I dug up what I believe to be the contract and read through what they were contracted for. It appears to be general advisory, including but not limited to issues that would fall under cyber security, but this is under general advisory. In other words, they were essentially a contracted IEEE inspector.
Eagle Research Corp itself is clearly a bog standard engineering support firm contracted by the US government. They don't offer hacking services, or system stress testing services, or push any security firm stuff. Their document list is also publicly available on their website and it's the products and services they offer, which do not include anything OPSEC or hacking adjacent, as far as I saw. They certainly may handle something hacking-adjacent, like network testing, but we're talking about "preventing Stuxnet" (Not plugging your porn USB drive into the SC class network) instead of writing Stuxnet (Are your centrifuges running? You better go catch them!)
View attachment 7647984
Checking their hiring page, you see that they are really just a general consulting firm. Yellow is stuff you could like, teeeechnically call hacking in terms of a power plant. Like, skills you would have to know, but chances are Jason's role in this was making sure their network was up to code.
Which, to be completely clear, being the subject matter advisor on the topic of network security for an engineering firm which has won over 250 million dollars from the US government is something he could claim and it's perfectly respectable, but it doesn't sound as cool as "The government payed me to hack their power plants"