
  • Leverages DevOps/DevSecOps tooling and build pipelines to create effective development pipelines
  • Kernel development and low-level Win32 experience

Api-Mote (IEEE 802.15.4/ZigBee Radio Interface)

2012 release of the ApiMote rev1 hardware.

Read more..

GoodFET Development on Tmote Sky/TelosB (CC2420 Radio)

Initial work to add CC2420 chipset to GoodFET.

Read more..

Scapy Support for USB Protocol on Facedancer Boards, MAX2420, etc.

Scapy support for USB descriptors/endpoints, compatible with Facedancer/GoodFET usage.

Read more..


A collection of selected public articles, presentations, and talks.

You can also find more posts on my company’s website at https://riverloopsecurity.com/blog/.

Paper - USENIX WOOT '11: Packets-in-Packets

Raw frame injection into 802.15.4 from control of only upper-layer protocols.

June 2011

Paper - Attacks on the Dartmouth College Network

An early undergraduate paper based on reviewing network intrustion data from the college's computing services.

December 2009



Two Six Technologies

Joined when Two Six acquired my company River Loop Security. Key leader of growth in Electronic Systems, including elevation to dedicated business unit.

  • Customer operational capabilties
  • Strategy
  • Business development
  • Technical leadership

2022 - 2023

Co-Founder & Security Researcher

River Loop Security LLC

Provide deep technical experience to assess customer devices, applications, and infrastructure. Write detailed vulnerability reports and help customers understand the risks and potential mitigations. Collaborate with development teams on mitigations.

Our team regularly speaks at leading industry conferences and publishes academic journal and conference papers. We develop and maintain several leading open-source security assessment tools.

2012 - 2022

Chief Architect for Strategic Integrations & Research

Ionic Security Inc.

Designed technical integrations with the 3 leading US SaaS/IaaS providers, among other projects.

2016 - 2018

Director of Applied Research

Ionic Security Inc.

Founded their Applied Research team, which was primarily focused on low level systems security & cryptographic math.

2014 - 2016

Security Researcher & Developer

Contact me for my full resume.

2010 - 2014



Electrical Engineering

Dartmouth College

Computer Science

focus in security research, High Honors