Offensive

  • Penetration Testing
  • Manual & automated exploitation
  • Vulnerability Assessment
  • Red Team Assessments
  • Command & Control (C2) Operations
  • Evasion Techniques
  • Reverse Engineering
  • Vulnerability/Risk communication and reporting

Defensive

  • Incident Handling
  • SOC Operations
  • Digital Forensics and Incident Response (DFIR) Operations
  • Threat Hunting
  • SIEM Operations & Tactical Analysis
  • Log Analysis
  • Active Directory Attack Analysis
  • Network Traffic Analysis
  • Reverse Engineering & Malware Analysis

Purple Team

  • Adversary Emulation
  • Detection Engineering
  • Active Directory Attacks & Defense
  • Threat Modeling
  • Detection Gap Analysis
  • Endpoint Telemetry
  • Network Telemetry
  • Purple Team Exercises
  • Red–Blue Collaboration