Expert cybersecurity services delivered by senior analysts
Expert cybersecurity services delivered by senior analysts. Scoped engagements, transparent methodology, actionable deliverables.
NIS2
Operational NIS2 support for SMEs, mid-sized companies, and exposed suppliers.
Thunt helps you assess exposure, investigate sensitive incidents, and reduce cyber risk with documented technical work. No generic compliance theater, no legal overpromises.
Incident Response
Rapid, structured response to contain cyberattacks, qualify major incidents, and deliver documented technical findings your stakeholders can act on.
Explore expertiseThreat Hunting
Proactive, hypothesis-driven hunts built to reduce doubt, assess compromise risk, and improve resilience where standard controls are not enough.
Explore expertiseDetection Engineering
Enhance your unique capabilities with rules crafted for your workflows. We focus on identifying threats to prevent significant damage, ensuring your defenses are ready for today.
Explore expertiseTraining
Hands-on training and crisis exercises that combine theory with operational reality for security teams, IT leads, and decision-makers.
Explore expertiseChoose your depth
Clear scope for clear outcomes.
| Package | Duration | Scope | Ideal for |
|---|---|---|---|
| Triage | 3 days | Incident triage or initial and scoped threat hunting. Forensic data collection, IOCs and tactics, techniques and procedures of attacks hunting based on MITRE ATT&CK. Report writing. | Quick assessment, unresolved alert investigation, or initial compromise check. |
| Root Cause | 5 days | Full and comprehensive investigation or advanced threat hunting. Deep forensic analysis, root causes identification, and full TTPs identification based on MITRE ATT&CK. Comprehensive report and remediation plan. | Confirmed incidents, thorough threat hunts, detection rule development, or M&A due diligence. |
| Need something custom? | Tailored investigation or specific security operation. Advanced reverse engineering, specific forensic artifacts analysis, or crisis management support. Custom reporting and strategic recommendations. | Major breaches, ransomware recovery, large environment assessments, or training programs. |