Whatever your problem, we’ll do our best to solve it for you. We can help you do things like:

  • threat hunting

  • detect and analyze infrastructure

  • build an intelligence collection plan

  • build data knowledge bases from existing data sources and feed curation

  • technical and cyber intelligence reports

  • create clear, short managerial briefs with simplified technical intelligence info

  • keep abreast of current events and world infections such as WannaCry or Not Petya

We can also help you to:

  • build and review your company’s business threat intelligence program

  • build threat intelligence teams including:

    • define and recruit staff to threat intelligence positions – including writing job descriptions and requirements, conducting interviews, designing and reviewing acceptance tests/tasks

    • build internal training – from syllabus design to specific material development and instruction

  • undertake technical and professional leadership of intelligence analysts, intelligence researchers, security operations center (SOC) analysts and developers of internal intelligence platforms and products

  • define internal processes – from systems to work procedures

  • design systems and architecture for internal intelligence platforms – including specific needs, design, requirements, work flows, technological review, and KPIs for technological, operational and business parameters

  • manage threat-intelligence-related ventures including products and projects.



©2018 by Damsky - Cyber Threat Intelligence Research, Training and Consulting.