With a rapid development of new technologies as well as automating most of the operations, this will put the security of customer’s data and organization assets to potential risk that could harm them and affect their reputation which could cause huge financial impact, thus, organizations shall be prepared to detect, handle, and manage any incident that could target their assets as well as identifying their weaknesses before threat actors do. Therefore, we have established certain security services that will help the organization to secure their assets as well as detect their weaknesses.
Who We Are
We are professional cyber security consultants whom have an excellent background in systems, networks, and security. We have an extensive experience in SOC supervision & development, technical consultancy, penetration testing, SIEM development and training. We have worked across different areas and delivered top notch quality information security services to public and private sectors covering incident handling, penetration testing, vulnerability assessment, digital forensics, compromise assessment, technical security training and other security technical consultation services such as configuration review, architecture review, and SOC policies and procedures development.
Consultation Services
Penetration Testing
Assess the security level of customers network assets, web applications, mobile applications by simulating well-known and custom attacks related to application's logic to detect any vulnerability that could harm their operations
Configuration Review
Assess the deployed security technical controls among customer servers, network, and security Devices
Architecture Review
Identify any security gap in technology and architecture according to security best practices such as Open Security Architecture as well as SANS 20 Controls to establish a roadmap that is aligned with customer’s strategy to fix these gaps
Source Code Review
Identify any security flaw in the source code of the applications by assessing the logic and the implementation of certain functions within the application such as Input Validation, Output sanitization, Connection Strings, Hard Coded passwords and Keys, etc.
Proactive Security Services
Compromise Assessment
Identify any infected assets within the infrastructure by assessing network devices, network traffic, servers, and endpoints if there is any malicious activity running at the time of the assessment by hunting Indication of Compromise (IoCs) for well-known threats and malwares (such as bad reputed IP address, bad reputed domains, malicious files and executables, malicious network connections, etc.), as well as unknown threats by examining asset’s behavior and any violations on customer's security policy
Professional Services
SIEM Integration
Integrate the event sources (which covers well-known security and network devices along with the key servers) within customer's infrastructure with either ELK or Alien Vault SIEM solutions
SIEM Content Development
Develop SIEM rules, alerts, dashboards, and reports to speed up incident detection and management time
Custom Report Engines
Develop custom report engines for any security control within customer's infrastructure to enhance the reporting operation and enrich report data with customer's hierarchy and requirements
Incident Handling
Playbook Development
Develop detailed procedures for each incident category that should be followed in case of facing an incident
Incident Investigation
Gather and investigate all the information related to the incidents to identify the attack vector
SOC Polices & Procedures
Develop all the required documentation to govern SOC operation
We use cookies to enable essential functionality on our website, and analyze website traffic. By clicking Accept you consent to our use of cookies. Read about how we use cookies.
Your Cookie Settings
We use cookies to enable essential functionality on our website, and analyze website traffic. Read about how we use cookies.
Cookie Categories
Essential
These cookies are strictly necessary to provide you with services available through our websites. You cannot refuse these cookies without impacting how our websites function. You can block or delete them by changing your browser settings, as described under the heading "Managing cookies" in the Privacy and Cookies Policy.
Analytics
These cookies collect information that is used in aggregate form to help us understand how our websites are being used or how effective our marketing campaigns are.