Mulligan Security
Description
We are a group of expert cybersecurity consultants, totaling more than 30 years of experience in the field.
We offer pentesting, governance, risk and compliance as well as virtual CISO services.
We also offer OPSEC consulting for individuals and organizations as well as security-oriented programming.
Find out more and read on what we're passionate about here: http://msec2nnqtbwh5c5yxpiswzwnqperok5k33udj7t6wmqcleu3ifj34sqd.onion/
Category: Consulting
Tags: consulting, cybersecurity, hacking, pentest, GRC, risk, compliance, CISO, OPSEC, dark web, programming
Published on: December 15, 2024
Views: 24
Legal Notice: Buyers and sellers are responsible for complying with all applicable laws in their jurisdictions. XmrBazaar does not verify legality and assumes no liability. Peer-to-peer cash-for-crypto trades are permitted if not conducted as a business and are compliant with local laws; otherwise, sellers must hold any required licenses or registrations. Listings involving fraud, violence, child exploitation, or other clearly illegal goods or services are strictly prohibited and will be removed once identified. Users are encouraged to report unlawful listings.
About the trader
We are a group of senior cybersecurity consultants looking to put our skills to use outside of our 9 to 5. We currently hold positions as CISOs, cybersecurity consultants and GRC specialists in major corporations in our respective countries.
5 years experience in cybersecurity and a current employer with at least 500 employees are our group requirements.
http://msec2nnqtbwh5c5yxpiswzwnqperok5k33udj7t6wmqcleu3ifj34sqd.onion
https://simplex.chat/contact#/?v=2-7&smp=smp%3A%2F%2FiZJOs1BYKxD2nEndBtacHlBP-bNKv3gywICYPZZjXXE%3D%40chatnedvznvcnsovrm3e6jrgt6pkpai5i3rgslrrxlnv352ardboebid.onion%2FtT5R0tQWBzJPAkjvH-wai4PnpfTor89R%23%2F%3Fv%3D1-3%26dh%3DMCowBQYDK2VuAyEA_7oNMJAjBrt210CSc2LEIZJh5BFizPx7JUYFCmj8p1k%253D
-----BEGIN PGP PUBLIC KEY BLOCK----- mDMEAAAAABYJKwYBBAHaRw8BAQdAZni1lbaDX+AzLw2jE3IvwaX0XD09LEVbWEhH wwEX1Pm0Hk11bGxpZ2FuU2VjdXJpdHlAeG1yYmF6YWFyLmNvbYiUBBMWCgA8FiEE sVKstOKVblLE/aquxtuKqu644XAFAgAAAAACGwMFCwkIBwIDIgIBBhUKCQgLAgQW AgMBAh4HAheAAAoJEMbbiqruuOFwDjUA/jCpUoLGbrBVt+9f4JdgGpS1RmvtK+sF 6ws4FKkg7Sd3AQDWkaKBOtc2rPu52tRn6jf6rKf3rpBxIUhNFaEALsRmALg4BAAA AAASCisGAQQBl1UBBQEBB0CwvSFMhB1u8ilohj2aQIP+VdqW0fbRGwMQHCEdPcZz eAMBCAeIeAQYFgoAIBYhBLFSrLTilW5SxP2qrsbbiqruuOFwBQIAAAAAAhsMAAoJ EMbbiqruuOFwU28BAJEYx34dtTPkOLyXPOHdM7sESmOB0A3e0SDgUwF3PqH0AP4g f4dFmYsQUn5iABZSH5W2ocnE1XKNiWu8DOZHetIYAQ== =IsHv -----END PGP PUBLIC KEY BLOCK-----
Because we offer the end to end infra that allows the customer to see what we are doing.
You setup a jumpbox we use and at every second you see everything that's going on and can pull the plug if you feel like it.
Furthermore, we don't pentest against production systems as a rule.
Before the pentest the scoping is pretty standard (what you would see on the open market with a quote, perimeter, ROE talk) so nothing really exotic.