Incident Response & Forensics

Contain the chaos. Prove the facts.

We respond like operators: fast triage, safe containment, and deep forensics when it matters. Our process is aligned to NIST 800-61 and ISO 27035, and our comms are executive-friendly so you can brief leadership with confidence.

  • Rapid triage, containment & eradication
  • Disk, memory & network forensics with chain-of-custody
  • Malware analysis, IOCs, and threat actor TTPs
  • Clear communication, timelines, and audit-ready artifacts
Rapid IR engagement
starting at $500

Focused triage and containment for a single workload, tenant, or incident stream. Scale up to full DFIR with forensics, malware analysis, and threat hunting as the picture evolves.

Compromise
  • Web shell, defacement, or data theft
  • Credential theft, session hijack, MFA bypass
  • Email takeover (BEC) & risky OAuth grants
Cloud
  • Key/token leaks, public buckets, metadata abuse
  • IAM misconfig, privilege escalation, drift
  • Suspicious console/API activity & anomalous regions
Endpoint
  • Ransomware readiness & response
  • Persistence, lateral movement, shadow IT
  • EDR tamper/evasion and hardening checks
Malware Analysis
  • Static & dynamic analysis (sandbox/VM)
  • Behavioral mapping & kill-chain reconstruction
  • YARA/IOC packages & Sigma rules
  • Containment & hardening guidance
Deliverables include indicators, decoded configs, timelines, and recommended detection & control improvements.

The first 24 hours

01IntakeSignal, assets, constraints, confidentiality
02ScopeHypotheses, response plan, comms cadence
03AcquireLogs, disks, memory with custody controls
04ContainAccess controls, network blocks, account actions
05HuntPivot, correlate, confirm patient zero & spread
06BriefFindings, risk, decisions & next moves

What you get

IR logbook

Time-stamped actions, owners, and rationale — built for audit, legal, and post-mortem.

Artifacts

Images, memory captures, PCAPs, parsed logs, and structured evidence with hashes.

Findings

Root cause, blast radius, impacted identities/assets, and attacker TTPs mapped to MITRE ATT&CK.

Remediation

Containment steps, hardening checklist, detection content (IOCs/YARA/Sigma), and validation plan.

Prefer standby?

IR retainers with priority line, predefined SLAs, and discounted hours. Tool-agnostic — we work with what you have.

Starter
  • Priority email
  • 10 standby hours
  • Discounted overage
Team
  • Priority email + chat
  • 25 standby hours
  • Quarterly tabletop exercise
Ops
  • Priority hotline
  • 50 standby hours
  • Playbooks, detections & reviews
Need help now or want a quote?
Send the signal, assets, and timelines. We’ll reply quickly with scope, options, and a clear plan — starting at $500.
services@knightsquad.org