Method

How our curated contractors operate

Scope for outcomes → operate like an APT → report, fix, verify. Clear, replayable evidence and durable guardrails.

01
Scope for outcomes
  • Objectives, assets, constraints
  • Rules of engagement and safety
  • Success criteria for exec & eng
02
Operate like an APT
  • Quiet intrusion, privilege, movement
  • Stop when material risk is proven
  • Protect production and customers
03
Report, fix, verify
  • Replayable steps and indicators
  • Fix plan with owners and diffs
  • Retest to validate improvements

Typical engagement timeline (4–6 weeks)

Week 1
Scope & access

Objectives, contacts, access seeds, safe comms, kickoff brief.

Weeks 1–3
Intrusion & movement

Initial access via app/cloud/identity; establish foothold; lateral moves.

Weeks 3–4
Impact proof

Demonstrate business risk with evidence; protect customers and data.

Weeks 4–6
Report & retest

Write-up, replay steps, indicators; guided retest and sign-off.

Who’s involved
  • Engagement lead (primary contact)
  • Operators / researchers (hands-on)
  • Customer IR/SecOps (coordination)
  • Executive sponsor (alignment)
Comms & safety rails
  • Out-of-band channel for sensitive updates
  • No destructive actions without written approval
  • Customer data access minimized and logged
  • Pause/stop word honored immediately

Tooling philosophy

Blend

Human-led with selective automation. We value operator judgment over volume.

Reproduce

Everything material has replay steps and indicators your team can run again.

Minimize

Reduce noise and footprint; protect production and customers.

Next step

Ready to scope an engagement?

Tell us your objectives and constraints. We’ll propose a plan and timeline that fits delivery.