Our certificates can be checked online with the relevant certification bodies:
- (ISC)2: Certified Information Systems Security Professional (CISSP)
- Offensive Security: Offensive Security Certified Professional (OSCP), Offensive Security Experienced Penetration Tester (OSEP)
- Pentester Academy: Certified Red Teaming Expert (CRTE), Certified Red Teaming Professional (CRTP)
- EC Council: Certified Ethical Hacker (CEH)
- ISACA: Certified Information Security Auditor (CISA), Certified Information Security Manager (CISM)
- BSI: ISO 27001 Lead Auditor and ISO 27001 Implementation
- PECB: Certified Lead Pen Test Professional (Certified LPTP, CLPTP) and Certified ISO/IEC 27001 Senior Lead Auditor
- ISA: ISA/IEC 62443 Cybersecurity Fundamentals Specialist (ISA/CFS)
- Other certificates
Certificates that we issue or help to obtain from accredited organizations:
- Security Audit Certificate
- Software verification certificate according to ASVS v.4 standard
- Public report on security assurances based on audit, security assessment, or penetration testing
- SOC 2 Compliance Report
- ISO 27001 Certificate of Compliance
- ENX TISAX Compliance Status
- PCI DSS Compliance Certificate
- Training certificates
Our competence
We have wide experience, deep and unique competence in IT and corporate security. Both in GRC (Governance, Risk management, and Compliance), and in technical security. Both in Defensive Security and Offensive Security:
Security Assessment: IT and information security audits, pentests, social engineering, Red Team, source code security analysis, SCADA/ICS audits. Forensic expertise and information security incident investigation. Learn more. | |
Compliance Management: ISO 27001, PCI DSS, GDPR, SOC 2, HIPAA, ITIL, ISF, NIST, COBIT, etc. We are ENX TISAX® and VDA ISA security specialists. Learn More. | |
Application Security: Managing the Secure Development Lifecycle (Secure SDLC) and Security DevOps of specific software products, ASVS certification. Training on secure software development. More details. | |
Managed security. Monitoring of information security events. Detection of threats. Incident response. SOC as a service. | |
Software development. DevOps. Virtualization. Development and audit of smart contracts and blockchain technologies. IT services. | |
We solve any security problems. OSINT. Enterprise risk management. Business continuity management and service recovery planning. Reputation management (Search Engine Reputation Management, SERM). Physical security. Control of personnel activity. Selection and implementation of solutions. System integration. Other security areas. |
You can order any security consulting service on an hourly basis. Feel free to combine multiple competencies to define your needs or describe your specific request.
Learn more about the “Security expert” (Virtual CISO) service or fill out the form below to get a free consultation right now: