Skip to content
NED SERVICES GROUP
SUPPORT
RESOURCES
X
VULNERABILITY TESTING
GOVERNANCE & MITIGATION
IT OPERATIONS
DEVELOPMENT & REMEDIATION
X
HOME
ABOUT
VULNERABILITY TESTING
Penetration Testing
Network-layer Vulnerability Assessments and Scanning – Internal & External
Cloud Infrastructure Vulnerability Tests: Azure, AWS
Real-time Change and Vulnerability Detection
Wireless Vulnerability Testing
Infiltration and Exfiltration Testing
Dynamic Application Scanning Testing (DAST)
Application Vulnerability Testing: Web, iOS, Android
Application Security Pipeline Creation, Execution, and Management
Social Engineering: Phishing/Vishing/ SMSing
GOVERNANCE & MITIGATION
Virtual CISO, Director of Information Security, InfoSec Advisership
Fractional Privacy Officer
Policy Review, Improvement, Creation
Policy Set Management and Curation
Ad-hoc Security Consulting and Concierge Support
SOC2 Readiness
Validated Compliance Self-Assessments: NIST 800-171, NIST CSF, ISO, PCI, HITRUST, HIPAA, Customized, and others
Operational Security Risk Assessments
Evidence Collection and Validation
Third Party Vendor Risk Management
Gap Remediation Management
Project Management – cybersecurity and general IT initiatives
Active Directory Audits
Encryption Best Practices
IT OPERATIONS
Fractional IT Director
Deep & Dark Web Reconnaissance & Monitoring
Key Distribution, Stewardship and Support
IT Budgeting & Strategy
IT Spend Monitoring & Spend Analysis
Ticketing & Documentation
Inventory Management
Internet Domain Curation
Domain Name Service Management
Email Management
Personnel Onboarding/Role Changes/Offboarding
Monitoring & Alerting
Cloud Management
Engineering/Design
Product Infrastructure Engineering
Information Security Integration
Vulnerability Management
Firewall Rule Reviews
DEVELOPMENT & REMEDIATION
Requirement gathering and analysis
Design and prototyping
Data Analysis & Modeling
Data Analysis & Modeling
Re-factoring Existing Code
QA and Testing
API Development
Database Development
Web Application Development
Mobile Application Development
Cloud Development
Serverless Development
DevOps & CI/CD Creation or Improvement
Automated Testing
Vulnerability Remediation
Role and Group Authorization Design
Deployment and Migration Planning and Execution
Feature Improvement and Enhancement Assistance
Application Project Management
Ongoing Maintenance and Support
CONTACT
X
CONTACT US
Linkedin
PROTECT
Scroll to Top