A specialist security practice for regulated workloads.
Seven aspects, one operating discipline. From SOC build-out and detection engineering through to VAPT, network segmentation, identity, application security, and audit-grade compliance posture — delivered as engineering work, not as a quarterly slide.
Security as engineering work.
Most regulated organisations have already invested in security tools. What they often lack is the engineering discipline that makes those tools produce trustworthy outputs week after week — detections that fire, runbooks that match the system, and audit evidence captured at the source. CompTech Lab brings that discipline.
SOC & detection
SIEM/XDR build-out, detection-as-code, SOAR workflows, threat hunting, incident response runbooks.
VAPT & vuln mgmt
Web/network/cloud penetration testing, continuous scanning programmes, purple-team loops, remediation tracking.
Network security
Cisco Nexus EVPN/VXLAN, multi-tenant segmentation, next-gen firewalls, NAC, micro-segmentation.
Identity & access
Federated identity, SCIM, OIDC/SAML, MFA, ZTNA, privileged access, workload identity.
AppSec & DevSecOps
SAST, SCA, SBOMs, image signing, container runtime security (RHACS), DAST programmes.
Compliance & audit
Control-framework mapping (PCI, ISO, NIST), continuous compliance, evidence at source.
Engagement archetypes
| Engagement type | Typical scope | Duration |
|---|---|---|
| Full SOC build-out | SIEM platform, detection content, SOAR workflows, case management, IR runbooks, on-call structure | 12–20 weeks |
| Identity bring-up | WSO2 IS or Ping Identity platform, federation, SCIM, MFA, application onboarding | 4–8 weeks |
| Network segmentation programme | Cisco Nexus fabric design, tenant VRFs, services-VRF route-leak controls, firewall policy | 10–16 weeks |
| DevSecOps integration | Pipeline security (SAST/SCA/SBOM/signing), RHACS deploy and tune, DAST programme stand-up | 8–14 weeks |
| VAPT engagement | Scoped penetration test, vulnerability scan baseline, remediation tracking, retest cycle | 4–8 weeks |
| Compliance-evidence alignment | Control mapping (PCI / ISO / regulator), evidence capture at source, audit-cycle support | 6–10 weeks |
| Managed SOC (bridge) | Bounded, time-boxed operations of a defined SOC scope while your team builds capability | 3–12 months |
What makes us different
- Engineering-first. We treat detection content, network policy, and identity rules as code. They live in Git, are reviewed in pull requests, and are reconciled against running systems by automation.
- Evidence at the source. Audit evidence is captured where it is produced — commits, scan reports, RHACS runtime alerts, identity audit logs — not reconstructed at audit time.
- Documented handover. Every engagement ends with runbooks indexed by failure mode, an ADR set covering non-obvious decisions, and a residual-risk register your audit function can sign for.
- Bounded scope. We don't run open-ended retainers. Managed services exist as a bounded bridge, not a permanent dependency.
A SOC that produces trustworthy signal.
Building a SOC is straightforward. Building one whose detections fire on the cases that matter, whose analysts trust the alerts, and whose runbooks survive staff turnover — that is engineering work. We design the SOC operating model and its detection content as code, anchored on the platforms you already run.
SOC architecture
| Layer | Technologies we operate | What we deliver |
|---|---|---|
| SIEM | Splunk Enterprise/Cloud, Wazuh, Elastic Security | Log source onboarding plan, parsing/normalisation, retention policy, search-time taxonomy |
| NSM & IDS | Security Onion (Zeek, Suricata, Stenographer), Cisco Secure Network Analytics | Sensor placement, traffic capture posture, signature management, alert tuning |
| XDR & EDR | Cisco XDR, Cisco Secure Endpoint, Microsoft Defender, CrowdStrike | Agent rollout plan, policy baselines, response actions, integration with SIEM/SOAR |
| SOAR & case management | Shuffle, TheHive, Cortex, Splunk SOAR | Playbook design, automation of triage steps, case lifecycle, evidence capture |
| Threat intelligence | Cisco Talos, MISP, commercial feeds | Feed selection, IOC enrichment pipelines, false-positive controls |
| Vulnerability surface | Greenbone (OpenVAS), Tenable Nessus, RHACS image risk | Scan orchestration, remediation tracking, exception process, SLA reporting |
Detection engineering as code
Detections are content. Content has a lifecycle: research, develop, test, deploy, tune, retire. We run that lifecycle as a software-engineering practice:
- Detection-as-code repositories — rules versioned in Git, peer-reviewed, deployed via CI to the SIEM/XDR.
- MITRE ATT&CK mapping — every detection labelled with the techniques it covers, gap analysis run against the matrix quarterly.
- Test fixtures — replayable attack-sample inputs that validate detection behaviour before promotion.
- Tuning loop — false-positive rate tracked per detection, with documented thresholds for tuning, retirement, or escalation to engineering.
- Coverage reporting — what we detect, what we don't, what the gaps mean for your risk picture.
Incident response
- Runbooks indexed by failure mode — not generic wiki pages, but procedures verified against the live system.
- On-call structure — tiers, escalation paths, rotation patterns, postmortem cadence.
- Tabletop and red-team exercises — quarterly drills that reveal what the runbooks haven't yet covered.
- Forensic readiness — pre-staged collection capability, chain-of-custody discipline, evidence retention aligned with regulatory hold requirements.
Threat hunting
Detections only fire on known patterns. Threat hunting closes the gap by hypothesis-driven investigation against the data you've already collected. We stand up a hunting practice with:
- A hunt-hypothesis backlog driven by threat intelligence and observed attacker behaviour.
- Documented hunt procedures, with queries, expected results, and findings published per hunt.
- A feedback loop into detection engineering — hunts that find something become detections.
What you get at the end of a SOC engagement
- A production-shaped SIEM/XDR platform with documented log sources and retention
- A starter detection-content repository with MITRE ATT&CK coverage map
- SOAR playbooks for triage, enrichment, and routine response actions
- Runbook set indexed by failure mode, verified against the live system
- On-call structure, postmortem template, and the first quarter of postmortems
- SLO-driven SOC operations dashboard, tied to actual business risk — not vanity metrics
- Quarterly threat-hunt schedule and the first round of completed hunts
Find it before someone else does — then close the loop.
Vulnerability discovery without remediation tracking is theatre. We run penetration tests, vulnerability scans, and purple-team exercises as engineering programmes: scoped, repeatable, with findings landed directly in your engineering team's bug queue and closure tracked to production.
Penetration testing
Every test is scoped to the question that justifies it. We work to PTES, OWASP, and NIST SP 800-115 methodology where relevant, but the deliverable is always findings your engineers can act on — not a pile of CVSS numbers.
| Type | Scope | Standards / frameworks |
|---|---|---|
| Web application | Public web apps, customer portals, internal apps, APIs (REST, GraphQL, SOAP) | OWASP Top 10, OWASP ASVS, OWASP API Security Top 10 |
| Network & infrastructure | External perimeter, internal network, segmentation validation, Active Directory | PTES, NIST 800-115 |
| Cloud | AWS / Azure / GCP misconfigurations, IAM weaknesses, container/Kubernetes attack surface | CIS Benchmarks, NIST 800-204 |
| Mobile | iOS and Android applications, mobile API back-ends, jailbreak/root-detection bypass | OWASP MASVS, MSTG |
| Red team | Goal-oriented adversary simulation, blended phishing + infrastructure + lateral movement | MITRE ATT&CK |
| Purple team | Collaborative red+blue exercise focused on detection improvement, not "did red win" | Custom playbooks aligned to your detection coverage |
Continuous vulnerability management
Point-in-time scans age fast. We design the programme as a continuous operating loop: scan, triage, route, fix, verify, report.
- Tooling. Greenbone (OpenVAS), Tenable Nessus, Qualys VMDR for infrastructure. Acunetix or Invicti for web DAST. Trivy and RHACS for container images.
- Asset coverage. Inventory-driven, not scan-target-driven. We integrate with your CMDB / Nautobot / cloud inventory so coverage gaps surface.
- Triage. Findings routed to the team that owns the asset, with SLAs by severity. False-positive feedback closes the loop on tuning.
- Remediation tracking. Open / fixing / fixed / risk-accepted, with explicit owners and dates. No "open forever" findings.
- Risk-acceptance discipline. Documented, time-boxed, with a re-review trigger. Audit-ready by default.
- Reporting. SLA compliance, mean-time-to-remediate, top recurring root causes — the metrics that drive engineering action, not vanity numbers.
Purple-team operating loops
The lab discipline that scales: blue team writes a detection, red team designs an attack that should trigger it, both sides watch the evidence together, gaps go into the engineering backlog. Then repeat — weekly, monthly, quarterly, depending on the scope.
What you get at the end of a VAPT engagement
- Pentest reports written for engineers — reproducible findings, remediation guidance, and proof-of-fix retest
- A vulnerability management operating model with SLAs, routing rules, and reporting
- Continuous-scan tooling deployed and integrated with your CMDB and ticketing
- Purple-team exercise outputs — what we tried, what fired, what didn't, and the engineering backlog that closes the gap
- An exception/risk-acceptance register that your audit function will accept
Cisco data-centre security and segmentation done as engineering.
Network segmentation is where most regulated organisations have either over-promised and under-delivered, or built so much complexity that nobody dares change anything. We design segmentation as a tractable engineering problem — with desired state in Git, validation as code, and route-leak controls you can prove are working.
Cisco data-centre fabric
We design and operate Cisco Nexus 9000 fabrics with MP-BGP EVPN overlays and VXLAN tenant segments — the production pattern for modern multi-tenant data centres. Multisite EVPN/VXLAN with border gateways extends this across data centres for DR and active-active patterns.
- Nexus 9000 / NX-OS — spine-and-leaf topology, BGP underlay, MP-BGP EVPN overlay, VXLAN data plane.
- Multi-tenant segmentation — tenant VRFs per business unit, L3VNI / L2VNI mapping, anycast gateway, ARP suppression.
- Services VRF and route-leak controls — explicit, named prefix advertisement between tenant and services VRFs, with daily validation that only approved prefixes are visible across the boundary.
- Multisite design — border gateway placement, control-plane separation, traffic engineering across DCI.
- Nexus Dashboard & NDFC — controller-based operations for fleets where manual NX-OS doesn't scale.
- ACI / APIC — alternative model where application-centric policy is the right primitive.
GitOps-managed network state
The hardest part of multi-tenant fabrics is not building one — it's keeping the running configuration matched to a designed intent six months later. We treat network state as code:
- Nautobot as the network source-of-truth (devices, interfaces, IP plan, VRFs, prefixes).
- Oxidized for automated config backup with drift detection per device.
- Batfish for offline policy analysis — "if this change deploys, will the route-leak controls still hold?" answerable before the change ships.
- Daily validation jobs — checks for approved prefix visibility, denied prefix absence, route-map attachment, backup freshness. Failures alert the SOC.
- Ansible automation for the change path itself, with idempotent playbooks and reviewed pull requests as the entry point.
Perimeter, NAC, and micro-segmentation
| Layer | Cisco / vendor options | Typical placement |
|---|---|---|
| Next-gen firewall | Cisco Secure Firewall (FTDv), FMC, ASAv, Palo Alto, Fortinet | Internet edge, DMZ, tenant boundaries, partner edge |
| Network access control | Cisco ISE, 802.1X, MAB, TACACS+, TrustSec/SGT | Wired and wireless campus access, device profiling, RADIUS |
| Workload segmentation | Cisco Secure Workload (formerly Tetration), VMware NSX | East-west micro-segmentation for application boundaries |
| SD-WAN security | Cisco Catalyst SD-WAN, Meraki MX, Cisco Secure Access (SSE) | Branch and remote-site connectivity with integrated security |
| ZTNA / SSE | Cisco Secure Access, Cisco Duo, Cisco Umbrella | Remote user access, DNS-layer security, SaaS gating |
What you get at the end of a network segmentation engagement
- A Nexus fabric design document and built fabric, validated end-to-end
- Tenant VRFs and services-VRF route-leak controls, with daily validation in place
- Nautobot / Oxidized / Batfish source-of-truth, GitOps-managed in your repositories
- Firewall and NAC policy mapped to your tenant model and validated against test traffic
- Runbooks for adding a tenant, refreshing hardware, and recovering from common failure modes
- ADR set covering segmentation choices and the trade-offs we considered
Identity is platform, not application.
Most identity problems are not technology problems — they are platform-shape problems. We design identity as the boundary your platform is built around, not as an application your team integrates with after the fact.
Federation and SSO
| Stack | Strengths | When we choose it |
|---|---|---|
| WSO2 Identity Server | Self-hosted, deeply customisable, strong adaptive-auth and fine-grained authorisation. SCIM, OIDC, SAML, OAuth2 well-supported. | Regulated on-prem deployments, sovereign data residency, organisations preferring an open-source-anchored stack. |
| Ping Identity | Enterprise-grade SaaS or hybrid, mature adaptive auth, strong directory integration, large partner ecosystem. | BFSI and large enterprises with hybrid identity needs and an existing Ping investment. |
| Keycloak | Open-source, container-native, lightweight, good for self-hosted lightweight scenarios. | Smaller deployments, dev/test environments, organisations not requiring full enterprise feature sets. |
| Cisco Duo | Excellent MFA and device-trust posture, native to many Cisco environments, easy ZTNA path. | MFA rollouts on top of existing IdPs, Cisco-heavy environments, ZTNA programmes. |
Lifecycle and provisioning
- Directory of record. One authoritative source — HR system or Active Directory — with everything else downstream.
- SCIM provisioning. Joiner / mover / leaver flows automated end-to-end. No orphan accounts, no stale entitlements.
- Role and group governance. Roles modelled deliberately, not accreted. Reviews on a quarterly cadence with evidence captured automatically.
- Privileged access management. Time-bound, just-in-time elevation. Vault dynamic credentials for service-level access. Session recording for admin sessions where regulators require it.
- Service identities. Workload identity via SPIFFE/SPIRE or platform-native mechanisms (Kubernetes service accounts, AWS IAM Roles for Service Accounts, Azure managed identities).
Authentication and authorisation flows
- OIDC and OAuth2 — canonical for modern web and mobile applications, with token-exchange patterns for service-to-service.
- SAML — canonical for enterprise SaaS integrations.
- MFA strategy. Push (Duo, Auth0, Okta-style), TOTP for fallback, FIDO2 / passkeys where the regulator and user base allow.
- Step-up authentication. Context-aware elevation for sensitive operations (high-value transactions, admin actions).
- Authorisation. Fine-grained where it earns its keep — OPA / Rego, XACML, or platform-native ABAC. We don't over-engineer.
Zero-trust network access
For remote and partner access, we replace flat-VPN topologies with identity-bound application access:
- Cisco Secure Access or Zscaler Private Access for the ZTNA layer.
- Cisco Duo for device trust and MFA.
- Cisco Umbrella for DNS-layer protection and SaaS visibility.
- Integration with your IdP so policy is identity-driven, not subnet-driven.
What you get at the end of an IAM engagement
- A working IdP platform (WSO2 IS, Ping, or Keycloak), federated to your apps
- SCIM lifecycle automated end-to-end with the directory of record
- MFA rolled out with documented enrolment, exception, and recovery flows
- Privileged access management posture with audit-grade session capture
- Role and group governance model, with the first quarterly review run jointly
- Runbooks for the failure modes that matter: lost MFA, IdP outage, expired certs, breach response
Shift left in the pipeline. Shift right at runtime.
Application security is platform engineering with a security framing. We integrate SAST, SCA, SBOMs, image signing, policy gates, runtime security, and DAST as a coherent pipeline — not as a stack of bolt-on tools each fired by a different team.
Shift-left: pipeline-integrated security
| Stage | Tools we operate | What we deliver |
|---|---|---|
| SAST | Semgrep, SonarQube, Checkmarx, GitHub Advanced Security | Ruleset tuned to your stack, false-positive baseline, PR-blocking gate where appropriate |
| SCA | Snyk, Trivy, Dependabot, Renovate | Dependency policy, automated updates, vulnerability-to-CVE mapping, exception process |
| SBOM | Syft, CycloneDX, SPDX | SBOMs produced at build, stored alongside images, queryable for supply-chain incidents |
| Container image scanning | Trivy, Clair, RHACS image scanner | Image-risk gate at build and at admission, base-image policy, layer-level findings |
| Image signing | cosign / sigstore, Notary v2 | Signed images, verified at admission, key custody integrated with Vault / KMS |
| Policy as code | Open Policy Agent (OPA), Conftest, Kyverno | Reusable policy bundles, CI-time validation, admission-time enforcement |
| Secrets scanning | Gitleaks, TruffleHog, GitHub secret scanning | Pre-commit hooks, CI-time scans, push protection, rotation playbooks |
Shift-right: runtime security
What the pipeline missed is what runtime has to catch. We deploy and tune the runtime layer to your environment, not to the vendor defaults:
- RHACS (StackRox) — admission policies, network baselines, runtime detection, image-risk gates. Integrated with SIEM/SOAR.
- Falco — eBPF-based runtime detection, useful where RHACS isn't deployed.
- Cisco Secure Workload — behavioural micro-segmentation for east-west traffic with policy as code.
- Pod security and admission control — Kubernetes Pod Security Standards, OPA Gatekeeper / Kyverno policies enforced at admission.
- Network policy — Calico / Cilium / Istio authorisation policies, tied to the segmentation model.
DAST programmes
Continuous web-application security testing against the deployed application — authenticated scans, scheduled re-runs, findings landed in the engineering team's bug queue with proof-of-fix retest:
- Acunetix or Invicti as the primary DAST platform — chosen for your stack and integration model.
- OWASP ZAP for self-service scans, with baseline and full-scan profiles wired into CI.
- API-aware scanning for REST, GraphQL, and SOAP APIs — OpenAPI-driven, schema-aware.
- Authentication recipes — OIDC, SAML, custom token flows. Your apps don't get to opt out of authenticated scans by being awkward to log in to.
AppSec assessments and threat modelling
- Architectural threat modelling for new applications and significant changes — STRIDE-style, focused on findings engineers can act on.
- Secure-design reviews at the right point in the SDLC — not too early to be speculative, not too late to be expensive.
- Secure-coding training tailored to your stack, with measurable improvement in PR-level findings post-training.
What you get at the end of a DevSecOps engagement
- An integrated pipeline-security path: SAST, SCA, SBOM, signing, policy, all wired into your existing CI
- RHACS deployed and tuned to your environment, with admission policies and runtime baselines
- A DAST programme running against production-like environments with proof-of-fix tracking
- A threat-modelling practice with the first round completed for top-risk applications
- Policy-as-code repositories owned by your platform team and reviewed quarterly
- A residual-risk register reflecting the controls you accepted and why
Evidence at the source. Audit as a side effect.
Most compliance programmes reconstruct evidence at audit time — an expensive, error-prone exercise that produces output that nobody trusts. We design the platform so that evidence is captured at the moment of action, in tamper-evident stores, available on demand. Audit becomes the side effect, not the project.
Control-framework mapping
We work with the frameworks your organisation reports against, mapping each control to the platform mechanism that actually implements it:
| Framework | Where we typically engage |
|---|---|
| PCI DSS | Card-data environments, segmentation evidence, encryption evidence, vulnerability management cadence |
| ISO 27001 / 27002 | ISMS support, Annex A control mapping, evidence capture |
| NIST CSF / 800-53 | Reference profile for regulated and federal-adjacent organisations |
| SOC 2 | Trust-service criteria mapping, continuous-evidence capture, readiness assessment |
| GDPR / regional privacy regimes | Data-flow mapping, consent posture, breach-notification procedures, retention policies |
| Central-bank IT guidance | BFSI-specific regulators — control mapping to local frameworks, on-shore-data residency, dual-control discipline |
| Insurance regulators | Solvency-adjacent IT controls, claims-processing audit, agent integrity |
| Telecom regulators | Lawful intercept, data retention, customer-data protection |
Evidence at the source
The shift from project-style compliance to continuous compliance:
- Git commits as change evidence. Signed commits with author and review trail are the evidence that a change happened, who approved it, and what reviewer comments resolved.
- GitOps reconciliation as configuration evidence. The desired state in Git, the reconciliation log in the cluster, and the running configuration on the device should all match — and the diff is the evidence either way.
- Pipeline outputs as security evidence. SAST, SCA, SBOM, signed images, policy decisions — captured at build time, attached to the image, queryable forever.
- Runtime audit logs. Vault audit log, RHACS event log, identity audit log, all forwarded to immutable storage with retention aligned to regulatory hold requirements.
- Operational evidence. Postmortems, change records, on-call logs, incident timelines — captured in your ticketing/wiki/SIEM with consistent metadata.
Audit-cycle support
- Readiness assessments ahead of formal audit, with gap remediation tracked to closure.
- Evidence-request facilitation — matching auditor information requests to the right source-of-truth, training your team to do this without re-engagement.
- Findings remediation — engineering-grade fixes for audit findings, not paperwork loops.
- Risk-acceptance register — documented exceptions with time-boxed re-review, accepted at the right authority level.
Reporting that matters
We build reporting your board, regulator, and engineering leadership all read:
- SLA compliance for vulnerability remediation, with the gap analysis between aspiration and reality.
- Mean-time-to-remediate by severity, by business unit, by application.
- Control-coverage heat-map against your chosen framework.
- Open audit findings, with owner, ETA, and the risk while open.
- Top recurring root causes — the metric that drives engineering investment.
What you get at the end of a compliance engagement
- A control-framework map specific to your regulatory profile
- Evidence-capture wired into your platform — commits, builds, pipelines, runtime, audit logs
- Audit-cycle-ready posture with a runbook for upcoming external audits
- A risk-acceptance register that your audit function accepts
- Reporting dashboards that your engineering, security, and leadership teams all use
- A residual-risk view for the next 12 months, with the controls that matter most
Have a security programme that needs engineering depth?
Send us a short note describing the problem and the regulatory context. We'll write back with a concrete first-two-weeks scope and a definition of done for the engagement.