Security Assessment

Security Assessment

I offer comprehensive verification of your technical and organizational measures through professional red teaming and security assessment. My analyses follow established methods such as the MITRE ATT&CK® Framework and are based on the latest threat scenarios.

My Approach

Red Teaming

  • Realistic attack simulations that mimic real threat actors
  • Not just technical assessment, but holistic evaluation of social and technical vulnerabilities
  • Targeted testing specifically tailored to your infrastructure and business processes
  • Minimal operational disruption through coordinated test periods and clear escalation paths

Security Assessment

  • In-depth analysis of your security controls and processes
  • Vulnerability assessment by risk levels and impact on your business
  • Tailored recommendations for effective risk mitigation
  • Sustainable improvement of your security posture

Service Portfolio

  • Validation of security tools (Firewall, Antivirus, EDR, XDR, SIEM)
  • Scenario-based testing (e.g., stolen devices, compromised servers, phishing attacks)
  • Red Team Operations focusing on specific business objectives
  • Purple Teaming to improve collaboration between attacker and defender teams
  • Social Engineering Assessments to verify employee awareness

Why Validate Security Tools?

This year (2024) alone, several vulnerabilities have been discovered in applications from supposedly secure tools, to name just a few: Palo Alto, Microsoft, BeyondTrust, Okta, Synology, CrowdStrike, and Fortinet. Since security tools are purchased with a security promise, it should also be checked whether they deliver the promised functionality in the respective corporate context.


Please don't hesitate to contact me!