End-to-end incident response and digital forensic services
Responding swiftly and thoroughly to live incidences is critical to minimise the damage to organisations.
Our team of offensive experts have in-depth knowledge of attack methods used by adversaries and utilise this domain expertise to detain and eradicate breaches.
Benefits
Swift remediation of incidences
Reduce impact and cost of incidences
Improve long term cyber security posture & capabilities
Our Capabilities
Prepare
We help you prepare for incidences to minimise future risk and impact
Services
- Executive training & simulations
- Employee awareness programs
- Incident response readiness assessment
Analyse
We identify root-causes of the incidence and build a short-term remediation plan
Services
- Digital incident forensics
Respond
We eradicate and manage live incidences to minimise dwell time and impact
Services
- On-call/emergency specialist incident response
- Incident management retainer
Prepare
Implement short-long term remediation to minimise immediate risk and long-term capabilities
Services
- Post-incident security uplift
Our Incident Response Team
We bring unparalleled expertise in offensive security to the Australian and global market.
Shahar Zini
Shahar Zini previously served as CTO of an elite cyber technology department in the Israeli government. He had a significant role in leading the development and enhancement of the department's technological capabilities, while mentoring the new generation of cyber security professionals. Shahar won the Israeli Defence Award at the age of 25.
In addition, Shahar served as Chief Architect at XM Cyber, a pioneer in Breach and Attack Simulation technologies, where his work received numerous awards and patents.
Shahar commonly shares his passion about cyber security with his peers through CTF events he builds, and participation in leading conferences, including RSA.
Alex Hill
Alex is an offensive security specialist with a wide range of domestic and international experience. He previously led PwC’s Sydney-based cyber security team as a team lead, mentor, and technical cyber specialist. He personally designed and executed hundreds of bespoke offensive technical assessments and cyber uplifts for some of Australia’s biggest brands.
He prides himself on being able to not only break IT systems though – he also does the hands on building and fixing. Alex has been a go-to cyber specialist for Sydney’s fintech/ startup scene as a security architect – building mature, zero-trust corporate and cloud-only product environments.
He has personally operated live incident response teams for public companies performing the hands-on attack investigation, timelining, and remediation. And he filled in as a virtual CISO for one of Australia’s mid-tier banks for a little over a year.
Over the last few years Alex has continued to focus on the offensive red-team space where he excels at getting the most out of exercises by engaging closely with blue teams. As someone with experience breaking, building, and investigating, Alex is the ideal person to provide technical training to upskill defenders and help them get the most out of their tools.
Alex holds a Bachelor of Information Technology (Co-op) from the University of Technology Sydney and a list of cyber-specific testing and architecture certifications.
Chris Archimandritis
With well over a decade of cybersecurity experience, and almost twenty years of experience in different aspects of IT, Chris has led complex security assessments across every industry, spanning three continents. His experience includes both planning and executing sensitive engagements that encompass, among others, critical infrastructure, industrial and residential hardware, core financial and banking systems, purpose-built devices, and cutting-edge smart deployments.
During this time, Chris has also delivered trainings, workshops, and talks for conferences across the world and the APAC region, such as DefCon and AusCERT.
His previous experience as part of academic research groups has provided the tools to tackle any novel problem and assist organisations with cutting edge solutions and platforms.
Having performed engagements on all levels of abstraction, he not only able to both work on the tools as well as analyse and evaluate high level design, but most importantly is able to bridge the gap of management and engineers to provide the best possible strategy to enhance an organisation’s security posture.
His most recent research interests revolve around hardware security, industrial IoT, smart devices and enterprise data platforms.
Chris holds a Bachelor of Computer Science and a master’s degree in Information Systems and has attended several trainings by some of the world's foremost security experts.
Peter Szot
Peter is a senior penetration tester at Skylight Cyber specialising in Red Team and advanced persistent threat simulations. He has conducted several highly successful Red Team engagements against both locally and internationally situated clients with varying levels of security maturity, whilst achieving stealthy compromise of critical assets.
Constantly striving to improve methodologies, Peter regularly researches new vulnerabilities, and pushes the boundaries of existing technology stacks to circumvent protective measures and help security teams harden systems against modern threats.
Peter previously worked at several cybersecurity consulting companies, working on a vast range of products, from bespoke applications to critical telecommunication hardware.
As such, he has accumulated extensive experience in penetration testing and security assessments across several programming languages and development frameworks.
Peter graduated with Honours (first class) from the University of Sydney and holds a Bachelor of Information Technology.
Speak to our team
FAQs
We are available as on-call/emergency responders to a live incident and are available to respond.
We provide end-to-end incident response services, and can tailor based on your needs. We help prepare for you for an incident, respond to a live incident, and ensure your security posture is strengthen post an incident.
When responding to a live incident, we focus on eradicating the threat and reducing dwell time. After this is done, we engage in testing to uncover all the vulnerabilities which can further be exploited and shift to remediation. During this time, we look at the security posture and resilience of your security stack.
No content
We work with your key internal stakeholders during the handling of an incident, including briefing your executive team and board in their requirements. We distill the technical into business impacts to enable effective decision making.