Scott Hanson
Scott Hanson

Scott Hanson

Associate Managing Director & Head of Global Security Operations

Scott Hanson is an associate managing director and Head of Global Security Operations in the Cyber Risk practice, based in Secaucus.

Scott leverages more than a decade of experience in enterprise information technology, with significant expertise in endpoint detection and response (EDR), security incident and event management (SIEM) and related technologies. His primary focus at Kroll is helping clients enhance or restore network security through continuous threat detection, incident response and “triage” forensics.

Prior to joining Kroll, Scott  served as an information systems analyst at ExxonMobil Global Services Company.  In that role, he was responsible for incident investigation and security engineering. Throughout his career, Scott has participated in hundreds of incident response investigations, has implemented and managed countless enterprise technology solutions and has managed information security teams around the world.

Scott received a master’s degree in information systems management and a B.S. in information systems from Brigham Young University. He also holds numerous certifications, designating him as a GIAC Network Forensic Analyst (GNFA), GIAC Certified Forensic Analyst (GCFA), GIAC Certified Incident Handler (GCIH), Certified Information Systems Security Professional (CISSP), Certified Systems Auditor (CISA) and PCI Qualified Security Assessor (QSA).

Hanson /en/our-team/scott-hanson /-/media/kroll/images/headshots/directors/scott-hanson.jpg people {E39587AD-8F0B-4FE2-865F-969BC5501096}{E538E14D-C192-4A8E-8861-504D0EEBF99A}{3A077BFC-C74A-40AF-A14C-13BCF6E3873E}{058CEC4B-AB74-4982-A8CC-B399FCB93BB2}{44969BA1-47AB-4BE6-BC0C-6EE0232385DF}{71603619-7D47-436B-ADCC-11F2BCA48C19}{9FDFA7B9-8B48-461E-BAD8-1CF29A23573C}{7A48DD95-1A63-4784-842F-A2BE81EAFE13}{ECF5884A-6673-4CA5-B3B4-165229F1A36A}{0D8F5BE3-DF68-470D-ADFF-536F0505BF20} {2DEEE4D2-8278-4C50-B3FF-1563BB257804}

Stay Ahead with Kroll

Cyber Risk

Incident response, digital forensics, breach notification, managed detection services, penetration testing, cyber assessments and advisory.


Proactively monitor, detect and respond to threats virtually anywhere – on endpoints and throughout the surface, deep and dark web.

24x7 Incident Response

Enlist experienced responders to handle the entire security incident lifecycle.

Virtual CISO (vCISO) Advisory Services

Kroll’s Virtual CISO (vCISO) services help executives, security and technology teams safeguard information assets while supporting business operations with augmented cyber expertise to reduce business risk, signal commitment to data security and enhance overall security posture.

Incident Response and Litigation Support

Kroll’s elite security leaders deliver rapid responses for over 3,200 incidents per year and have the resources and expertise to support the entire incident lifecycle.

Incident Remediation and Recovery Services

Cyber incident remediation and recovery services are part of Kroll’s Complete Response capabilities, expediting system recovery and minimizing business disruption.

Malware and Advanced Persistent Threat Detection

Our expertise allows us to identify and analyze the scope and intent of advanced persistent threats to launch a targeted and effective response.

Computer Forensics

Kroll's computer forensics experts ensure that no digital evidence is overlooked and assist at any stage of an investigation or litigation, regardless of the number or location of data sources.

Malware Analysis and Reverse Engineering

Kroll’s Malware Analysis and Reverse Engineering team draws from decades of private and public-sector experience, across all industries, to deliver actionable findings through in-depth technical analysis of benign and malicious code.

System Assessments and Testing

Kroll’s field-proven cyber security assessment and testing solutions help identify, evaluate and prioritize risks to people, data, operations and technologies worldwide.


What is Cyber Threat Hunting? Approaches, Tools and Intel Explained

Sep 28, 2022

by Scott Hanson George Glass