Cyber Security Consulting
Detection. Defence. Deception. We build high-fidelity security capabilities for organisations that can't afford to get it wrong — grounded in real adversary behaviour and built to last.
Work with usDetection rules built on real adversary TTPs — leveraging MITRE ATT&CK, risk-based analytics, and Detection-as-Code principles across Splunk ES, Microsoft Sentinel, and EDR platforms.
Design and deployment of honeypots and honeytoken accounts to act as decoys for threat actors, providing high-confidence alerting on lateral movement and credential abuse.
End-to-end SIEM platform builds and uplift — log onboarding, parsing, normalisation, detection rule migration, and coverage gap analysis across Splunk ES and Microsoft Sentinel.
End-to-end IR lifecycle management — from triage and investigation through to containment, recovery, and post-incident review — with playbooks built to last.
Strategic advisory on SIEM uplift, SOC capability uplift, cloud security posture, compliance (E8, APRA CPS 234, NIST CSF), and security awareness programs.
Tenable-based scanning, risk-prioritised remediation methodology, and SLA frameworks to systematically reduce exposure across your environment.
Founder & Principal Consultant
A decade of experience across detection engineering, incident response, and security operations. Former senior roles at NAB and Ernst & Young, with government engagements spanning the Department of Defence and Department of Education.
Ready to strengthen your security posture? Get in touch.