Greyline General
A security and infrastructure practice supporting modern environments across cloud, identity, endpoint, and network operations. Work is delivered with clear controls, reliable documentation, and production-grade standards.
Team Directory
Roles listed below reflect operational coverage. Team composition may vary by engagement and workstream requirements.
Xizhe Zhang
Founder | Head of U.S. & Greater China Operations
R.zhang@greylinegeneral.com
Oversees business operations and cross-border coordination. Focuses on engagement structure, delivery alignment, and operational handoffs across security and infrastructure work.
Lukas Reinhardt
Principal | Head of Europe Operations
L.Reinhardt@greylinegeneral.com
Leads European operations and supports regional delivery coordination across security and infrastructure workstreams.
Ethan Parker
Senior Security Engineer (U.S.)
Focuses on network security architecture and incident response for U.S. engagements.
Anders Lindholm
Network & Infrastructure Engineer (Global)
Designs and supports global network and cloud infrastructure.
Kwame Mensah
Systems & Endpoint Security Engineer
Specializes in systems hardening and endpoint security operations.
Daniel Mercer
Industry Advisor – Law Enforcement & Defense-Adjacent Systems
Advises on operational context, regulatory considerations, and system requirements across law enforcement and defense-adjacent environments.
Connor Sullivan
Client Support & Operations Coordinator
Manages client communication, support workflows, and operational follow-ups.
Daniel Moreno Chen
Technical Consultant | Security & Infrastructure
Provides technical assessments and advisory support across security and infrastructure.
Omar Haddad
Partnerships & Regional Coordination
Supports cross-border coordination and external partnerships.
Note: This directory is not an exhaustive list of every contributor. Additional specialists may support specific workstreams as needed.
Engagement Approach
Engagements are structured to support production environments with practical outcomes, clear documentation, and maintainable controls.
- Assessment: current-state review, risk prioritization, and recommended plan of action.
- Implementation: hardening, access controls, visibility, and operational improvements.
- Advisory: architecture review, decision support, and targeted technical guidance.
- Handoff: runbooks, diagrams, and documentation suitable for operational ownership.