
Services
Whatever your problem, we’ll do our best to solve it for you. We can help you do things like:
-
threat hunting
-
detect and analyze infrastructure
-
build an intelligence collection plan
-
build data knowledge bases from existing data sources and feed curation
-
technical and cyber intelligence reports
-
create clear, short managerial briefs with simplified technical intelligence info
-
keep abreast of current events and world infections such as WannaCry or Not Petya
We can also help you to:
-
build and review your company’s business threat intelligence program
-
build threat intelligence teams including:
-
define and recruit staff to threat intelligence positions – including writing job descriptions and requirements, conducting interviews, designing and reviewing acceptance tests/tasks
-
build internal training – from syllabus design to specific material development and instruction
-
-
undertake technical and professional leadership of intelligence analysts, intelligence researchers, security operations center (SOC) analysts and developers of internal intelligence platforms and products
-
define internal processes – from systems to work procedures
-
design systems and architecture for internal intelligence platforms – including specific needs, design, requirements, work flows, technological review, and KPIs for technological, operational and business parameters
-
manage threat-intelligence-related ventures including products and projects.