Cyber Security Consulting

D3 Cyber

Detection. Defence. Deception. We build high-fidelity security capabilities for organisations that can't afford to get it wrong — grounded in real adversary behaviour and built to last.

Work with us

Services

Detection Engineering

Detection rules built on real adversary TTPs — leveraging MITRE ATT&CK, risk-based analytics, and Detection-as-Code principles across Splunk ES, Microsoft Sentinel, and EDR platforms.

Cyber Deception

Design and deployment of honeypots and honeytoken accounts to act as decoys for threat actors, providing high-confidence alerting on lateral movement and credential abuse.

SIEM Uplift

End-to-end SIEM platform builds and uplift — log onboarding, parsing, normalisation, detection rule migration, and coverage gap analysis across Splunk ES and Microsoft Sentinel.

Incident Response

End-to-end IR lifecycle management — from triage and investigation through to containment, recovery, and post-incident review — with playbooks built to last.

Security Consulting

Strategic advisory on SIEM uplift, SOC capability uplift, cloud security posture, compliance (E8, APRA CPS 234, NIST CSF), and security awareness programs.

Vulnerability Management

Tenable-based scanning, risk-prioritised remediation methodology, and SLA frameworks to systematically reduce exposure across your environment.

Team

JB

James Bullen

Founder & Principal Consultant

A decade of experience across detection engineering, incident response, and security operations. Former senior roles at NAB and Ernst & Young, with government engagements spanning the Department of Defence and Department of Education.

  • SC-200
  • eJPTv2
  • Security+

Contact

Ready to strengthen your security posture? Get in touch.