Cyber security

Cyber security for defence contractors & critical infrastructure

Deep security expertise from defence industry and compliance-heavy sectors. Security assessment, architecture, and incident response for critical infrastructure.

Security services

Comprehensive security services for critical infrastructure.

Security assessment

Thorough evaluation of your security posture through penetration testing, vulnerability assessments, and comprehensive security audits.

Security architecture

Design secure architectures aligned with NIST 800-53 rev 5 and CCMv4 frameworks, protecting sensitive data while enabling operational efficiency.

Incident response

Rapid incident response capabilities combining threat detection, containment, forensic analysis, and remediation.

Compliance & standards

Navigate GDPR, defence industry regulations, and security frameworks with practical implementation experience.

Security training

Build security awareness culture through tailored training programs for both technical and non-technical staff.

Endpoint security

Device management, endpoint protection, and continuous monitoring to secure all company assets against emerging threats.

Continuous learning

We stay current with the latest threats and defensive techniques through ongoing professional education.

Recent training includes:

  • GIAC Defending Advanced Threats (GDAT)
  • SANS SEC595: Applied Data Science and AI/ML for Cybersecurity
  • SANS SEC599: Defeating Advanced Adversaries - Purple Team Tactics & Kill Chain Defenses
  • SpecterOps Adversary Tactics: Detection
  • Ethical Hacking

Defence-grade security

Security practices aligned with defence industry requirements.

  • Zero-trust security architecture principles
  • Defence-in-depth protection strategies
  • Continuous security monitoring and assessment
  • Compliance with national security requirements
  • Regular security awareness training

Frequently Asked Questions

What security frameworks do you work with?

We have practical implementation experience with NIST 800-53 rev 5 (security controls for federal systems), CCMv4 (Cloud Controls Matrix), GDPR compliance, zero-trust architecture principles, and defence-in-depth security strategies.

What certifications and training do you have?

GIAC Defending Advanced Threats (GDAT), SANS SEC595 (AI/ML for Cybersecurity), SANS SEC599 (Purple Team Tactics), SpecterOps Adversary Tactics: Detection, OffSec WEB200, AWS Landing Zone Accelerator, and AWS Solutions Architect - Associate. Continuous learning is core to our practice.

What's your experience with defence sector security?

Extensive experience delivering secure systems for defence industry environments with strict security requirements. Led technical teams, managed R&D initiatives, and implemented security controls for classified and sensitive systems. Additional details available in-person due to confidential nature of defence work.

Do you offer security training for teams?

Yes. We provide tailored security awareness training for both technical and non-technical staff, including threat modeling workshops, secure coding practices, and compliance training (GDPR, NIST 800-53 rev 5). Experience with DPA audits and information security policy development.

Strengthen your security

Let's assess and improve your security posture.

Get in touch

Choose your preferred contact method

Send email

Standard email to our team

Open email client

Encrypted email

For sensitive communications, use our PGP public key to encrypt your message

Download key file
How to use PGP encryption

PGP (Pretty Good Privacy) encrypts your email so only the intended recipient can read it. This is recommended for sensitive business communications.

  1. Install a PGP-capable email client (Thunderbird with Enigmail, Apple Mail with GPG Suite, or Outlook with Gpg4win)
  2. Import our public key using the download or copy button
  3. Compose your email to info@sharedjourney.se
  4. Select our key for encryption before sending