Jon Meaney

Security Architect & Compliance Expert

About Jon

Jon is a Security Architect specializing in the analysis of complex, distributed systems and the exploit paths that emerge through interacting vulnerabilities. His experience spans the full technology stack—from embedded systems and network infrastructure to web applications and system administration—providing a rare end-to-end perspective on how design decisions influence exploitability. With expertise in Identity and Access Management (IAM) and distributed system security, he designs and evaluates authentication and authorization frameworks to ensure the consistent enforcement of security controls across diverse technology ecosystems.

His passion lies in cryptography, the mathematical foundation that enables secure communication and makes the modern internet useful. From encryption and hashing to key exchange algorithms, these cryptographic mechanisms form the foundation that enables the privacy principles of confidentiality, integrity, authenticity, and nonrepudiation, which are central to Identity and Access Management. Jon’s work as a security architect is a direct extension of this passion, applying the same principles that protect information in transit and at rest to the broader challenge of securing systems, users, and identities across interconnected environments.

This combination of technical depth and architectural perspective uniquely positions Jon to help organizations prepare for CMMC readiness. By understanding both the high-level interactions and low-level mechanics of vulnerabilities, he is enabled to translate the intent of Assessment Objectives into strategies that ensure OSCs produce adequate and sufficient evidence.

Posts by 

Jon Meaney

Browse all articles
No items found.