Key Solutions

Technical Assessment Skills

  • Ethical Hacking
  • Penetration Testing
  • Vulnerability Assessment
  • Infrastructure Application Testing
  • OWASP Top 10 Web Application Assessment
  • Mobile Application Testing

Technical Configuration Review

  • Network/Application Security Posture Assessment
  • Device Configuration Review
  • Firewall/IPS Configuration Review

Threat & Risk Assessment (TRA) Using Controls Frameworks

  • ISO 27001/27002 Controls Assessment
  • SANS Top 20 Controls Assessment
  • NIST/CIS Controls Assessment
  • PCI-DSS, HIPAA, SAE Compliance Review

Security Hardening & Remediation

  • Active Directory & GPO Hardening
  • Firewall/Router/Switch Hardening
  • Tripwire FIM Deployment
  • Assisted PCI Remediation
  • IDS/IPS Implementation
  • Firewall Implementation

Post-Assessment Projects

  • Enterprise Information Security Roadmap Development
  • Enterprise Risk Model Development
  • Enterprise Vulnerability Remediation Program Development
  • SANS Top 20 Critical Controls Implementation
  • NIST, ISF Controls Implementation
  • Data Loss Prevention (DLP) Implementation
  • SIEM (Security Information & Event Management) - QRadar, AlienVault
  • User Analytics, Behaviour Monitoring (UEBA)