Two engineers previously linked to Elon Musk’s Department of Government Efficiency (DOGE) have joined the Cybersecurity and Infrastructure Security Agency (CISA), raising questions about their access to sensitive government networks. Nineteen-year-old Edward Coristine and 38-year-old Kyle Schutt, both part of the DOGE initiative, now hold advisory roles at CISA, according to WIRED.
Their appointments have drawn scrutiny due to their past affiliations and potential security risks. CISA, a key division within the Department of Homeland Security (DHS), is responsible for protecting civilian government networks and safeguarding critical infrastructure. Given the agency’s role in national cybersecurity, the presence of these two individuals has sparked concern among experts.
Fast-Tracked Government Careers
Coristine’s rapid ascent through various federal agencies has raised eyebrows. Since January, he has worked with multiple government entities, including the General Services Administration (GSA), the Office of Personnel Management, the State Department, and the Federal Emergency Management Agency (FEMA). While at the State Department’s Bureau of Diplomatic Technology, he may have had access to sensitive intelligence related to U.S. diplomats and global sources.
His move to CISA was first reported by journalist Marisa Kabas, who confirmed that Coristine is listed as a senior adviser within the agency. The extent of his influence and access to cybersecurity operations, however, remains unclear.
Schutt, the second DOGE recruit, has also secured a position at CISA. Before joining Musk’s government-related team, he played a key role in launching WinRed, a Republican fundraising platform that generated $1.8 billion during the 2024 election cycle. Reports indicate he was also involved with the GSA prior to moving to CISA.
CISA’s Role and Security Implications
As the lead cybersecurity agency for federal civilian networks, CISA plays a crucial role in defending government systems from cyber threats. The agency stores a wealth of confidential information, including details on software vulnerabilities, breach reports, and risk assessments for state and local election offices.
Since 2018, CISA has worked closely with the FBI and the National Security Agency (NSA) to strengthen election security and prevent cyberattacks. Given this responsibility, the appointment of Coristine and Schutt has sparked debate over the agency’s vetting processes and the potential risks associated with their presence.
Coristine’s Controversial Cybersecurity Background
Coristine’s past affiliations have drawn particular scrutiny. In 2022, he briefly worked for Path Network, a cybersecurity firm known for hiring former blackhat hackers. According to security journalist Brian Krebs, an online account linked to Coristine was associated with The Com, a loosely organized cybercriminal group responsible for several hacking incidents, including breaches of Snowflake accounts.
While there is no direct evidence connecting Coristine to the Snowflake breaches, WIRED previously reported that an account associated with him appeared to seek assistance in launching a distributed denial-of-service (DDoS) attack—a technique used to overwhelm and disable websites. Krebs also reported that Coristine was dismissed from Path Network for allegedly leaking internal company documents to a competitor.
Despite these concerns, he has now secured a senior advisory role within a federal cybersecurity agency, prompting experts to question how individuals with such backgrounds are being granted access to sensitive systems.
Cybersecurity Experts Express Concern
The Washington Post recently confirmed Coristine’s assignment to DHS but did not specify which department he joined. His placement at CISA has now been verified, but the level of access he and Schutt have to government networks remains unknown.
Cybersecurity professionals have voiced apprehension over placing individuals with past ties to cybercriminal networks in positions of influence. One researcher who monitors cybercriminal activity questioned the decision, stating, “What’s the point of fighting cybercrime if we’re giving government network access to people linked to cybercriminal groups?”
As these concerns grow, experts are calling for more transparency in the hiring and vetting processes for individuals entering sensitive government positions. CISA has referred all inquiries to DHS, which has yet to respond.