11
UnderDefense Products launched for our clients 4 Security engineers 39 Certified experts 19 Current security projects 6 Publications 28 Real threats here

UnderDefense here threats Real › wp-content › uploads › 2018 › ... · Secure software Development (Python, JavaScript) Machine Learning Amazon/Azure Security ... external

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: UnderDefense here threats Real › wp-content › uploads › 2018 › ... · Secure software Development (Python, JavaScript) Machine Learning Amazon/Azure Security ... external

UnderDefense

Products launched for our clients

4Security

engineers

39Certified experts

19Current

security projects

6Publications28

Real threats here

Page 2: UnderDefense here threats Real › wp-content › uploads › 2018 › ... · Secure software Development (Python, JavaScript) Machine Learning Amazon/Azure Security ... external

Our Security Engineers available for You on Demand

Reverse Engineers

Penetration Tester

IT Security Engineer

Network Security Engineer

Threat Intelligence Analyst

Forensics Expert

Information Security Manager (Virtual CISO)

Security Architect

Compliance Manager

Security Software Engineer

Cloud Security Architect - AWS

SOC Analysts Tier 1,2,3

SecOps

SIEM administrator

Incident Response Analyst

Security Researcher

Risk and Vulnerability Manager

Page 3: UnderDefense here threats Real › wp-content › uploads › 2018 › ... · Secure software Development (Python, JavaScript) Machine Learning Amazon/Azure Security ... external

DEDICATED TEAM MODEL

Cyber Security Specialists in your hands to drive the businessSkilled remote professionals

working just for you

Ability to select, manage and control team members for your project

Direct access to each team member

Flexible contract terms

Higher level of project security control, IP rights protection and confidentiality

Negotiable cost depending on your requirements

No start-up or maintenance costs or taxes

Direct contact

Page 4: UnderDefense here threats Real › wp-content › uploads › 2018 › ... · Secure software Development (Python, JavaScript) Machine Learning Amazon/Azure Security ... external

Technology Stack

● Exploit development/validation● Web Security● API Security● Signature based IDS/IPS● Honeypots● Penetration testing● IoT Security (+ Car Security)● Social Engineering● VoIP security● iOS and Android apps hacking

Attacking skill-set● SIEM● Log analysis● Web and mobile Application Firewall● Secure SDLC● Threat Modelling● Secure Architecture● Data leakage protection● Firmware analysis● Virtual Machine Introspection● Virtualization Technologies

Defensive skill-set● Malware analysis● Reverse engineering● Secure software Development (Python,

JavaScript)● Machine Learning● Amazon/Azure Security● OpenStack● Detect by IP● OpenStack● Firmware analysis

Specific skill-set

BreakersPenetration Testing

Security Audits and AssessmentLoad/Stress/DDoS Testing

Managed Security Services

Incident Forensics and ResponseCloud Security / SecOps

Secure SDLC

Compliance Services

Security Tools adoption/integration

Defenders Builders

Page 5: UnderDefense here threats Real › wp-content › uploads › 2018 › ... · Secure software Development (Python, JavaScript) Machine Learning Amazon/Azure Security ... external

Our Process

1Identify team requirementsWe establish the required skills and optimal size for your team based on your needs

2

3

4

5

6Select internal resources or external candidates based on skillsOur competency managers provide you with the profiles of our experts who can best meet your needs

Optimize team structureWe help you decide on an optimal structure for your team, striking the right balance between cost and expertise

Prepare for ramp-upWe define a plan for project staffing with smooth knowledge transfer, seamless integration, and 100% transparency

Transfer knowledgeWe organize workshops, meetings, and on-site sessions to transfer knowledge

Integrate the teamsOur team seamlessly integrates into your company as our expert accumulate organization-specificand project-specific knowledge

Page 6: UnderDefense here threats Real › wp-content › uploads › 2018 › ... · Secure software Development (Python, JavaScript) Machine Learning Amazon/Azure Security ... external

Benefits of Outsourcing security engineers

KeyAdvantages

Rare Access to security talent pool available in-house and our

associates

Minimize Operational Costs

Focus on core competencies

Increase Productivity

Boost Competitiveness

Enhance Quality

Improve Time-to-Market

Page 7: UnderDefense here threats Real › wp-content › uploads › 2018 › ... · Secure software Development (Python, JavaScript) Machine Learning Amazon/Azure Security ... external

CertificationsPh.D. in Security

Identity & Security

Page 8: UnderDefense here threats Real › wp-content › uploads › 2018 › ... · Secure software Development (Python, JavaScript) Machine Learning Amazon/Azure Security ... external

Recognitions, Awards & Partnerships

Page 9: UnderDefense here threats Real › wp-content › uploads › 2018 › ... · Secure software Development (Python, JavaScript) Machine Learning Amazon/Azure Security ... external

Providing services for other top-notch companies

Page 10: UnderDefense here threats Real › wp-content › uploads › 2018 › ... · Secure software Development (Python, JavaScript) Machine Learning Amazon/Azure Security ... external

Our Locations1. Lviv (Delivery)2. Wroclaw (Delivery)3. New York (Sales)4. Malta (Sales)

Lviv, Ukraine, Eastern EuropeLviv is an acknowledged cultural capital of Western Ukraine and since the early 2000s, and has become one of the top IT hubs in Europe. The IT industry's annual growth rate in the city is averaging 20%, with currently employed workforce totaling 15 000+ specialists. The reason why Lviv’s IT emerged so quickly is that there are two major Western Ukraine’s universities as well as large amount of smaller colleges which produce 3 000+ IT graduates each year. City also stands out as a geographically favorable location, featuring 1-2 hr flight to the main European business centers such as Vienna, Zurich and Munich and 1 hour drive to Poland.

Few facts about IT in Lviv:

5. Munich (Sales)6. San Francisco (Sales)7. Indonesia (Sales)

15000+ professionals work

in IT in Lviv

15% of Ukrainian IT people work in

Lviv

20% predicted annual growth in

the industry

60 out of 1000 working population in Lviv are

employed in ITi

Page 11: UnderDefense here threats Real › wp-content › uploads › 2018 › ... · Secure software Development (Python, JavaScript) Machine Learning Amazon/Azure Security ... external

Thank you for your trust

UkraineLviv Heroiv UPA 77 3rd floor, Lviv, 79014

Tel: +38 063 11 357 66email: [email protected]

Poland Wrocław Rzeźnicza str. 28-31, 50-130

Tel: +48 881 300 889email: [email protected]

Malta Birkirkara 170, Pater House, Psaila St,

BKR 9077, Tel: +356 2759 5000email: [email protected]

USANew York 375 Park Avenue, Suite 2800, NY

Tel: +1 929 999 5101email: [email protected]

Call us now at +1 929 999 5101