Practical, hands-on cybersecurity services for Indian SMBs, startups, and enterprises โ from detection engineering to compliance readiness.
๐ก๏ธ
Splunk Detection Rules
Custom MITRE ATT&CK mapped detection rules โ brute force, lateral movement, exfiltration, PowerShell abuse, and more. Delivered as SPL with full documentation and ATT&CK technique mapping.
๐
Wazuh SIEM Setup & Tuning
End-to-end Wazuh deployment, agent configuration, custom rule writing, and dashboard setup. Turn-key open-source SIEM for SMBs and startups. Includes MITRE ATT&CK mapped rules and incident response playbooks.
๐
Threat Intel & OSINT Report
IOC enrichment across OTX, VirusTotal, Shodan. OSINT investigation on suspicious domains, IPs, and threat actors. TLP-classified deliverable covering indicators, TTPs, and recommended mitigations.
๐
Security Policy Drafting
DPDP Act and ISO 27001 aligned security policies โ Password Policy, AUP, Incident Response, Data Classification, and more. Audit-ready documentation delivered within 5 business days.
๐
Security Awareness Training
1-hour live training for non-technical staff โ phishing, social engineering, safe browsing, UPI fraud. Online or on-site delivery. Includes PDF takeaway and assessment quiz.
๐
SIEM Health Check
Audit your existing SIEM setup โ log source coverage gaps, MITRE ATT&CK coverage analysis, alert tuning recommendations, and false positive reduction strategy. Delivered as an executive-ready gap report.
Not sure what you need?
Let's have a 15-minute call. I'll assess your current security posture and recommend exactly what makes sense for your size and budget.