Services
Seven engagements. One consultant.
Every engagement below is defined by a decision you are trying to make, not by a methodology or a toolset. Start with the problem; we'll talk about the approach on the call.
Penetration testing
You have a web application, an internal network, a cloud tenancy, or a mobile app, and you need an honest, actionable view of what an attacker could do to it. Not a compliance tick; a technical report you can hand to the team who will fix it.
- A typical engagement
- Scope is defined in writing against the specific asset. Most pentests run for one to three weeks of active testing plus a week of reporting. Findings are surfaced daily on a shared channel so critical issues can be fixed in flight; the final report groups findings by root cause rather than by page number.
- Deliverables
-
- Executive summary (one page)
- Technical findings report with reproducer steps
- Remediation guidance prioritised by exploitability, not CVSS alone
- Retest of fixed issues within 60 days, included
- Typical duration
- Two to five weeks end to end, depending on scope.
- When to choose this
- You know which asset matters and you need an independent technical view of its security posture, fast and without ceremony.
Red team & adversary emulation
You have mature defences and want to know how they hold up against an adversary already inside your perimeter. Assumed breach, objective-driven, measured against both your preventive and detective controls.
- A typical engagement
- Starts with an intent-setting session: who are we emulating, what does 'success' look like, and what do we do if the blue team spots us. Usually a four-to-eight-week operation from initial foothold to documented impact, with deliberate pause points so your SOC can learn alongside the activity rather than only from the after-action report.
- Deliverables
-
- Pre-engagement scoping document and rules of engagement
- Weekly written status during active phases
- Full kill-chain narrative with timestamped artefacts
- Sigma / KQL / Splunk detection rules for each technique used
- Joint debrief with the blue team
- Typical duration
- Four to eight weeks.
- When to choose this
- Your security programme is past the basics and you want to know how it performs against a real adversary profile, not a checklist.
Security architecture review
You are about to make a large design decision (a new cloud region, an identity consolidation, a zero-trust rollout) and you want a second pair of eyes before the money is committed. Or you inherited an environment and need an honest view of where the weak joints are.
- A typical engagement
- Document review plus two to four working sessions with the engineers responsible. I write against what you actually have, not against a reference architecture. The deliverable is a short, opinionated report, what is solid, what is brittle, what would I change, and in what order.
- Deliverables
-
- Written architecture review (20–40 pages)
- Prioritised remediation backlog
- Target-state diagram (if useful; not by default)
- One board-level summary
- Typical duration
- Two to four weeks.
- When to choose this
- You value an opinion more than a framework, and you want someone to commit to a view in writing.
vCISO / interim ISO
You need security leadership, someone who will own the risk register, talk to the board, run the supplier assurance process, and make sensible decisions with incomplete information, but your organisation isn't yet ready for a full-time hire.
- A typical engagement
- Typically one to two days a week on retainer, with clearly defined responsibilities written into the contract. Monthly board reporting, quarterly risk reviews, supplier due-diligence, and incident-response coordination. I work with whatever tooling and process you have; I will not sell you anything.
- Deliverables
-
- Monthly written report to the board
- Maintained risk register
- Incident response on-call during engagement
- Security programme roadmap, reviewed quarterly
- Typical duration
- Six to twelve months, occasionally longer, with notice either way.
- When to choose this
- You need continuity and judgement more than you need a specialist deliverable. Good fit for series-B/C companies, family businesses, and organisations between CISOs.
NIS2 / Cyberbeveiligingswet readiness
The Dutch Cyberbeveiligingswet applies to you. You need to know, honestly, where you stand, and what a realistic twelve-month path to adequacy looks like, sequenced by risk rather than by checklist.
- A typical engagement
- Three weeks. Two days on site talking to the people who actually run things; a gap map against article 21 and 23; a prioritised twelve-month roadmap tied to budget. Deliverables are written in plain Dutch and English, for boards and IT managers, not for lawyers.
- Deliverables
-
- Scope confirmation memo
- Gap assessment across the ten NIS2 measures
- Twelve-month roadmap, quarter-by-quarter, tied to budget
- Board-level summary (Dutch and English)
- Typical duration
- Three weeks.
- When to choose this
- You know or suspect you are in scope, and you want a credible starting position before a supervisor calls or your insurer asks.
SOC design & build consultancy
You are standing up an in-house security operations capability, or rethinking one that has grown unruly. You want help designing it with a view on the next three years, not the next quarter's tool renewal.
- A typical engagement
- Advisory, not build-out. I work with your team on detection coverage, tool rationalisation, staffing model, on-call, shift structure, and the handful of decisions that quietly determine whether a SOC is useful or expensive theatre. I don't resell products and I take no kickbacks.
- Deliverables
-
- Target operating model document
- Detection coverage map against MITRE ATT&CK
- Tool rationalisation recommendation with vendor-neutral reasoning
- Staffing and on-call proposal
- Typical duration
- Four to eight weeks.
- When to choose this
- You are making or re-making a multi-year investment and want an independent view before committing.
Incident response retainer
You want a named responder on call, familiar with your environment, who will pick up at 2am on a Sunday and be useful within the first thirty minutes, not spend the first three days getting access.
- A typical engagement
- A modest monthly retainer that covers onboarding (environment access, runbook review, tabletop once a year), guaranteed response-time SLAs, and a pre-agreed hourly rate for the incident work itself. Retainer fees are credited against any incident work billed in the same year.
- Deliverables
-
- Retainer agreement with named SLAs
- Access and tooling validated during onboarding
- Annual tabletop exercise
- During an incident: coordination, containment guidance, and written findings
- Typical duration
- Twelve-month minimum term, renewable.
- When to choose this
- You cannot justify a dedicated IR team, but an incident is not a hypothetical.
Not sure which fits?
A 30-minute call costs nothing and usually saves an expensive wrong turn. If I am not the right consultant for your situation, I will tell you that too, and if I can, I'll point you at someone who is.