SERVICES

GoCyber

Making Cybersecurity Accessible

Short-term Contractors

  • Penetration Testing
  • Vulnerability Assesments
  • Risk Management
  • Governance
  • Software/Hardware Services
  • Advisory Services/Training

Revolutionary Model

50% Lower Costs

Fixed Price – Pay On Delivery

  • A revolutionary new cybersecurity services concept.
  • A cybersecurity bid for work marketplace attached to a community of cybersecurity experts. GoCyber is a cybersecurity market network.
  • We post projects on behalf of clients and experts bid on those projects
  • Once an expert is selected the project is managed on our secure workbench.
  • We have over 1200 consultants on the platform and offer an extensive service catalogue.
  • Because we don’t take a margin clients get the price the experts bids.
  • GoCyber is a managed services platform, clients tell us what they want, and we manage the project right to conclusion.
GOCYBER

Features

  • APAC team of over 1200 verified cybersecurity contingent workers.
  • All projects are managed for the client.
  • Milestone creation.
  • Project wizards.
  • Client workspace.
  • Expert workspace.
  • Project disputes are managed.
  • Detailed background checks.
  • NIST NICE compatible.
  • Expert payments managed by GoCyber.
  • Consolidated billing.
  • No margin – flat fees for placement.
  • Project risk acceptance.
  • Experts are not charged a fee.
  • All artefacts are created: - NDAs - MSAs - SOWs
GOCYBER

Expert Capability

21%
Vulnerability and Penetration Testing
14%
Application Security & DevSecOps
18%
It Security Audit
12%
Incident Management
5%
Cybersecurity Engineering
6%
ISO27001 Programs
5%
Cloud Security
5%
Cybersecurity Architecture
5%
Cybersecurity Project Management
4%
vCISO
GOCYBER

Consulting Services Catalogue

Cloudflare Firewalls - Configuration & management.
  • Name brand hardware vendors
  • Cloud service firewalls
  • Linux based iptables firewalls
Endpoint Security - Implementation configuration and management.
  • Symantec
  • McAfee
  • Crowdstrike
SIEM - Implementation & management.
  • Splunk
  • Logrythm
  • AlienVault USM
  • Qradar
IDS/IPS - Implementation, configuration and management.
  • Name brand software/hardware vendors
Unified Threat Management - Implementation, configuration and management
  • Name brand software/hardware vendors
Endpoint Detection and Response - Implementation, configuration & management.
  • Name brand software/hardware vendors
Web Application Firewalls – Implementation, configuration & management.
  • Name brand software/hardware vendors
Cloud Security - Implementation, configuration & management
  • Name brand IaaS, PaaS vendors
Application Security Tools - Implementation, configuration & management.
  • Name brand software/hardware vendors
MDM and Mobile Security -Implementation, configuration & management
  • Name brand software/hardware vendors
Identity & Access management –Implementation, configuration & management.
  • Name brand software/hardware vendors
Application Security DevSecOps
  • Program design
  • Extreme coding
  • CI/CD Appsec Pipelines
  • Application testing SAST/DAST
  • Opensource code reviews
  • Code review Java, PHP
  • 3rd party vendor review and rating
Vulnerability and Penetration Testing ( VAPT )
  • Regulatory requirements, TRM, OJK
  • Post implementation testing
  • Quarterly testing
  • Continuous vulnerability assessments
Standards Readiness and Implementation
  • ISO2001
  • NIST CSF
  • SOC2
  • PCI-DSS
  • HIPAA
Risk Management
  • Program implementation NIST RMF
  • Program assessment
  • Individual risk assessment
Security Awareness Programs
  • Phishing
  • SMShing
Cybersecurity governance
  • Programs
  • Assessments
  • Board training
CaaS
  • CISO as a service
Cybersecurity Advisory
  • Short term
  • Medium Term
  • Contract
Cybersecurity supply chain assessments
Security Operations Center Staffing
  • L2, L3 AND L4 activities
Threat Intelligence
  • Threat analytics
  • Malware labs
Vendor RFI/RFP Management
  • RFI/RFP advisory
  • Vendor Price advisory
Container Security
  • Docker
  • Kubernetes