Search

Page

Thank you!

A Focal Point team member will be in touch shortly. In the meantime, join us on LinkedIn to get the…
Service

Cyber Threat Hunter

Sam is an incident responder with two years of experience. Sam will be participating in a development program to build threat-hunting capabilities.
Service

Malware Triage Analyst

Alex is an incident responder on her company’s cybersecurity team. After a year, she is looking to advance her skills. Her love for research and analysis makes her a perfect fit for malware triage analysis.
Service

Malware Reverse Engineer

Olivia is a software developer who has been with her company for 6 years. Through a company program, she has elected to complete cybersecurity training and is transitioning to a Reverse Engineering role.
Service

SOC Analyst 1

Raj had been in an IT admin role at his old company for 4 years, growing into a senior admin. He is looking for an opportunity to start a career in cybersecurity.
Service

HITRUST

The HITRUST CSF® provides organizations with a comprehensive, flexible, and efficient approach to regulatory compliance and risk management.
Service

SOC 2

A SOC 2 report provides your customers with assurance that your organization has operational controls in place to protect their security, availability, processing integrity, confidentiality, and privacy.
Service

SOC 1

A SOC 1 report can take your client relationships to the next level by providing assurance that your organization has the controls in place to protect their financial reporting processes.
Service

Rapid IAM Assessments

Measure your identity and access management maturity with a targeted assessment and actionable roadmap.
New Search