Security operations, audits, and identity engineering for critical infrastructure.
Three decades of cybersecurity practice, distilled into three pillars. We audit, we engineer, we ship products that solve real problems.
Audits, detection engineering, and incident response for organizations that cannot afford to guess.
From SOC 2 readiness to active threat hunting in Microsoft Sentinel, we deliver the full operational stack. Every engagement is led by senior practitioners with hands-on production experience.
Security audits and gap assessments
Full-scope reviews against SOC 2, ISO 27001, NIST CSF, and CIS Controls. Findings prioritized by exposure, not by checklist.
Penetration testing and vulnerability assessment
External, internal, and web application testing. Realistic exploitation, executive-ready reporting, retest included.
SIEM and detection engineering
Microsoft Sentinel and Defender XDR. Custom KQL analytics rules, watchlists, workbooks, and automation that actually fires.
Incident response and threat hunting
Active response support, forensic triage, hypothesis-driven hunts. We have run real incidents under real pressure.
SOC operations and managed detection
Stand up a SOC, mature an existing one, or coordinate with a managed provider. Playbooks, escalation, metrics that matter.
Compliance and risk advisory
Regulatory roadmaps, board-level reporting, and program design. Quebec Law 25, GDPR, HIPAA, PCI-DSS covered end to end.
Frameworks and Standards
Certifications Held
PKI, HSM, smart cards, and the plumbing that holds identity together.
Two decades of identity engineering across federal and enterprise environments. Versasec and Thales credentialed, with deployments serving more than 100,000 users.
PKI and Certificate Authority
ADCS design and deployment, offline root architecture, CP and CPS authoring, migration and key ceremony support.
HSM and Key Management
Thales Luna SA7 and G5 deployments, key migration, partition design, FIPS 140-2 Level 3 operations.
Smart Card and Token Lifecycle
vSEC:CMS architecture and operations at scale. Issuance, renewal, revocation, and helpdesk workflows.
Multi-Factor and CBA
Certificate-based authentication for Entra ID and ADFS. MFA claim engineering, partner federation, conditional access.
Cloud Identity
Entra ID, ADFS, and hybrid identity. SSO federation, conditional access policy design, privileged identity governance.
Credential Lifecycle
End-to-end issuance, rotation, and retirement. Joiner, mover, and leaver flows integrated with HR systems of record.
SecurePFX, secure certificate handoff.
Distribute PFX certificates to partners, vendors, and field devices without ever exposing the password. Self-contained Windows installers, AES-256 encrypted, unlocked by an offline OTP. No cloud dependency, no portal logins, no leaked secrets in email.
Three decades of practice, not three decades of slides.
The tools we actually use.
Not a list of logos. The platforms, frameworks, and tooling we operate in production across our engagements.
SOC and Audit Tooling
- Microsoft Sentinel SIEM
- Defender XDR EDR
- KQL Detection
- Splunk SIEM
- Qualys VM
- Nessus VM
- MITRE ATT&CK Framework
- Burp Suite Pentest
IAM and PKI Platform
- Microsoft ADCS PKI
- Thales Luna HSM HSM
- Versasec vSEC:CMS CMS
- Entra ID IdP
- ADFS Federation
- F5 APM and LTM Access
- SecureAuth MFA
- Smart Card and FIDO2 Tokens
Cloud and Enterprise Integration
- Azure Cloud
- GCP Cloud
- Logic Apps iPaaS
- Workday integration HRIS
- PowerShell and Python Automation
- ARM and Bicep IaC
- IIS ARR and reverse proxy Edge
- REST and SOAP APIs Integration