You don't need another CISSP reading out a checklist. You need a security engineer who can pass SOC 2 without asking the auditor for extensions, tune a noisy SIEM into a signal-producing machine, find the prompt-injection path your AI PM missed, and be the person who says "start the incident bridge" at 2 a.m. without panic. That's our practice.
$25/hr
Starting rate
5 days
Free threat review
0
Audit findings on platform
Pentest? SOC 2 coming? SIEM overwhelmed? AI security review? Brief us in 60 seconds. We'll match a senior engineer in 24 hours and run a free 5-day threat review.
Replies within 4 business hours · NDA-ready
Six engagements across AppSec, cloud, compliance, detection and AI security shipped in the last twelve months.
PTES-aligned external + internal + web + mobile + API pentests. CVSS-scored findings, reproduction steps, retest windows, attestation letter for enterprise buyers. OSCP / OSCE / OSEP testers, AppSec specialists for framework-specific issues.
Gap assessment → policy library → technical controls (MFA, SSO, endpoint hardening, encryption, logging) → evidence automation via Drata / Vanta / Secureframe → internal pre-audit → external audit support. Typical timeline: 6 months from zero to Type II.
Detection-as-code pipelines in Splunk / Sentinel / Chronicle / Elastic / Datadog. MITRE ATT&CK-mapped rules with automated tuning, false-positive tracking, and SOAR automation (Tines, Torq, Splunk SOAR) for tier-1 triage. Cuts MTTR 40–60% on average.
CSPM / CNAPP rollout — Wiz, Prisma Cloud, Orca, Lacework. IAM hardening with short-lived credentials via AWS SSO + Vault, Entra PIM, GCP Workload Identity. Guardrails-as-code with SCPs, Azure Policy, Organization Policy constraints. Compliance packs mapped to CIS benchmarks.
OWASP Top 10 for LLMs — prompt injection, insecure output handling, supply-chain review for model registries and plugins, guardrail implementation (Guardrails AI, NeMo Guardrails, Llama Guard, Lakera), red-teaming exercises, EU AI Act / ISO 42001 alignment.
24×7 IR retainer with a 4-hour response SLA. Pre-agreed runbooks, co-authored with your ops team, game days twice a year, forensic bench (chain-of-custody-ready), and breach-coach-style communication during active incidents.
Depth across AppSec, cloud, SOC, offensive, and AI security — with the right certifications and shipped work to match.
Every project starts with a free 5-day threat review — you get a prioritized risk register and remediation plan whether you hire us or not.
45-minute scoping call under NDA. We map your current estate (cloud, on-prem, SaaS, AI), compliance posture, open audits, and pain points. Pull 1–2 senior engineers matched to the speciality.
Structured review across MITRE ATT&CK phases, cloud CIS benchmarks, AppSec pipeline coverage, compliance gaps, IR readiness. Deliverable is a 40-page scored risk register + prioritized 90-day roadmap.
Fixed-scope or dedicated-engineer model. Security-as-code in your repo, policy libraries, evidence automation, detection rules in CI. Weekly RAID log and executive readout.
Either a clean handover with runbooks, playbooks and evidence packs — or ongoing MDR / IR retainer / fractional CISO with quarterly tabletops and annual red-team exercises.
Three engagement models. No tool reseller kickback, no certification upsell, no minimum term beyond the current sprint.
5 days
Free
MITRE-mapped risk register + CIS benchmark scan + compliance gap analysis. Zero commitment.
4–26 weeks
$12K – $400K
Pentest, SOC 2 Type II programme, SIEM engineering, cloud CSPM rollout. Fixed price, fixed timeline, milestone billing.
Monthly
$8K – $25K/mo
24×7 MDR, incident response, or fractional CISO. Best when you need ongoing security engineering.
We're not a compliance factory or a pentest mill. Every engineer has shipped production security work and survived at least one real incident.
OSCP, CISSP, CCSP, ISO 27001 LA, AWS / Azure security specialties — plus production work behind every certificate.
We'd rather hand you a scored risk register than a capability deck. If the review doesn't earn the work, we walk.
We'll tell you when a Vanta subscription is enough and Archer is overkill — or when open-source + Terraform beats CSPM licences.
Policies, detections, controls — all codified. Not a Sharepoint folder of Word docs. Fits modern engineering orgs.
All of them, and we match the engineer to the risk you're actually trying to reduce. Application Security engineers for SDLC hardening, SAST/DAST/SCA, secure code review, and threat modelling. Cloud Security engineers for AWS / Azure / GCP posture management, IAM hardening, and CSPM / CNAPP tooling. Detection & Response engineers to staff up your SOC — SIEM engineering, detection-as-code, IR runbooks. Offensive Security engineers for penetration tests, red team, and purple team exercises. GRC specialists for SOC 2, ISO 27001, HIPAA, PCI, FedRAMP programmes. Tell us the outcome you need — we'll pick the speciality.
Yes. Every penetration test includes a report aligned to PTES and OWASP methodology — executive summary, scope, methodology, vulnerabilities with CVSS scoring, reproduction steps, screenshots, and remediation recommendations ranked by effort and impact. We also provide retest windows to validate fixes, and attestation letters your security and customer success teams can share with enterprise buyers. OSCP-, OSCE-, OSEP-, and CRTO-certified testers on the bench.
Yes. We run compliance programmes end to end — gap assessment against the control framework, policy and procedure authoring, technical control implementation (MFA, endpoint hardening, encryption at rest/in transit, access reviews, audit logging), evidence collection automation via Drata / Vanta / Secureframe / Tugboat Logic, pre-audit internal reviews, and accompaniment through external audit interviews. We've taken companies from zero to SOC 2 Type II in six months and HIPAA in four.
Yes. Detection engineering is a core practice. We build and maintain detection-as-code repositories (Sigma or vendor-native), tune noisy alerts (MITRE ATT&CK-mapped with false-positive tracking), onboard log sources cleanly with cost in mind (TB of VPC flow logs eats a lot of Splunk budget), build IR playbooks in SOAR platforms (Tines, Torq, Splunk SOAR), and reduce MTTR by automating tier-1 triage.
Yes. AI security is a growing practice for us. LLM security reviews covering OWASP Top 10 for LLM Apps — prompt injection (direct + indirect), insecure output handling, training-data poisoning, model denial of service, supply chain via model registries and plugins, excessive agency, overreliance, and model theft. We implement guardrails (Guardrails AI, NeMo Guardrails, Llama Guard, Lakera), red-team LLM applications, and advise on AI governance aligned with EU AI Act and ISO 42001.
Dedicated engineer from $25/hr (offshore mid) to $120/hr (US principal for incident response / senior IR commander). Penetration tests are fixed-scope from $12K for a targeted test to $60K+ for enterprise-wide external + internal + social. SOC 2 Type II programmes typically $30K–$80K over 6 months. Fractional CISO engagements $8K–$20K / month. Every new engagement starts with a free 5-day threat review — you get a prioritized risk register whether you hire us or not.
Yes. We offer MDR retainers with follow-the-sun analyst coverage from US + EU + APAC analysts, pre-agreed SLAs on detection, triage and containment, SIEM / XDR integration into your existing stack, and quarterly tabletop exercises. IR retainers include a 24/7 hotline, breach-coach-style guidance, and forensic support with chain-of-custody discipline. Scaled pricing based on surface area and ticket volume.
Brief us on your environment and the risk you're trying to reduce. We'll match a senior security engineer in 24 hours and deliver a scored risk register by Friday — free and NDA-protected.