Rapid Incident Response
End-to-end incident response and digital forensic services
Responding swiftly and thoroughly to cyber incidents is critical to mitigate impact and recover swiftly.
Our team of offensive cyber experts have in-depth knowledge of attack methods used by adversaries and leverage their expertise to investigate breaches and eradicate threats.
Benefits
Swift remediation of incidents
Reduce impact and cost of incidents
Improve long term cyber security posture & capabilities
Our Capabilities
Prepare
We help you prepare for incidents to minimise future risk and impact
Services
- Executive training & simulations
- Employee awareness programs
- Incident response readiness assessment
Analyse
We identify root-causes of the incident and build a short-term remediation plan
Services
- Digital incident forensics
Respond
We eradicate and manage live incidents to minimise dwell time and impact
Services
- On-call/emergency specialist incident response
- Incident management retainer
Prepare
Implement short-long term remediation to minimise immediate risk and long-term capabilities
Services
- Post-incident security uplift
Our Incident Response Team
We bring unparalleled expertise in offensive security to the Australian and global market.

Shahar Zini
Shahar Zini previously served as CTO of an elite cyber technology department in the Israeli government. He had a significant role in leading the development and enhancement of the department's technological capabilities, while mentoring the new generation of cyber security professionals. Shahar won the Israeli Defence Award at the age of 25.
In addition, Shahar served as Chief Architect at XM Cyber, a pioneer in Breach and Attack Simulation technologies, where his work received numerous awards and patents.
Shahar commonly shares his passion about cyber security with his peers through CTF events he builds, and participation in leading conferences, including RSA.

Alex Hill
Alex is an offensive security specialist with a wide range of domestic and international experience. He previously led PwC’s Sydney-based cyber security team as a team lead, mentor, and technical cyber specialist. He personally designed and executed hundreds of bespoke offensive technical assessments and cyber uplifts for some of Australia’s biggest brands.
He prides himself on being able to not only break IT systems though – he also does the hands on building and fixing. Alex has been a go-to cyber specialist for Sydney’s fintech/ startup scene as a security architect – building mature, zero-trust corporate and cloud-only product environments.
He has personally operated live incident response teams for public companies performing the hands-on attack investigation, timelining, and remediation. And he filled in as a virtual CISO for one of Australia’s mid-tier banks for a little over a year.
Over the last few years Alex has continued to focus on the offensive red-team space where he excels at getting the most out of exercises by engaging closely with blue teams. As someone with experience breaking, building, and investigating, Alex is the ideal person to provide technical training to upskill defenders and help them get the most out of their tools.
Alex holds a Bachelor of Information Technology (Co-op) from the University of Technology Sydney and a list of cyber-specific testing and architecture certifications.

Frikkie Jansen van Rensburg
Frikkie is an offensive security professional with over seven years’ experience specialising in penetration testing and technical leadership. His expertise spans mobile and web application security, hardware security, and complex bespoke engagements in highly regulated sectors such as mobile banking, biometric systems, and medical devices.
Frikkie’s engineering background, with a Bachelor of Computer Engineering from the University of Pretoria, underpins his strong technical foundation. During his studies, he focused on engineering design, software engineering, artificial intelligence, and developed a mobile application utilising optical character recognition and numerical methods.
He is deeply committed to building skills, fostering growth, and supporting mental health awareness within the cybersecurity industry. His experience also includes defining and refining business processes and sales initiatives, ensuring high-quality delivery and client satisfaction.
Frikkie is OSCP certified and continues to expand his technical capabilities through ongoing professional development. He is passionate about knowledge sharing and has delivered tailored security training to clients, helping them understand and mitigate risks in web and mobile environments.

Max Alster-Caminer
Max is a senior penetration tester with over 5 years of offensive security experience delivering security assessments across web applications, internal networks, external infrastructure, social engineering, and physical security. He specialises in identifying realistic attack paths that lead to full compromise and translating these outcomes into clear, pragmatic guidance to support informed remediation and decision-making.
Max sits on the risk committee for a local community organisation as a subject matter expert to assess their risk posture and provide strategic recommendations that inform board-level decisions.
Max has given talks at AWS GenAI Security Immersion Day, SecTalks SYD, and CrikeyCon AU on topics such as Generative AI Security, CTFs, and building red team implants.
He holds the OSCP certification and a Bachelor of Science in Information Technology from the University of Technology, Sydney.
Speak to our team
FAQs
We are available as on-call/emergency responders to a live event and are available to respond as per our SLAs. In case of a new customer we will make best effort to respond within a few hours.
We provide end-to-end incident response services, and can tailor based on your needs. We help prepare for you for an incident, respond to a live incident, and ensure your security posture is strengthened post an incident.
An incident is resolved when the root cause is identified, all affected systems are restored and secured, and any vulnerabilities have been addressed. A final report should be created, and lessons learned should be applied to strengthen security.
We work with your key internal stakeholders during the handling of an incident, including briefing your executive team and board in their requirements. We distill the technical into business impacts to enable effective decision making.
