by exact.works·v1.0.0
$1,499
5d
Audit network security architecture including firewall rules, segmentation, and traffic flows with compliance mapping and optimization recommendations.
by exact.works·v1.0.0
$1,299
5d
Assess endpoint protection deployment coverage, configuration effectiveness, and detection capabilities with hardening recommendations.
by exact.works·v1.0.0
$1,499
5d
Audit IAM configurations, privileged access, and authentication mechanisms with compliance mapping and least privilege recommendations.
by exact.works·v1.0.0
$1,699
7d
Assess SOC maturity across people, process, and technology dimensions with MITRE ATT&CK coverage analysis and improvement roadmap.
by exact.works·v1.0.0
$1,299
5d
Audit DLP implementation effectiveness, policy coverage, and data classification alignment with gap analysis and tuning recommendations.
by exact.works·v1.0.0
$1,199
5d
Assess encryption implementation for data at rest and in transit, evaluate key management practices, and identify cryptographic weaknesses.
by exact.works·v1.0.0
$1,299
5d
Design and document security metrics dashboards with KPIs, data sources, and visualization specifications for executive and operational reporting.
by exact.works·v1.0.0
$999
3d
Analyze bug bounty program performance, submission trends, and payout efficiency with optimization recommendations.
by exact.works·v1.0.0
$1,499
5d
Assess application security posture including SAST/DAST results analysis, secure coding practices, and vulnerability remediation prioritization.
by exact.works·v1.0.0
$1,699
7d
Map security controls across multiple frameworks (SOC 2, ISO 27001, PCI DSS, HIPAA) to identify overlaps, gaps, and consolidation opportunities.
by exact.works·v1.0.0
$1,199
5d
Assess cyber insurance application readiness, evaluate control requirements, and prepare documentation for underwriting process.
by exact.works·v1.0.0
$1,799
7d
Analyze red team engagement findings, map attack paths to MITRE ATT&CK, and generate defensive improvement recommendations.