IronSky

Scope Your Security Assessment

Tell us about your requirements and we will get back to you within 24 hours with a tailored proposal.

01

Define Your Scope

Complete the form below with your requirements. The more detail you provide, the more accurate our proposal.

02

Receive Your Proposal

We review your requirements and send a tailored proposal within 24 hours including scope, methodology, timeline, and pricing.

03

Start Your Engagement

Sign the statement of work and authorisation letter. We schedule your assessment and begin testing.

Tell Us About Your Requirements

  • Assessment Details

    Select the services you are interested in and provide as much detail as possible.
  • IP addresses, URLs, number of applications, network ranges, or any other relevant details.

All information provided is treated as strictly confidential.

What to Expect

  • A member of our team will review your requirements
  • You will receive a detailed proposal within 24 hours
  • The proposal will include scope, methodology, timeline, and pricing
  • No obligation, no pressure

Frequently Asked Questions

Most assessments take between 5-10 business days for testing, with the full engagement (scoping through final report) typically running 3-6 weeks. Red team engagements can run 3-6 months.

You will need to designate a point of contact, provide the scope (IP addresses, URLs, or application details), sign a statement of work and authorisation letter, and ensure your team is available for questions during testing.

We take every precaution to avoid disruption. Testing windows and any potentially disruptive tests are agreed upon in advance. We can test against staging environments where preferred.

A detailed report including an executive summary, methodology, all findings with severity ratings and evidence, remediation recommendations, and an Excel tracker for remediation management. We also present findings in a debrief session.

Yes. We include a retest within 30-90 days of the initial engagement to verify that identified vulnerabilities have been properly remediated.

Our testing follows industry-standard frameworks including OWASP Top 10, OWASP API Security Top 10, OWASP MASVS, PTES, and MITRE ATT&CK. We tailor our approach based on the specific engagement requirements.

Not Sure What You Need?

Book a 15-minute consultation and we will help you determine the right assessment for your organisation.