Team Strength
Certified excellence backed by experts delivering innovative, results-driven solutions
What We Do?
Streamlining processes with precision, intelligence and scale.
Work We're Proud Of
Trusted by forward-thinking companies worldwide
Managed Cyber Resilience Program for Banking Sector
We deployed FortiSIEM, an enterprise-grade SIEM platform aligned with global best practices, and provide 24x7 security monitoring to detect and respond to threats in real time. Our services include quarterly Vulnerability Assessments using Tenable Vulnerability Scanner and semi-annual Penetration Tests across network, web, API, and mobile assets with detailed remediation guidance. The engagement incorporates Incident Response Retainer with Root Cause Analysis and integrated threat intelligence through FortiIOC to strengthen overall security posture and operational resilience against evolving cyber threats.
Banking Sector Information Security Audit
We conducted a comprehensive Information System Audit assessing IT governance, infrastructure, and security controls in compliance with regulatory IT Guidelines, Cyber Resilience Framework, and ISO/IEC 27001:2022 standards. Our engagement covered IT Governance, Infrastructure Security, Business Continuity Planning, IT Operations, and SDLC using M365 Suite for collaboration and documentation. We performed Cyber Resilience Maturity Assessment using NIST CSF and CERT-RMM frameworks, VAPT on critical systems, and reviewed disaster recovery processes, delivering prioritized recommendations to enhance governance and security posture.
Energy Sector SOC Implementation
We established and operationalized a 24x7 monitoring, detection, and response capability for a leading Energy Sector Organization. The SOC was designed to proactively identify, analyze, and mitigate threats across critical infrastructure and OT environments aligned with NIST CSF and MITRE ATT&CK. We deployed a Fortinet cybersecurity stack including FortiSIEM, FortiSOAR, FortiNDR, FortiDeceptor, and FortiSandbox, integrating UEBA and Deception Technology to detect anomalous activity and lateral movement attempts for enhanced threat detection.
vCISO Services for SaaS Company
We provided Virtual Chief Information Security Officer services to establish a robust Information Security Management System aligned with ISO/IEC 27001 standards. Our engagement included developing comprehensive security policies, conducting risk assessments, defining control frameworks, and guiding the organization through ISO 27001 certification readiness. We delivered cloud security monitoring enablement using SayCure SIEM platform, integrating continuous visibility and alerting for their cloud environment to ensure proactive threat detection, alignment with ISO 27001 operational controls, and enhanced cyber resilience posture.
Ransomware Incident Response for Call Center
We responded to a critical ransomware outbreak that encrypted the entire internal server infrastructure. Our Incident Response team deployed on-site, initiated containment using endpoint isolation and containment utilities, and restored essential business functions through disaster recovery orchestration and data restoration systems. We performed comprehensive log analysis using network traffic analysis and log correlation platforms, traced the infection chain, and identified the root cause as a Check Point VPN Gateway zero-day vulnerability (CVE-2024-24919). We executed full containment and eradication using DFIR toolkits, patching the VPN gateway, rotating credentials, and implementing continuous monitoring for anomaly detection.
SIEM & NDR Implementation for Telecom
We implemented LogRhythm SIEM and LogRhythm NetMon (Network Detection & Response) solutions at a major Telecommunications Service Provider. The deployment was architected on bare-metal foundation providing maximum performance and scalability for petabyte-scale log ingestion. We adopted a distributed high-availability strategy for continuous monitoring and fault tolerance across network segments and data centers. We integrated and configured the LogRhythm SOAR module to improve automated threat response, enabling advanced correlation, automated incident triage, and faster remediation by security responders.
Fintech VAPT & Cloud Security Assessment
We identified a complex attack chain enabling complete compromise of a Fintech client's production website through a vulnerable subdomain using advanced web exploitation frameworks and manual analysis. By exploiting the service, we gained access to the development environment and discovered exposed AWS keys using custom YARA rules for secret discovery and artifact scanning. These keys granted access to cloud storage buckets containing sensitive KYC data. We introduced a controlled JavaScript payload using our in-house JavaScript instrumentation toolkit to validate potential credential exposure in secured sandbox environments, demonstrating how environment segregation failure could escalate into full-scale production compromise following OWASP and PTES methodology.
Red Team Assessment for IT Provider
We executed an authorized, objective-driven Red Team engagement to validate the client's detection, response, and recovery capabilities by achieving production server access. We carried out a covert, multi-vector campaign using commercial and open-source network exploitation frameworks, blending simulated APT playbooks with targeted social engineering toolsets and physical intrusion techniques. We exploited people, process, and technology attack paths to bypass controls, pivot across internal networks using bespoke tooling for covert persistence and lateral movement with detection evasion techniques, and ultimately achieve physical server room entry using physical access toolkits. All activity was conducted under strict rules of engagement and safety controls.
ISO 27001 & 27701 Certification for Telecom Company
We conducted Gap Assessment, document preparation, ISO 27001:2022 readiness, and certification for ISO 27001 and ISO 27701 standards for NCELL using ISO 27001 (ISMS) and 27701 (PIMS) toolkits. Our engagement covered comprehensive policy development, control framework establishment, and guidance through the certification process. Post-certification, we secured a multi-year contract to facilitate recurring surveillance audits, assisting NCELL to maintain security hygiene, ensure ongoing compliance, and continuously enhance their information security maturity across all operational domains aligned with international standards.
Banking Sector Phishing Simulation
We designed an annual attack calendar aligned to peak-risk windows including festivals, national holidays, and special occasions. We executed multi-wave phishing simulations covering spear phishing, credential harvesting, and link-based scenarios. Targets were segmented by role and risk profile to measure organizational awareness levels. We delivered role-specific micro-training and follow-up reinforcement for users who engaged with simulated lures, using custom GoPhish deployment in a hardened, sandboxed environment to institutionalize security awareness.
Industry Recognized Security Team
Partnering with companies of all sizesโfrom startups to enterprises.
Contact Us
Every great idea starts with a conversation โ let's talk.
USA Office ๐บ๐ธ
Minneapolis, MN
USA Phone
+1-214-734-7234
Nepal Office ๐ณ๐ต
Mahalaxmisthan, Patan, Nepal
Nepal Phone
+977-01-5916093
Email
info@codingmountain.com