Our consultants have experience in delivering on a wide range of projects
Clients & Projects
A Track Record for Delivery
Security Incident Response (IR) Improvement
We measure the maturity of the Security Operation Centre (SOC) capability per industry standards (e.g., NIST, CMMI), and assist in improving the efficiency of Incident Response (IR) process so that you are ahead of evolving cyber threats and potential security breaches.
Application Architecture and Software Security Assessment
We conduct an audit of your application architecture and its security defence. We provide extensive security testing of the web application and conduct Static Application Security Testing (SAST), Dynamic Application Security Testing (DAST), and Software Composition Analysis (SCA). We deliver actionable tasks for secure software development practices.
Security Architecture Assessment and Improvement
Each business and its operating model are unique; hence, its IT/OT architecture differs from others. A one-size-fits-all cyber security solution does not provide an architectural defence. We understand your business and problem first and provide a security architecture and solution that works for you.
Threat Hunting, Threat Intelligence & Breach Investigations
Our threat hunting and cyber threat intelligence service continuously tracks your brand, people, digital assets, and suppliers exposed to the external world, understands the risk, and helps with proactive actionable remediation plans.
Security Improvement and Remediation
Our security improvement and remediation service help security teams rapidly reduce their cyber risk posture by prioritising and fixing security weaknesses without impacting business-as-usual operations. Our improvement plan covers short-term quick fixes, mid-term activities and strategic projects.
Merger & Acquistion (M&A) Security
Our lead security consultant has helped two large confidential clients (mobile operator, pharmaceutical) in security risk management during a large M&A programme. Deliverables include security boundary definition, technical architecture (target state) development, transitional states (artefacts), user access to applications data security management and user/application cutover.
Our lead security consultant has helped a confidential client to define and develop cybersecurity strategy and security management plan to support The European Rail Traffic Management System (ERTMS) programme under the supervision of a cross-industry cybersecurity steering group and senior management team. Work involved developing cybersecurity requirement for ETCS onboard system, risk assessment and security design review of railway systems.
Our lead security consultant has helped a confidential mobile operator to design and deliver 4G/LTE end-to-end security architecture, risk management and security solution design. The project involved a thorough risk assessment of the subscriber radio network, IP core, internet links and corporate environment.
Data Centre Security
Our consultant has helped a large financial services client in delivering secure global data centres from scratch. The project involved the following deliverables:
Migration and consolidation of legacy to new data centres. Supported in vendor selection and testing.
Designed Inter data centre DCI connectivity, private MPLS for optimal traffic engineering and failovers.
Design bespoke low latency trading platform environments across multiple colocations and Data Centres in AMERS, LATAM and EMEA regions.
Design and deployment of secure hybrid cloud architecture
Our large pool of CCIE and JNCIE network consultants have successfully delivered many data centre projects across other industries.
eCommerce Platform Security
Our lead consultant has helped a large European airlines operator in the definition and development of secure commercial digital platform architecture. Technical stack involved an AWS/on-prem (hybrid) cloud-based multi-channel eCommerce platform. Channels include digital (web, mWeb, Mobile Apps), B2B API gateway, airport kiosks, call centre and their online payment systems. Our consultant led security strategy, technical risk management and development of security solution designs of the architectural components.
Our lead consultant has helped a large pharmaceutical client in the development of a security programme plan to achieve ISO27001 accreditation for its IT business unit. The plan incorporates assessment of the current state, gap assessment, assessment of existing inflight security projects, roadmap development (future projects), periodisation of projects (building blocks) and how assurance (incl. KPIs) will be achieved throughout the programme. We have also helped many clients in providing end to end ISO27001 accreditation through our trusted partner network.
IT Service Supplier Audit and Assurance
Our lead consultant has helped a large global pharmaceutical client in reviewing IT service suppliers’ contract and technical deliverables. The project involved technical audit and gap assessment and provide recommendations to senior management. Later on, helped the client by governing the supplier’s technical delivery for 10+ core infrastructure security capabilities.
Chief Technology Officer, Adrix
iCyberDefence really impressed us with how organised they were when it came to getting the managed IT and security services onboarded. As a trusted partner, they drove the team to deliver the services timely with excellent quality
Head of Engineering, Northern Line Extension (NLE), Transport for London
A willingness to understand and appreciate our contextual requirements. The consultant had the ability to communicate technical issues in simple terms. Personable and professional individual
Director of IT Operations, Autolus Therapeutics
iCyberDefence proved to be highly skilled in delivering our manufacturing facility's enterprise architecture, IT/OT infrastructure and security architecture. They provided an invaluable level of support to the complex delivery of a major programme. Consultants had the maturity of thinking, excellent business manner and stakeholder management skills
Chief Executive Officer, Smart ABG
We were very impressed with how iCyberDefence took the time to understand our business operating model. They gave us a clearly defined plan which outlined the processes and methods needed to achieve our project’s objectives. It was vital for us to choose a partner that we could trust and work with as an extension of our internal team
Chief Executive Officer, Suffuse
iCyberDefence proved to be highly professional in delivering their service and provided invaluable support to the complex delivery of a significant programme. The iCyberDefence consultant's maturity of thinking and his great business manner and stakeholder management helped complete programme delivery on time and within the assigned budget