Staffing Services UnderDefense your source of experienced professionals to solve security staffing challenges today

Similar documents
to Enhance Your Cyber Security Needs

OPERATIONS CENTER. Keep your client s data safe and business going & growing with SOC continuous protection

locuz.com SOC Services

Security Monitoring Engineer / (NY or NC) Director, Information Security. New York, NY or Winston-Salem, NC. Location:

CYBER RESILIENCE & INCIDENT RESPONSE

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

Continuous protection to reduce risk and maintain production availability

भ रत य ररज़र व ब क. Setting up and Operationalising Cyber Security Operation Centre (C-SOC)

Securing Your Digital Transformation

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

National Cyber Security Operations Center (N-CSOC) Stakeholders' Conference

White Paper. How to Write an MSSP RFP

NEXT GENERATION SECURITY OPERATIONS CENTER

INTELLIGENCE DRIVEN GRC FOR SECURITY

Sage Data Security Services Directory

TRUE SECURITY-AS-A-SERVICE

Security Monitoring. Managed Vulnerability Services. Managed Endpoint Protection. Platform. Platform Managed Endpoint Detection and Response

DATA SHEET RSA NETWITNESS PLATFORM PROFESSIONAL SERVICES ACCELERATE TIME-TO-VALUE & MAXIMIZE ROI

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

SOLUTION BRIEF Virtual CISO

CYBER SOLUTIONS & THREAT INTELLIGENCE

Boston Chapter AGA 2018 Regional Professional Development Conference Cyber Security MAY 2018

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

AKAMAI CLOUD SECURITY SOLUTIONS

Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK.

Incident Response Services to Help You Prepare for and Quickly Respond to Security Incidents

Cybersecurity What Companies are Doing & How to Evaluate. Miguel Romero - NAIC David Gunkel & Dan Ford Rook Security

What It Takes to be a CISO in 2017

EFFECTIVELY TARGETING ADVANCED THREATS. Terry Sangha Sales Engineer at Trustwave

Cybersecurity Risk Mitigation: Protect Your Member Data. Introduction

Incident Response Services

Incident Response Lessons From the Front Lines. Session 276, March 8, 2018 Nolan Garrett, CISO, Children s Hospital Los Angeles

Protecting your data. EY s approach to data privacy and information security

Service. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution

Background FAST FACTS

MATURE YOUR CYBER DEFENSE OPERATIONS with Accenture s SIEM Transformation Services

IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats.

CA Security Management

Click to edit Master title style. DIY vs. Managed SIEM

Cyber Incident Response. Prepare for the inevitable. Respond to evolving threats. Recover rapidly. Cyber Incident Response

Mapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective

Reinvent Your 2013 Security Management Strategy

Security. Made Smarter.

Security. Protect your business from security threats with Pearl Technology. The Connection That Matters Most

How to Write an MSSP RFP. White Paper

Cyber Security Program

GDPR: An Opportunity to Transform Your Security Operations

THE SIX ESSENTIAL CAPABILITIES OF AN ANALYTICS-DRIVEN SIEM

Google Cloud & the General Data Protection Regulation (GDPR)

CCISO Blueprint v1. EC-Council

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

Symantec Security Monitoring Services

BHConsulting. Your trusted cybersecurity partner

RFP/RFI Questions for Managed Security Services. Sample MSSP RFP Template

New York Cybersecurity. New York Cybersecurity. Requirements for Financial Services Companies (23NYCRR 500) Solution Brief

DIGITAL TRUST Making digital work by making digital secure

Cyber Resilience. Think18. Felicity March IBM Corporation

RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE.

RSA Solution Brief. Managing Risk Within Advanced Security Operations. RSA Solution Brief

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION

Are we breached? Deloitte's Cyber Threat Hunting

LTI Security Services. Intelligent & integrated Approach to Cyber & Digital Security

HOSTED SECURITY SERVICES

CYBER SECURITY TAILORED FOR BUSINESS SUCCESS

SIEMLESS THREAT MANAGEMENT

Forensics and Active Protection

IBM Security Systems. IBM X-Force 2012 & CISO Survey. Cyber Security Threat Landscape IBM Corporation IBM Corporation

Security Operations & Analytics Services

Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services

Vulnerability Assessments and Penetration Testing

FOR FINANCIAL SERVICES ORGANIZATIONS

Managed Endpoint Defense

Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS

Incorporating Hunt Teams To Defend Your Enterprise

Position Title: IT Security Specialist

Key Findings from the Global State of Information Security Survey 2017 Indonesian Insights

DEVELOP YOUR TAILORED CYBERSECURITY ROADMAP

Business continuity management and cyber resiliency

Cybersecurity The Evolving Landscape

Security Awareness Training Courses

BHConsulting. Your trusted cybersecurity partner

SOLUTION BRIEF RSA NETWITNESS SUITE 3X THE IMPACT WITH YOUR EXISTING SECURITY TEAM

Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services

EXPERT SERVICES FOR IoT CYBERSECURITY AND RISK MANAGEMENT. An Insight Cyber White Paper. Copyright Insight Cyber All rights reserved.

SECURITY OPERATIONS CENTER BUY BUILD BUY. vs. Which Solution is Right for You?

Cybersecurity Session IIA Conference 2018

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE

Best Practices in Securing a Multicloud World

The Resilient Incident Response Platform

Bringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016

Security Incident Management in Microsoft Dynamics 365

An ICS Whitepaper Choosing the Right Security Assessment

Predictive Insight, Automation and Expertise Drive Added Value for Managed Services

Cyber Security. Building and assuring defence in depth

SECURITY AUTOMATION BEST PRACTICES. A Guide on Making Your Security Team Successful with Automation SECURITY AUTOMATION BEST PRACTICES - 1

Cyber Security For Business

A Comprehensive Guide to Remote Managed IT Security for Higher Education

Cyber Security Incident Response Fighting Fire with Fire

SRM Service Guide. Smart Security. Smart Compliance. Service Guide

The Most Comprehensive Suite of Security Services and Solutions in the Market

Transcription:

Security Staffing Services UnderDefense your source of experienced professionals to solve security staffing challenges today Staff Augmentation, Executive Staffing, Flex Staffing

Achieving our main goal to make your business + + + even more successful. BEST SECURITY TALENTS LOWER COSTS COMPETITIVE ADVANTAGE MARCE LEADERSHIP UnderDefense - a qualified resource provider for your business demands. UnderDefense Provides Every Level s Resources UnderDefense made a commitment to help businesses plan, build, and run successful high quality Cyber Security Programs. Our defense and offense teams, talented and professional cyber security experts partner with enterprise-class organizations to provide a full package of Cyber Security services and solutions that help and make businesses, governments and other institutions to operate much more successfully nowadays, when the world is under every minute attack. In this overall connected world UnderDefense s unique approach, dedicated professional teams, depth and breadth of full Cyber Security assessments and other offerings help organizations to rebuild strength and confidence as consumers, employees and investors. Today, staffing quality security personnel presents multiple challenges, such as: Experienced, high quality resources are rare and hard to find Long-term investment is a big commitment To run existing programs, organizations are in need of the right level of expertise. With security professionals in high demand, IT positions have become a revolving door. in our offshore locations: - Security Executives - Program Managers and Architects - Engineers and Analysts UnderDefense has the right remote resources to help you get the job done no matter what your requirements are - either project-based assistance with planning and implementation, a set of skilled hands to assist with daily operation of your security tasks or executive-level assistance and advising - WE ARE ON IT. 2 3

UnderDefense Staffing Services At UnderDefense we take several steps at a time to make you feel more Confident, Secure and Compliant than ever, because here we can afford that. Our goal is to make you even more successful. UnderDefense has earned rich and successful history based on trust. We have developed extensive expertise in cyber security and our staff of security professionals with more than 15 years of hands-on experience continuously and productively helping small and big businesses safeguard their network and applications. We don t just DO - we Think, Innovate, Creating new security capabilities to combat tomorrow s security threats today. UnderDefense can provide you with remote CISO exclusives, brilliant security minds, who are continuously learning and innovating. Basing on our current goal by making you more successful - we always put our client before us and here at UnderDefense we attract and keep some of the most talented security experts in the industry to make you achieving that main goal faster, more effectively and with bright vision of the future. At UnderDefense we try our best to satisfy your staffing needs whatever it takes. We have a wide range of available staff that will bring you several steps closer to achieve the main goal. We offer wise minds with skilled hands to assist with specific programs, cyber security experts to provide guidance and expertise for project work, UD qualified insight providers. Key Questions for our client: - Are there any critical tasks that your existing team can t perform because of the lack of resources or qualification? - Do you need help to assess and update your overall security program, controls, compliance and understand how to better utilize your current team? - Would it be much easier to achieve your main goal if you had additional remote much more affordable professional security help in a really quick term? - Are you looking for a remote team that will act as a force multiplier for your existing security program and will let you focus on your core goal. CISO on Demand Executive Security Leadership Service There will always be a need of an executive function individual, who will include a FULL PACKAGE - business sharpness and acuity, security expertise, deep technology and process experience. As long as you find that one perfect match - that person could add a lot of value to your company by strategically executing and performing cyber security programs. We can certainly help you to deal with difficulties of defining and looking for that one perfect CISO fit, you must know - turning a security project into a high demanded program is possible with UnderDefense. At UnderDefense, we position ourselves as a trusted experienced advisor to the businesses of all sizes, where we combine security programs and business priorities, like contractual requirements and regulatory requirements. The cards are yours - you receive an access to our team of executive-level security leaders, who have built some of the largest security programs for Fortune 1000 companies; instruction and guidance on how to raise your current security strategy to a more important and impressive level from our experienced Cyber Security professionals. 4 5

Staff Expertise Security Architect Compliance Expert Program Manager Project Manager Security Manager Subject Matter Expert For businesses and organizations that are looking for an external experienced cyber security team, who can augment your in-house expertise with security skilled individuals, we have a solution for you. UnderDefense Cyber Security Cross-Expertise Variety of Experienced Security Staff to Assist: Our Staff Augmentation Service will provide you with experienced and qualified security expert for your current security business project. Our security professionals eager to meet your specific needs, to bring more value to your enterprise, cut costs and time-to-market, help you achieve your goals and aims in a triple speed, operate effectively and efficiently accelerating the high quality of your every and ongoing projects. Our cyber security professionals are self-managed, communicative, easy going and very opened, require no training and minimal supervision. Holding our staff augmentation resources also helps you save lots of money and resources by avoiding the cost and time associated with training internal staff or investing in skill development, because at UnderDefense we do it continuously so you don t have to. Questioning yourself WHY US? Because UnderDefense owns certified experts with more than 15+ years of hands-on experience and expertise in security and risk consulting, identity and access management, IT infrastructure and advanced security research, has as well unique experience optimizing enterprise security, technology investments, helps to quickly achieve business goals. UnderDefense helps organizations around the globe increase productivity, accelerate implementation and meet their objectives with the rich performance of their security expertise, research capabilities and proven methodologies. UnderDefense Staffing Services BENEFITS: - Certified Cyber Security Specialists in your hands to drive the business - No need of investment in trainings and skilling up the on-site team - we got it all - No day-to-day disruption while meeting project timelines - High quality and speed in management and development - Cut costs and time-to-market with us 6 7

UnderDefense Cyber Security Analysts and Engineers Provider UnderDefense designed Staffing program with all the needs our client has in mind - from your projects that require specialized application skills to the skills that don t exist or can t be leveraged internally. WE ARE ON IT as usual. UnderDefense s Staffing gives organizations the right and needed level of operational cyber security assistance to perform custom tasks and answer to certain required project needs of the client. Organizations are then allowed to access the qualified individuals for the following roles: - Application Security Engineer - Security Consultant - Incident Handling Analyst - SOC/SIEM Analyst - Identity and Access Management Analyst - Risk and Compliance Analyst - Vulnerability Analyst - Forensics Analyst - Threat Intelligence Analyst - Computer Network Defense Analyst - Reverse Engineering and Malware analyst - Penetration Tester - Network Security Engineer All of these resources own certain unique skills and abilities to help with program operation. Every specifically skilled member of the Staffing program can clearly communicate technical details of their activities and clients systems verbally and in writing. They have expertise in their specific skills area, are aware of things and have an ability to make quick decisions, are able to work individually with occasional supervision, as part of a larger team and to interface with peers, clients and executives. Our Staffing Program Advantages: - Time flexibility to achieve client s goals; - Brilliant resources to meet deadlines; - Remote Experts on demand that are a part of a team; - Experienced and certified remote analysts with additional specific skills that are not available in-house; Wise minds who manage themselves. Our Staffing Program helps businesses achieve their security program goals with minimal investment of money, time and effort. 8 9

vм Staffing UnderDefense s qualified and experienced team is here to help you deal with challenging staffing needs while protecting the bottom line as well as assist you with your day-to-day program and project requirements. Application Security Analyst Our Application security analysts are individuals who possess the skills to assist with technical application level vulnerability identification and analysis, using industry accepted tools. They retain the ability to support and build up on existing application security assessment programs. - Application security analyst directed by your internal team to assist with day-to- day tasks. - Ability to run your existing application assessment tools. - Assist with execution of de ned processes. - Track assessment and remediation activities. SOC Analyst Security Operations Center analyst who helps coordinate and report on cyber incidents, performs during crisis situations and contingency operations, which may necessitate extended hours of work. - Responsible individual in a 24x7 Security Operation Center (SOC) environment - Analysis and trending of security log data from a large number of heterogeneous security devices. - Incident Response support when analysis confirm actionable incident. - Threat and vulnerability analysis as well as security advisory services. - Analysis and responses to previously undisclosed software and hardware vulnerabilities. Incident Response Analyst Our Incident handling analysts specialize in monitoring, analyzing security logs from multiple sources, and investigating Cyber Security incidents. They are trained to develop action plans to remedy and prevent risks. - Quick responses to computer security incidents according to the cyber security incident response plan. - Guidance to first responders for handling information security incidents. - Prioritizing and classifying incidents. - Investigation findings to relevant stakeholders to help improve information security posture. - Validation and maintenance of incident response plan and processes to address potential threat. - Compiling and analyze data for management reporting and metrics. Risk and Compliance Analyst Risk and compliance analyst who owns the skills to assist with general information security program operations and compliance initiatives. - Risk and compliance analyst directed by your internal team to assist with day-today tasks. - Assist in day-to-day operations of process within common GRC platforms. - Able to read, understand and help translate compliance definitions for business use. - Assist with execution of defined processes. - Track risk issues and remediation activities. Vulnerability Analyst OVERALL DESCRIPTION: Vulnerability analyst who possesses the skills to assist with technical and system level vulnerability identification and analysis, using industry accepted tools. Ability to support existing vulnerability assessment programs. - Vulnerability analyst directed by your internal team to assist with day-today tasks. - Run vulnerability scanner(s). - Review and provide high level validation (false positives). - Disseminate vulnerabilities to SMEs for remediation. - Assist with execution of defined processes. - Track assessment and remediation activities. Threat Intelligence Analyst OVERALL DESCRIPTION: threat intelligence analyst who helps identify, manage, monitor, and communicate the information security risks associated with inherent and residual threats that may result in harm or disruption to the company. - Help to define, ratify, maintain and improve the Threat Intelligence program. - Identification and tracking malicious infrastructure. - Proactive research of relevant threats. - Support of continuous development/integration of tools to store, exchange, and analyse threat and incident data. - Prior experience with SIEM tools and Splunk. - Strong analytical skills. Identity and Access Management Analyst OVERALL DESCRIPTION: identity and access management engineer who possesses the skills to assist with IAM technology support and operation. - IAM analyst directed by your internal team to assist with day-to-day tasks. - Assist in daily operations of IAM technologies, including post production support. - Provide patching, upgrade support and regression testing of IAM technologies. - Provide system con guration functions. - Assist with execution of de ned processes. - Track IAM technology operational issues and remediation activities. Security Intelligence Analyst OVERALL DESCRIPTION: security intelligence analyst who assists with technical and system level alerts and potential malware identi cation and analysis using industry accepted tools. - Monitor, review and investigate alerts and support existing event review, escalation and remediation processes. - Actively investigate and stay on top of the latest security vulnerabilities, advisories and incidents. - Anomalies, non-compliant systems and other observed events identification. - Assist with execution of de ned processes for event review and incident response. Information Security Analyst OVERALL DESCRIPTION: Information security analyst who plans and carries out security measures to protect an organization s computer networks and systems. - Organization s networks monitoring for security breaches. - Violation investigations. - Firewalls and data encryption programs installation and usage to protect sensitive information. - Reports preparations that document security breaches and the extent of the damage caused by the breaches. - Penetration testing conduction. Forensics Analyst OVERALL DESCRIPTION: Forensics analyst who collects information from digital devices as part of legal investigations, combines computer science background with forensic skills to recover information from computers and storage devices and responsible for assisting law enforcement officers with cyber crimes and to retrieve evidence. - Important data recovery that have been deleted, damaged or otherwise manipulated - Expertise in a corporate setting to protect computers from infiltration. - Computer broke into determination or lost files recovery. - Help detectives and other officials analyze data and evaluate its relevance to the case under investigation. - Expertise in hacking and intrusion techniques and prior experience with security testing and computer system diagnostics. 10 11

We at UnderDefense are dedicated to supporting organizations around the world in planning, building, managing, and running successful security operations programs, meeting and maintaining compliancy regulations and exceeding organizations abilities to run their businesses securely and confidently. Our team of talented and professional cyber security experts partner with enterprise-class organizations to provide a full package of Cyber Security services and solutions including Security Assessments, Compliance Solutions, Product Advisory Services, Threat and Vulnerability management, Incident Response management, Network and Security architecture and implementation, and much more. We don t just do; we think, innovate, and create new security capabilities to combat tomorrow s threats today. USA New York 375 Park Avenue, Suite 2800, NY Tel: +1.929.999.5101 email: help@underdefense.com Poland (EU) Wrocław Rzeźnicza str. 28-31, 50-130 Tel:+48 792-229-273 email: help@underdefense.com Ukraine Lviv Heroiv UPA 73 k.38, Lviv, 79014 Tel: +38 063-11-357-66 email: help@underdefense.com