
Blacklight Security
Illuminate your security vulnerabilities
Reading Time: 10 min
Hey,

I'm Joseph. I founded Blacklight to provide the highest quality of tailored, technical cybersecurity services to businesses of all sizes - from the 5 person family business to the 6,000 employee enterprise.
All our technical personnel are highly specialised in their respective domains from penetration testing and red teaming, to digital forensics, intelligence, and malware analysis, including myself. We are also all former or current Five Eyes military personnel, leveraging our experience in high stakes military environments to better inform our approach to securing the digital frontier.
Read through this brochure to get an idea of the what, why, and how of what we do. For our clients, we tailor every engagement according to your specific needs so you only get exactly what you need and nothing less.
Speak soon,
Joseph Kovelia
Founder & CEO
Who we work with

Government
Departments

Tech
Companies

Law
Firms

Critical
Infrastructure

Military
Orgs
The State of Security

$4.8M
Average cost of a single data breach (USD) in 2024 according to IBM

$9.5T
Global cost of cyber crime annually (USD) - the words 3rd largest GDP according to Bloomberg

90%
Percentage by which businesses are underspending on cybersecurity uplift according to McKinsey & Co.
Service Catalogue
Our offerings

- Dark web scan for company data or leaked credentials
- Open source intelligence & discovery of sensitive data
- Vulnerability scan across all external facing assets

- Identification of vulnerabilities within in-scope systems
- Demonstrating risks through controlled and evidenced exploitation
- Technical & executive-level findings with prioritised risk ratings
- Guidance & support for fixing vulnerabilities and security uplift
We test corporate networks, internal & external facing web apps, websites, APIs, Active Directory, Cloud Hosting Platforms (Azure, AWS, GCP), operational technology (OT), hardware, et al.
---
Cost depends on the scope of the system. For example a small web application might only be a 3 day engagement while a complete corporate network for a 500 employee enterprise might be 10 days, end to end.

- 24 / 7 / 365 availability for immediate response to live incidents
- Containment of incident and suppression of ongoing attacks
- Digital forensics, root cause analysis, and complete review of compromised assets to remove attackers from network and devices
- Securing of compromised systems and configuration recommendations to prevent recurrence
- Full report outlining incident, findings, timeline, and recommendations
---
An initial triage will be completed within 48h from initial contact for which the cost above is given. The initial triage will determine the extent of the breach, take immediate actions for containment and inform stakeholders as to whether further investigation and reporting is required. Full investigations can range from 10 up to 30 days or longer in larger environments with more extensive compromises and logs to review. All work beyond the 48h triage will be clarified and only initiated when the green light is given by the client to proceed.

- Participation in executive meetings to provide security considerations for business decisions
- Long-term security planning and roadmaps
- Assessment and review of cyber related vendor proposals, contracts, and insurance policies
- Evaluate and recommend security tools, MSP packages, and infrastructure improvements
- Develop tested, actionable response plans to mitigate breaches before they occur
- Provide ongoing insights into emerging cyber threats and strategic defensive recommendations
---
Recorded in 15min increments, billed monthly

- Dark web scan for company data or leaked credentials
- Open source intelligence & discovery of sensitive data
- Vulnerability scan across all external facing assets

- Identification of vulnerabilities within in-scope systems
- Demonstrating risks through controlled and evidenced exploitation
- Technical & executive-level findings with prioritised risk ratings
- Guidance & support for fixing vulnerabilities and security uplift
We test corporate networks, internal & external facing web apps, websites, APIs, Active Directory, Cloud Hosting Platforms (Azure, AWS, GCP), operational technology (OT), hardware, et al.
---
Cost depends on the scope of the system. For example a small web application might only be a 3 day engagement while a complete corporate network for a 500 employee enterprise might be 10 days, end to end.

- 24 / 7 / 365 availability for immediate response to live incidents
- Containment of incident and suppression of ongoing attacks
- Digital forensics, root cause analysis, and complete review of compromised assets to remove attackers from network and devices
- Securing of compromised systems and configuration recommendations to prevent recurrence
- Full report outlining incident, findings, timeline, and recommendations
---
An initial triage will be completed within 48h from initial contact for which the cost above is given. The initial triage will determine the extent of the breach, take immediate actions for containment and inform stakeholders as to whether further investigation and reporting is required. Full investigations can range from 10 up to 30 days or longer in larger environments with more extensive compromises and logs to review. All work beyond the 48h triage will be clarified and only initiated when the green light is given by the client to proceed.

- Participation in executive meetings to provide security considerations for business decisions
- Long-term security planning and roadmaps
- Assessment and review of cyber related vendor proposals, contracts, and insurance policies
- Evaluate and recommend security tools, MSP packages, and infrastructure improvements
- Develop tested, actionable response plans to mitigate breaches before they occur
- Provide ongoing insights into emerging cyber threats and strategic defensive recommendations
---
Recorded in 15min increments, billed monthly

- Dark web scan for company data or leaked credentials
- Open source intelligence & discovery of sensitive data
- Vulnerability scan across all external facing assets

- Identification of vulnerabilities within in-scope systems
- Demonstrating risks through controlled and evidenced exploitation
- Technical & executive-level findings with prioritised risk ratings
- Guidance & support for fixing vulnerabilities and security uplift
We test corporate networks, internal & external facing web apps, websites, APIs, Active Directory, Cloud Hosting Platforms (Azure, AWS, GCP), operational technology (OT), hardware, et al.
---
Cost depends on the scope of the system. For example a small web application might only be a 3 day engagement while a complete corporate network for a 500 employee enterprise might be 10 days, end to end.

- 24 / 7 / 365 availability for immediate response to live incidents
- Containment of incident and suppression of ongoing attacks
- Digital forensics, root cause analysis, and complete review of compromised assets to remove attackers from network and devices
- Securing of compromised systems and configuration recommendations to prevent recurrence
- Full report outlining incident, findings, timeline, and recommendations
---
An initial triage will be completed within 48h from initial contact for which the cost above is given. The initial triage will determine the extent of the breach, take immediate actions for containment and inform stakeholders as to whether further investigation and reporting is required. Full investigations can range from 10 up to 30 days or longer in larger environments with more extensive compromises and logs to review. All work beyond the 48h triage will be clarified and only initiated when the green light is given by the client to proceed.

- Participation in executive meetings to provide security considerations for business decisions
- Long-term security planning and roadmaps
- Assessment and review of cyber related vendor proposals, contracts, and insurance policies
- Evaluate and recommend security tools, MSP packages, and infrastructure improvements
- Develop tested, actionable response plans to mitigate breaches before they occur
- Provide ongoing insights into emerging cyber threats and strategic defensive recommendations
---
Recorded in 15min increments, billed monthly

- Dark web scan for company data or leaked credentials
- Open source intelligence & discovery of sensitive data
- Vulnerability scan across all external facing assets

- Identification of vulnerabilities within in-scope systems
- Demonstrating risks through controlled and evidenced exploitation
- Technical & executive-level findings with prioritised risk ratings
- Guidance & support for fixing vulnerabilities and security uplift
We test corporate networks, internal & external facing web apps, websites, APIs, Active Directory, Cloud Hosting Platforms (Azure, AWS, GCP), operational technology (OT), hardware, et al.
---
Cost depends on the scope of the system. For example a small web application might only be a 3 day engagement while a complete corporate network for a 500 employee enterprise might be 10 days, end to end.

- 24 / 7 / 365 availability for immediate response to live incidents
- Containment of incident and suppression of ongoing attacks
- Digital forensics, root cause analysis, and complete review of compromised assets to remove attackers from network and devices
- Securing of compromised systems and configuration recommendations to prevent recurrence
- Full report outlining incident, findings, timeline, and recommendations
---
An initial triage will be completed within 48h from initial contact for which the cost above is given. The initial triage will determine the extent of the breach, take immediate actions for containment and inform stakeholders as to whether further investigation and reporting is required. Full investigations can range from 10 up to 30 days or longer in larger environments with more extensive compromises and logs to review. All work beyond the 48h triage will be clarified and only initiated when the green light is given by the client to proceed.

- Participation in executive meetings to provide security considerations for business decisions
- Long-term security planning and roadmaps
- Assessment and review of cyber related vendor proposals, contracts, and insurance policies
- Evaluate and recommend security tools, MSP packages, and infrastructure improvements
- Develop tested, actionable response plans to mitigate breaches before they occur
- Provide ongoing insights into emerging cyber threats and strategic defensive recommendations
---
Recorded in 15min increments, billed monthly

- Dark web scan for company data or leaked credentials
- Open source intelligence & discovery of sensitive data
- Vulnerability scan across all external facing assets

- Identification of vulnerabilities within in-scope systems
- Demonstrating risks through controlled and evidenced exploitation
- Technical & executive-level findings with prioritised risk ratings
- Guidance & support for fixing vulnerabilities and security uplift
We test corporate networks, internal & external facing web apps, websites, APIs, Active Directory, Cloud Hosting Platforms (Azure, AWS, GCP), operational technology (OT), hardware, et al.
---
Cost depends on the scope of the system. For example a small web application might only be a 3 day engagement while a complete corporate network for a 500 employee enterprise might be 10 days, end to end.

- 24 / 7 / 365 availability for immediate response to live incidents
- Containment of incident and suppression of ongoing attacks
- Digital forensics, root cause analysis, and complete review of compromised assets to remove attackers from network and devices
- Securing of compromised systems and configuration recommendations to prevent recurrence
- Full report outlining incident, findings, timeline, and recommendations
---
An initial triage will be completed within 48h from initial contact for which the cost above is given. The initial triage will determine the extent of the breach, take immediate actions for containment and inform stakeholders as to whether further investigation and reporting is required. Full investigations can range from 10 up to 30 days or longer in larger environments with more extensive compromises and logs to review. All work beyond the 48h triage will be clarified and only initiated when the green light is given by the client to proceed.

- Participation in executive meetings to provide security considerations for business decisions
- Long-term security planning and roadmaps
- Assessment and review of cyber related vendor proposals, contracts, and insurance policies
- Evaluate and recommend security tools, MSP packages, and infrastructure improvements
- Develop tested, actionable response plans to mitigate breaches before they occur
- Provide ongoing insights into emerging cyber threats and strategic defensive recommendations
---
Recorded in 15min increments, billed monthly

- Dark web scan for company data or leaked credentials
- Open source intelligence & discovery of sensitive data
- Vulnerability scan across all external facing assets

- Identification of vulnerabilities within in-scope systems
- Demonstrating risks through controlled and evidenced exploitation
- Technical & executive-level findings with prioritised risk ratings
- Guidance & support for fixing vulnerabilities and security uplift
We test corporate networks, internal & external facing web apps, websites, APIs, Active Directory, Cloud Hosting Platforms (Azure, AWS, GCP), operational technology (OT), hardware, et al.
---
Cost depends on the scope of the system. For example a small web application might only be a 3 day engagement while a complete corporate network for a 500 employee enterprise might be 10 days, end to end.

- 24 / 7 / 365 availability for immediate response to live incidents
- Containment of incident and suppression of ongoing attacks
- Digital forensics, root cause analysis, and complete review of compromised assets to remove attackers from network and devices
- Securing of compromised systems and configuration recommendations to prevent recurrence
- Full report outlining incident, findings, timeline, and recommendations
---
An initial triage will be completed within 48h from initial contact for which the cost above is given. The initial triage will determine the extent of the breach, take immediate actions for containment and inform stakeholders as to whether further investigation and reporting is required. Full investigations can range from 10 up to 30 days or longer in larger environments with more extensive compromises and logs to review. All work beyond the 48h triage will be clarified and only initiated when the green light is given by the client to proceed.

- Participation in executive meetings to provide security considerations for business decisions
- Long-term security planning and roadmaps
- Assessment and review of cyber related vendor proposals, contracts, and insurance policies
- Evaluate and recommend security tools, MSP packages, and infrastructure improvements
- Develop tested, actionable response plans to mitigate breaches before they occur
- Provide ongoing insights into emerging cyber threats and strategic defensive recommendations
---
Recorded in 15min increments, billed monthly

- Dark web scan for company data or leaked credentials
- Open source intelligence & discovery of sensitive data
- Vulnerability scan across all external facing assets

- Identification of vulnerabilities within in-scope systems
- Demonstrating risks through controlled and evidenced exploitation
- Technical & executive-level findings with prioritised risk ratings
- Guidance & support for fixing vulnerabilities and security uplift
We test corporate networks, internal & external facing web apps, websites, APIs, Active Directory, Cloud Hosting Platforms (Azure, AWS, GCP), operational technology (OT), hardware, et al.
---
Cost depends on the scope of the system. For example a small web application might only be a 3 day engagement while a complete corporate network for a 500 employee enterprise might be 10 days, end to end.

- 24 / 7 / 365 availability for immediate response to live incidents
- Containment of incident and suppression of ongoing attacks
- Digital forensics, root cause analysis, and complete review of compromised assets to remove attackers from network and devices
- Securing of compromised systems and configuration recommendations to prevent recurrence
- Full report outlining incident, findings, timeline, and recommendations
---
An initial triage will be completed within 48h from initial contact for which the cost above is given. The initial triage will determine the extent of the breach, take immediate actions for containment and inform stakeholders as to whether further investigation and reporting is required. Full investigations can range from 10 up to 30 days or longer in larger environments with more extensive compromises and logs to review. All work beyond the 48h triage will be clarified and only initiated when the green light is given by the client to proceed.

- Participation in executive meetings to provide security considerations for business decisions
- Long-term security planning and roadmaps
- Assessment and review of cyber related vendor proposals, contracts, and insurance policies
- Evaluate and recommend security tools, MSP packages, and infrastructure improvements
- Develop tested, actionable response plans to mitigate breaches before they occur
- Provide ongoing insights into emerging cyber threats and strategic defensive recommendations
---
Recorded in 15min increments, billed monthly

- Dark web scan for company data or leaked credentials
- Open source intelligence & discovery of sensitive data
- Vulnerability scan across all external facing assets

- Identification of vulnerabilities within in-scope systems
- Demonstrating risks through controlled and evidenced exploitation
- Technical & executive-level findings with prioritised risk ratings
- Guidance & support for fixing vulnerabilities and security uplift
We test corporate networks, internal & external facing web apps, websites, APIs, Active Directory, Cloud Hosting Platforms (Azure, AWS, GCP), operational technology (OT), hardware, et al.
---
Cost depends on the scope of the system. For example a small web application might only be a 3 day engagement while a complete corporate network for a 500 employee enterprise might be 10 days, end to end.

- 24 / 7 / 365 availability for immediate response to live incidents
- Containment of incident and suppression of ongoing attacks
- Digital forensics, root cause analysis, and complete review of compromised assets to remove attackers from network and devices
- Securing of compromised systems and configuration recommendations to prevent recurrence
- Full report outlining incident, findings, timeline, and recommendations
---
An initial triage will be completed within 48h from initial contact for which the cost above is given. The initial triage will determine the extent of the breach, take immediate actions for containment and inform stakeholders as to whether further investigation and reporting is required. Full investigations can range from 10 up to 30 days or longer in larger environments with more extensive compromises and logs to review. All work beyond the 48h triage will be clarified and only initiated when the green light is given by the client to proceed.

- Participation in executive meetings to provide security considerations for business decisions
- Long-term security planning and roadmaps
- Assessment and review of cyber related vendor proposals, contracts, and insurance policies
- Evaluate and recommend security tools, MSP packages, and infrastructure improvements
- Develop tested, actionable response plans to mitigate breaches before they occur
- Provide ongoing insights into emerging cyber threats and strategic defensive recommendations
---
Recorded in 15min increments, billed monthly