sneeKneT

Engagements

Discrete engagements. Lasting outcomes.

Fixed-scope, expert-led projects with clear deliverables. Many start as a one-off audit or assessment — and become the foundation of a longer relationship.

What we run

Seven scoped engagements you can start with.

Each one has a defined start, a defined deliverable, and a fixed price. No surprise scope creep. No “we'll see where it goes.”

  • Penetration Testing

    Ethical hacking against your environment. Find the holes before someone else does.

    • External network testing
    • Internal network testing
    • Web application assessment
    • Detailed findings + remediation plan
  • Essential 8 Audit

    Independent assessment against the ACSC Essential 8 framework — Australia's cyber resilience baseline.

    • Maturity assessment across all eight controls
    • Gap analysis vs target maturity level
    • Prioritised remediation roadmap
    • Board-ready reporting
  • Security Control Review

    Broader than Essential 8 — evaluate your existing security stack against the threats it's meant to address.

    • Controls inventory and posture
    • Tooling efficacy and coverage gaps
    • Vendor consolidation opportunities
    • Investment prioritisation
  • User Awareness & Security Training

    Most breaches start with a click. Build the human firewall.

    • Phishing simulation campaigns
    • Role-based training modules
    • Ongoing awareness programme
    • Metrics and reporting
  • Cyber Security Risk Assessment

    Identify, rank and quantify the cyber risks specific to your business — not generic best practice.

    • Asset and data inventory
    • Threat modelling per workload
    • Risk register with business impact
    • Treatment plan with named owners
  • Firewall Policy Optimisation

    Years of accumulated rules nobody dares touch? We make sense of them — safely.

    • Rule-base audit and analysis
    • Redundant and shadowed rule removal
    • Log review and traffic baselining
    • Policy simplification
  • Wireless Site Surveys

    Ekahau-led predictive design or post-installation validation. Wireless that actually works.

    • ECSE Design-certified engineers
    • Predictive design from floor plans
    • On-site validation surveys
    • Coverage, capacity and roaming

The onramp

Start small.
Stay close.

These engagements are useful on their own. They're also how most of our long-term partnerships started.

  • An Essential 8 audit becomes a managed security relationship.
  • A penetration test becomes ongoing monitoring and remediation.
  • A wireless survey becomes a managed network refresh.
  • A firewall optimisation becomes a Fortinet consolidation across every site.

Pick a starting point

Not sure which engagement fits? We'll help you scope.

Start a conversation