Engagements
Discrete engagements. Lasting outcomes.
What we run
Seven scoped engagements you can start with.
Each one has a defined start, a defined deliverable, and a fixed price. No surprise scope creep. No “we'll see where it goes.”
Penetration Testing
Ethical hacking against your environment. Find the holes before someone else does.
- External network testing
- Internal network testing
- Web application assessment
- Detailed findings + remediation plan
Essential 8 Audit
Independent assessment against the ACSC Essential 8 framework — Australia's cyber resilience baseline.
- Maturity assessment across all eight controls
- Gap analysis vs target maturity level
- Prioritised remediation roadmap
- Board-ready reporting
Security Control Review
Broader than Essential 8 — evaluate your existing security stack against the threats it's meant to address.
- Controls inventory and posture
- Tooling efficacy and coverage gaps
- Vendor consolidation opportunities
- Investment prioritisation
User Awareness & Security Training
Most breaches start with a click. Build the human firewall.
- Phishing simulation campaigns
- Role-based training modules
- Ongoing awareness programme
- Metrics and reporting
Cyber Security Risk Assessment
Identify, rank and quantify the cyber risks specific to your business — not generic best practice.
- Asset and data inventory
- Threat modelling per workload
- Risk register with business impact
- Treatment plan with named owners
Firewall Policy Optimisation
Years of accumulated rules nobody dares touch? We make sense of them — safely.
- Rule-base audit and analysis
- Redundant and shadowed rule removal
- Log review and traffic baselining
- Policy simplification
Wireless Site Surveys
Ekahau-led predictive design or post-installation validation. Wireless that actually works.
- ECSE Design-certified engineers
- Predictive design from floor plans
- On-site validation surveys
- Coverage, capacity and roaming
The onramp
Start small.
Stay close.
These engagements are useful on their own. They're also how most of our long-term partnerships started.
- An Essential 8 audit becomes a managed security relationship.
- A penetration test becomes ongoing monitoring and remediation.
- A wireless survey becomes a managed network refresh.
- A firewall optimisation becomes a Fortinet consolidation across every site.