Hello, we are

gtcyber

the best way to accelerate cyber security at your business

gtcyber

We are a customer focused company that is pasionate about cyber security. Our mission is to build a security culture accross the enterprises globally. We want to achieve it by delivering world class training and consultancy.

Years of experience our team gained, both in corporate environment as well as the open source one, give us a big level of comfort and flexibility delivering most advanced projects and building security solutions.

  • Name gtcyber
  • Experience 10+ Years
  • Range Global
  • Location Poznań, Poland
Contact us

What we do

Network monitoring

Deployment of SIEM and NIDS systems from top vendors, developing use cases

.

.

.

#secmon #siem #ids

Process alignment

Building an end to end processes on responding to cyber security threats including phishing, ransomware and hacking.

.

.

#malware #hacking #phishing

Training

Delivering top quality in-class hands-on cyber security training in areas around Incident Response, Blue Team, Threat Hunting and more.

.

#incidentresponse #blueteam

Consultancy

Creating a top end solutions for building cyber security workflows and automation.

.

.

.

#infosec #consultancy #automation

Recent projects

At gtcyber we take our customer's privacy extremally seriously. Unless advised otherwise we do not disclouse any details about the projects we were involved in.

If you want to learn more please contact us

Incident response training

Deliver an in-class hands-on training on Incident Response for a major mobile carrier's security department.

SIEM tuning

Log sources configuration review, parsing optimization and use cases development for a major retail chain.

Phishing simulation

Set up and deliver a phishing simulation campaign to build security awareness in the customer's company.

Cyber awareness training

Deliver training for non-technical employees about cyber security awareness, phishing methods and passwords security and maintenance.

Network configuration

Designing an office network with additional layers of protection and segregation. Configuring firewall, zones and proper routing.

Incident response

Containment, eradication and recovery of a ransomware campaign that was planted on a cutomer's vulnerable webserver.

Contact Form