Secure by Design
“Secure by design” is the safest, most cost-effective approach to building new products, modules and networks.
Our design & architecture services aims to help your organisation build the right technical capabilities to operate efficiently and safely across all areas of your security stack.
Benefits
Proactive Risk Reduction
Building security into systems from the beginning minimises vulnerabilities and reduces the risk of future breaches and associated costs.
Long-Term Cost
EfficiencyAddressing security at the design stage leads to reduced costs in remediation and avoids disruptions.
Enhanced Customer Trust
Demonstrates a commitment to high security standards, fostering greater confidence among clients, partners, and stakeholders.
Our Approach
Our approach is hands-on, pragmatic and tailored to your requirements. We join your engineering team from the initial design stage until a solid security architecture has been defined, deployed and optimised.
01
Assessment and Requirements
Assess key organisational security requirements across networks, physical assets, cloud and unified communications.
02
Design & Architecture
Integrate security controls and practices into the system architecture to address identified risks.
03
Implementation Validation
Ensure security features are correctly implemented, with rigorous testing to validate their effectiveness.
04
Continuous Monitoring & Improvement
Regularly assess and update security measures as threats evolve, ensuring long-term resilience and adaptation to emerging risks.
Services
Network and OT security design
Product Security Design
Cloud Security
Our Design & Architecture Experts
We bring unparalleled expertise in Design and Architecture to the Australian and global market.

Shahar Zini
Shahar Zini previously served as CTO of an elite cyber technology department in the Israeli government. He had a significant role in leading the development and enhancement of the department's technological capabilities, while mentoring the new generation of cyber security professionals.
Shahar won the Israeli Defence Award at the age of 25. In addition, Shahar served as Chief Architect at XM Cyber, a pioneer in Breach and Attack Simulation technologies, where his work received numerous awards and patents.
Shahar commonly shares his passion about cyber security with his peers through CTF events he builds, and participation in leading conferences, including RSA.

Alex Hill
Alex is an offensive security specialist with a wide range of domestic and international experience delivering bespoke technical assessments. His experience includes red team vs. blue team exercises, security architecture assessments, and startup engineering projects.lex is an offensive security specialist with a wide range of domestic and international experience. He previously led PwC’s Sydney-based cyber security team as a team lead, mentor, and technical cyber specialist. He personally designed and executed hundreds of bespoke offensive technical assessments and cyber uplifts for some of Australia’s biggest brands.
He prides himself on being able to not only break IT systems though – he also does the hands on building and fixing. Alex has been a go-to cyber specialist for Sydney’s fintech/ startup scene as a security architect – building mature, zero-trust corporate and cloud-only product environments.
He has personally operated live incident response teams for public companies performing the hands-on attack investigation, timelining, and remediation. And he filled in as a virtual CISO for one of Australia’s mid-tier banks for a little over a year.
Over the last few years Alex has continued to focus on the offensive red-team space where he excels at getting the most out of exercises by engaging closely with blue teams. As someone with experience breaking, building, and investigating, Alex is the ideal person to provide technical training to upskill defenders and help them get the most out of their tools.

Peter Szot
Peter is a senior penetration tester at Skylight Cyber specialising in Red Team and advanced persistent threat simulations. He has conducted several highly successful Red Team engagements against both locally and internationally situated clients with varying levels of security maturity, whilst achieving stealthy compromise of critical assets.
Constantly striving to improve methodologies, Peter regularly researches new vulnerabilities, and pushes the boundaries of existing technology stacks to circumvent protective measures and help security teams harden systems against modern threats.
Peter previously worked at several cybersecurity consulting companies, working on a vast range of products, from bespoke applications to critical telecommunication hardware. As such, he has accumulated extensive experience in penetration testing and security assessments across several programming languages and development frameworks.
Peter graduated with Honours (first class) from the University of Sydney and holds a Bachelor of Information Technology.

Chris Archimandritis
With well over a decade of cybersecurity experience, and almost twenty years of experience in different aspects of IT, Chris has led complex security assessments across every industry, spanning three continents. His experience includes both planning and executing sensitive engagements that encompass, among others, critical infrastructure, industrial and residential hardware, core financial and banking systems, purpose-built devices, and cutting-edge smart deployments.
During this time, Chris has also delivered trainings, workshops, and talks for conferences across the world and the APAC region, such as DefCon and AusCERT.
His previous experience as part of academic research groups has provided the tools to tackle any novel problem and assist organisations with cutting edge solutions and platforms.
Having performed engagements on all levels of abstraction, he not only able to both work on the tools as well as analyse and evaluate high level design, but most importantly is able to bridge the gap of management and engineers to provide the best possible strategy to enhance an organisation’s security posture.
His most recent research interests revolve around hardware security, industrial IoT, smart devices and enterprise data platforms.
Chris holds a Bachelor of Computer Science and a master’s degree in Information Systems and has attended several trainings by some of the world's foremost security experts.