Skip to main content
GEMEnterprise
Company Overview

Built on Trust. Driven by Intelligence.

GEM Enterprise exists to close the gap between enterprise ambition and operational security reality. We deliver intelligence-grade protection for organizations that cannot afford to be wrong.

Leadership & Vision

Mission, vision, and the values that define how we operate

Our Mission

To provide institutional-grade cybersecurity, financial security, and operational protection to qualified enterprises and accredited clients — enabling them to operate with confidence in an environment of persistent and evolving threats. We exist to be the security partner that organizations depend on when the stakes are highest.

Our Vision

A world where qualified organizations have access to the same caliber of security intelligence and operational expertise historically reserved for national governments and the largest global institutions — delivered with transparency, accountability, and precision. We are building toward a future where enterprise security excellence is not a privilege of scale.

Company Values

Integrity

Every recommendation we make and every engagement we undertake is governed by an unwavering commitment to honesty. We will never recommend a course of action that conflicts with our clients' best interests or that compromises our independence.

Intelligence

We operate from evidence, not assumption. Our analysts, advisors, and engineers are trained to think adversarially — anticipating threats before they materialize and grounding every decision in rigorous, current analysis of the threat landscape.

Independence

GEM Enterprise is not a reseller or affiliate of any technology vendor. Our assessments and recommendations are entirely free from commercial incentives. What we advise is what we genuinely believe is correct for your organization.

Accountability

We stand behind every assessment, recommendation, and action. Our engagement structures include defined SLAs, formal deliverables, and named advisors — because accountability is not optional when organizations depend on us to be right.

Executive Board

The leadership team guiding GEM Enterprise

AM

Alexander Mercer

Chief Executive Officer

A veteran of enterprise risk and institutional finance with over two decades navigating global markets, regulatory environments, and high-stakes security operations. Mercer founded GEM Enterprise with a mandate to deliver intelligence-grade security at institutional scale, drawing on prior leadership roles at a major sovereign wealth fund and a Big Four advisory practice.

SO

Dr. Samira Okonkwo

Chief Security Officer

Former lead of a national-level cyber threat intelligence unit with deep expertise in advanced persistent threats, critical infrastructure protection, and zero-trust architecture. Dr. Okonkwo holds a doctorate in information systems security and has testified before regulatory bodies on enterprise cybersecurity standards.

MT

Marcus Thornton

Chief Financial Officer

A seasoned financial executive with institutional investment banking, fund administration, and multi-jurisdictional regulatory compliance experience spanning over 18 years. Thornton leads GEM's financial operations and oversees client asset protection frameworks with prior tenures at a Tier 1 investment bank and a leading asset management firm.

CV

Catherine Voss, Esq.

General Counsel & Chief Compliance Officer

An accomplished attorney specializing in data privacy law, regulatory enforcement, and corporate governance across financial services and technology sectors. Voss provides legal oversight for all client engagements, compliance programs, and GEM's operational policies across multiple jurisdictions, including prior service as Deputy General Counsel at a global financial institution.

Team Divisions

Six specialized divisions delivering enterprise excellence

Cybersecurity Division

40+ Specialists

Our core security team operates the GEM Security Operations Center and delivers threat intelligence, incident response, penetration testing, and security architecture services to enterprise clients globally. This division maintains 24/7 operational coverage across all client environments.

Capabilities

  • SOC Operations
  • Threat Intelligence
  • Red Team
  • Digital Forensics

Intelligence Division

12+ Analysts

A specialized unit focused on open-source intelligence, dark web monitoring, geopolitical risk analysis, and adversary profiling. The Intelligence Division informs proactive defense decisions across all client engagements and contributes to GEM's proprietary threat intelligence feeds.

Capabilities

  • OSINT Operations
  • Dark Web Monitoring
  • Adversary Profiling
  • Geopolitical Risk

Financial Security Division

15+ Analysts

Specialists in financial institution security, fraud prevention, AML compliance, and regulatory risk. This division protects client financial operations, supports risk quantification and regulatory reporting, and coordinates with forensic accounting partners on complex investigations.

Capabilities

  • Transaction Security
  • Fraud Prevention
  • AML Compliance
  • Financial Forensics

Real Estate Division

10+ Advisors

Security advisors focused on property and transaction protection. This team secures real estate investment platforms, property management systems, and closing processes. The division maintains integrations with major county recorder databases for real-time deed monitoring.

Capabilities

  • Property Security
  • Title Monitoring
  • Closing Protection
  • Portfolio Management

Operations Division

20+ Professionals

The operational backbone of GEM Enterprise. This team manages client onboarding, platform infrastructure, internal security, vendor relationships, and organizational resilience programs. Operations ensures consistent service delivery and SLA adherence across all engagements.

Capabilities

  • Client Onboarding
  • Platform Operations
  • Vendor Management
  • Business Continuity

Compliance Division

8+ Attorneys & Compliance Officers

In-house legal and compliance professionals ensuring GEM operates within applicable regulatory frameworks and that client engagements adhere to the highest standards of legal and ethical practice. This division manages KYC/AML screening, regulatory filings, and client compliance advisory.

Capabilities

  • Regulatory Compliance
  • KYC/AML Oversight
  • Data Privacy
  • Audit Support

Partners & Trustees

Strategic alliances and institutional relationships that strengthen our capabilities

Industry Association

National Cybersecurity Alliance

Strategic membership providing access to coordinated threat intelligence sharing, policy advocacy, and best-practice frameworks for enterprise security programs.

Intelligence Consortium

Financial Services Information Sharing and Analysis Center (FS-ISAC)

Participation in the global financial sector's primary threat intelligence sharing network, enabling real-time correlation of financial sector-specific threats.

Industry Body

American Land Title Association (ALTA)

Affiliation with the national association for title insurance and settlement services, supporting GEM's real estate security standards and title fraud prevention programs.

Standards Body

ISACA — Information Systems Audit and Control Association

Organizational membership supporting GEM's commitment to internationally recognized IT governance, audit, and security standards across all client engagements.

Professional Association

Association of Certified Fraud Examiners (ACFE)

Partnership supporting GEM's financial forensics capabilities and professional development standards for fraud examination and financial crime investigation.

Research Organization

Cloud Security Alliance (CSA)

Contributing membership to the global standards body defining cloud security best practices, informing GEM's cloud security assessment frameworks and client advisory services.

Confidential trustee and institutional partner identities are disclosed to clients under NDA during the onboarding process. GEM Enterprise does not publicly disclose specific financial custodian or institutional relationships without written authorization.

Compliance & Regulatory Disclosure

GEM Enterprise operates under applicable federal and state regulations. All client engagements are subject to eligibility review, KYC/AML screening, and jurisdictional compliance requirements. Our services are available to qualified institutions and accredited individuals only. Review our full compliance notice for complete regulatory disclosures.