Security practice

A specialist security practice for regulated workloads.

Seven aspects, one operating discipline. From SOC build-out and detection engineering through to VAPT, network segmentation, identity, application security, and audit-grade compliance posture — delivered as engineering work, not as a quarterly slide.

01 — Overview

Security as engineering work.

Most regulated organisations have already invested in security tools. What they often lack is the engineering discipline that makes those tools produce trustworthy outputs week after week — detections that fire, runbooks that match the system, and audit evidence captured at the source. CompTech Lab brings that discipline.

SOC & detection

SIEM/XDR build-out, detection-as-code, SOAR workflows, threat hunting, incident response runbooks.

VAPT & vuln mgmt

Web/network/cloud penetration testing, continuous scanning programmes, purple-team loops, remediation tracking.

Network security

Cisco Nexus EVPN/VXLAN, multi-tenant segmentation, next-gen firewalls, NAC, micro-segmentation.

Identity & access

Federated identity, SCIM, OIDC/SAML, MFA, ZTNA, privileged access, workload identity.

AppSec & DevSecOps

SAST, SCA, SBOMs, image signing, container runtime security (RHACS), DAST programmes.

Compliance & audit

Control-framework mapping (PCI, ISO, NIST), continuous compliance, evidence at source.

Engagement archetypes

Engagement type Typical scope Duration
Full SOC build-out SIEM platform, detection content, SOAR workflows, case management, IR runbooks, on-call structure 12–20 weeks
Identity bring-up WSO2 IS or Ping Identity platform, federation, SCIM, MFA, application onboarding 4–8 weeks
Network segmentation programme Cisco Nexus fabric design, tenant VRFs, services-VRF route-leak controls, firewall policy 10–16 weeks
DevSecOps integration Pipeline security (SAST/SCA/SBOM/signing), RHACS deploy and tune, DAST programme stand-up 8–14 weeks
VAPT engagement Scoped penetration test, vulnerability scan baseline, remediation tracking, retest cycle 4–8 weeks
Compliance-evidence alignment Control mapping (PCI / ISO / regulator), evidence capture at source, audit-cycle support 6–10 weeks
Managed SOC (bridge) Bounded, time-boxed operations of a defined SOC scope while your team builds capability 3–12 months

What makes us different

  • Engineering-first. We treat detection content, network policy, and identity rules as code. They live in Git, are reviewed in pull requests, and are reconciled against running systems by automation.
  • Evidence at the source. Audit evidence is captured where it is produced — commits, scan reports, RHACS runtime alerts, identity audit logs — not reconstructed at audit time.
  • Documented handover. Every engagement ends with runbooks indexed by failure mode, an ADR set covering non-obvious decisions, and a residual-risk register your audit function can sign for.
  • Bounded scope. We don't run open-ended retainers. Managed services exist as a bounded bridge, not a permanent dependency.
Start a security engagement

Have a security programme that needs engineering depth?

Send us a short note describing the problem and the regulatory context. We'll write back with a concrete first-two-weeks scope and a definition of done for the engagement.

Contact us All services