Services

Offensive Security

Engagements staffed with senior and principal-level offensive researchers through Critical Assets. 25 years of offensive security experience from Trustwave and Leviathan through Praetorian.

Why This Engagement Exists

Most pen test shops run a scanner, wrap the output in a template, and call it an assessment. The result reads like a vulnerability dump, not a report that tells you what to fix first and why. Engagements through 77 Spyglass are staffed through Critical Assets with researchers who do manual, objective-driven testing. I scope and oversee every engagement, and findings are framed for a board audience because that is where remediation budgets get approved.

Our Approach

Every engagement starts with scoping against your actual threat model. Assessments are manual-first: scanners find the obvious stuff, researchers find what scanners miss. Findings are prioritized by business risk, and executive summaries are written for a board audience by default.

Services

  • Red team operations: adversarial testing simulating real-world attacker tactics
  • Application penetration testing: web, mobile, API, cloud-native
  • Network and infrastructure penetration testing
  • Architecture security review: design-level analysis before code is written
  • Threat modeling: mapping where your design can be attacked and where trust assumptions break down
  • Secure code review: manual source code analysis for logic flaws and security defects
  • Cloud security assessment: AWS, Azure, GCP configuration and architecture

Scope and Timing

Engagements range from a focused application assessment (1-2 weeks) to broader infrastructure and architecture reviews. I scope based on what matters to your business: an upcoming product launch, an acquisition, or a compliance requirement.

Who This Is For

  • Companies preparing for a product launch, acquisition, or compliance audit that need their attack surface tested
  • Security teams that want manual, objective-driven testing instead of automated scan output in a branded template
  • Organizations that need findings written for a board audience, not just a vulnerability list

Frequently Asked Questions

What is the difference between a pen test and a red team engagement?

A pen test is scoped to a specific target: an application, a network segment, a cloud environment. A red team engagement simulates a real adversary going after your organization with fewer constraints.

Who performs the testing?

Senior and principal-level researchers from Critical Assets. I scope and oversee every engagement. No junior analysts, no outsourced labor.

How long does a typical engagement take?

A focused application assessment runs 1-2 weeks. Broader infrastructure and architecture reviews take longer. Scoping depends on what you're protecting and why you need it tested now.