Skip to main content Skip to Primary navigation
Saud Arabi

Services

Offensus has many talented and skilled people in a variety of disciplines in cybersecurity and software development; a team of experts that can provide astonishing cybersecurity services that meet customers' needs, and creative software engineers that develop innovative software using the latest technologies.


Digital Forensics

In any incident that requires digital forensics such as claims of fraud, financial tampering, system compromise, employee misconduct, etc, our team of forensicators will collect all of the pieces of digital evidence and gather facts to reach the truth.

- Endpoint Forensics
- Network Forensics
- Memory Forensics
- Smartphones Forensics



Incident Response

Our team of professional incident responders will assist you in all of the six phases of incident handling from preparation to lessons learned. In case of a cyber incident, our team will support in minimizing the impact of the breach and understanding the root cause with deep analysis.

- Preparation
- Identification
- Containment
- Eradication
- Recovery
- Lessons Learned

Threat Hunting & Compromise Assessment

As malicious actors are becoming more sophisticated and advanced bypassing all of your security controls to stay and dwell undetected in your systems the advantage of threat hunting comes in. With our threat hunting service, we proactively hunt in your endpoints and network looking for traces of a successful compromise.

- Hypothesis Driven Investigations
- Hunting across both endpoint and network
- Assessing the current state of systems; compromised?
- Configuring use cases for threat hunting hypothesis
- Performing Root cause and kill chain analysis
- Providing recommendations to improve overall security


Malware Analysis

There are many cases where malware behavior and objectives cannot be determined by automated malware analysis tools such as sandboxes. In such cases, we provide malware analysis and reverse engineering services where we dig deep into the malware file to understand how it operates from the code level.

- Static Analysis
- Behavioral Analysis
- Code Level Analysis
- Yara Rules Analysis
- Indicators of Compromise (IOCs) Extraction
- Malware Analysis Comprehensive Report (Including Threat Intelligence)

Penetration Testing

You may think your internal systems and servers are very well protected, but in reality, it may be susceptible to attacks from external or internal threats. Our internal and external penetration testing services will help you test and identify any security pitfalls that may lead to the exploitation of your environment.

- Internal Network Penetration Testing
- External Network Penetration Testing
- Black-Box Penetration Testing
- White-Box Penetration Testing
- Web Applications Penetration Testing


Red Teaming

Red Team Operations or Red Teaming are the true test to mature environments who want to test their protections against an adversary. Tactics, Techniques and Procedures (TTPs) are used to simulate a real attacker who is interested in infiltrating the targets network and obtain a specific object; whether a database backup, an employee password, or financial information.

- Advisory / Threat Emulation
- Security Controls Evasion



Other Services

Offensus provides many other services such as the below:

- Source Code Review
- Security Awareness
- UI/UX Design and Development (Frontend)
- Web Applications Development
- Mobile Applications Development


Need help or expert advice?

Whether you have questions about any of our cybersecurity or software engineering/development services Contact us, we will solve your issue.