Service · Cybersecurity

Defence in depth with audit-ready evidence, not just a SIEM dashboard

Endpoint, email, identity, network and SOC operations — mapped to NIST CSF v2 with the evidence pack your auditor will recognise. We don't just light up alerts; we close them and document it.

Talk to a cybersecurity engineer

Who this is for

What's included

Endpoint protection

Defender XDR (default), CrowdStrike or SentinelOne where you already have them. Tuned policies, not vendor defaults.

Email security

Defender for Office 365 / Mimecast / Proofpoint — configured for your threat profile, with phishing simulation and reporting.

Identity hardening

MFA / passkey enforcement, JIT elevation, conditional access by risk score, dormant-account sweeps.

SIEM & SOC

Microsoft Sentinel + Wazuh on top of your stack. 24×7 SOC monitoring on the Regulated tier with on-call escalation you can audit.

Vulnerability management

Continuous scanning, patch SLAs (critical 72h / high 7d / medium 30d), pen-test coordination.

Incident response

Playbooks per scenario. SUP 15 / DSPT-incident templates. We help you write the customer notification.

How we deliver

  1. Discovery — Gap assessment against NIST CSF v2 (or ISO 27001 / CE+ if you prefer). Written report inside 5 working days.
  2. Design — Roadmap with cost, effort, residual-risk per gap. You pick the order.
  3. Run — SOC live within 2 working weeks; controls uplift typically a 60-day engagement.
  4. Optimise — Monthly threat report; quarterly purple-team exercise on the Regulated tier.

Outcomes you can measure

<72 hCritical CVE patch SLA
24×7SOC coverage on the Regulated tier
MappedEvery control to NIST CSF / your auditor's framework

Tier-specific SLAs at /service-levels/.

Tech stack we run

Standard pieces; we'll work with what you have if you prefer.

Microsoft Defender XDR Microsoft Sentinel Wazuh Entra ID Defender for Office 365 Crowdsec OpenBao GitLab

Ready to talk cybersecurity?

30-minute discovery call. No slide deck.

Book a consultation