We're here,
because
they‘re
out there

Hackers don’t rest, and nor do we. We’re here to be always-on, ever-watchful, and relentless in our passion for keeping your business safe against a threat that is increasingly sophisticated. That’s why Cyber Research attracts the best people who pride themselves on being as skilled and determined as the cyber criminals they outwit. In the end, it’s our people who make the difference. [ read more ]

Why Cyber Research

Long before our competitors were in business, Cyber Research was investigating fraud (corporate and serious insurance fraud) and responding to cyber crime in a way that attracted only the most experienced, talented individuals. Today is no different, and the team who share our DNA for world-class cyber security will give you the absolute confidence of knowing the right eyes are on the glass. [ read more ]

We listen first

Right now, the sharpest tool in cyber security is quite possibly a good pair of ears. We’re here to understand your inherent risk profile and recommend the most appropriate type of cyber security your organisation requires, and it starts with a simple, no obligation conversation. Today is good, so give us a call.

The people who trust us

Because of the calibre of people we attract, and our commitment to innovation and excellence, Cyber Research has been chosen by the world’s leading cyber security vendors. So when you work with us you’re also working with them.

Some of the companies we protect

Here are some of our clients whose trust we have earned and strive to retain.

Managed Security Operations

A blend of highly skilled analysts, focused on protecting your organisation's key IT assets, 24 hours a day, 365 days a year. Cyber Research designed their SOC from the ground up in recent years to align with growing customer demand for authentic, proactive security analysis and threat hunting.

Managed Security Services

Cyber Research, powered by their partners NetSkope, OKTA, Crowdstrike, LogRhythm, Tenable and Darktrace deliver fully managed and supported "Zero Trust" capability as a managed security service.

Zero Trust

Zero trust security throws away the idea that we should have a “trusted” internal network and an “untrusted” external network. The adoption of mobile and cloud means that we can no longer have a network perimeter-centric view of security; instead, we need to securely enable access for the various users (employees, partners, contractors, etc.) regardless of their location, device or network -- a reality that's felt even more significantly in today's remote environment.

Security Testing

As one of the strongest and most respected services in the industry, our ‘Red Teams’ emulate real-world cyber adversaries to test your organisation's security controls and help you become better prepared to prevent and resist future attacks.

Security Consulting

With so many different threats to deal with, and a multitude of people and products that claim to solve the security puzzle, Cyber Research helps you assess the real threats, risks and then work out a pragmatic and straight forward plan to mitigate them.

Born to protect

Many people, one goal. Our people in Melbourne, Wellington and Auckland come from many different backgrounds, ethnicities and interests and collectively, able to speak 8 different languages.  All of which brings to the table a rich and varied perspective on how to work on our clients’ complex cyber security challenges. This is who we are; a group of brilliant, diverse minds who love to fly vintage planes, excel at cooking or fitness, spearfish (sustainably) and who donate their time to the community. But all of us share the one common goal that matters – to be the best at what we do.

People who make the difference

Steve Byrne
Managing Director

With his spearfishing career going nowhere, and having already memorised the recipes for over 100 Negroni cocktails, Steve founded Cyber Research in 2007. He has more than 25 years experience in Information Management and InfoSec roles.

Steve Byrne

His experience covers hundreds of forensic investigations and incident responses across criminal and civil fraud cases, cyber-crime and employee relations. Steve is an experienced Pen Tester/Red Teamer who specialises in Social Engineering, surveillance and physical security assessments.

Steve is passionate about quality and authenticity, and is responsible for driving innovation across Cyber Research's products, services and processes. He also makes a totally ‘meeean’ brisket on his Kamado Joe bbq.

John McColl
Chief Technology Officer

Forensic Analyst, Incident Responder and Penetration Tester. Highly experienced in both red and blue team leadership and business development. SOC leader. Born in NZ and worked in Hong Kong, Malaysia, Indonesia, Singapore and Australia.

John McColl

Forensic Analyst, Incident Responder and Penetration Tester. Highly experienced in both red and blue team leadership and business development. SOC leader. Born in NZ and worked in Hong Kong, Malaysia, Indonesia, Singapore and Australia.

Grace Lee
Cyber Threat Analyst, Penetration Tester

From life as a Fine Arts student to the fine art of cyber security, Grace is a key member of the Security Analyst team, adept at all aspects of SOC operations including Threat Hunting, SIEM operation and management. She is also regularly involved in Penetration Testing and Red Team projects.

Grace Lee

Grace's passion for Cyber Security carries through to her personal life publishing articles on her Red/Blue team security experiments.

Qualifications:
BEng (Comp) (Hons) University of Canterbury, Offensive Security Certified Professional (OSCP) [2020], LogRhythm Platform Administrator (LRPA) [2019], HackTheBox: Pro Hacker Rank.

Shyam Kumar
Principal Security Consultant – Security Testing

Shyam’s 10 years of professional penetration testing experience spans many companies and industries working across USA, UK and India, prior to residing in New Zealand. He was part of Advanced Infrastructure hacking training team in Blackhat EU (2015, 2016) and Blackhat US (2019). However, his chicken Biryani is his self-proclaimed greatest talent.

Shyam Kumar

Shyam’s 10 years of professional penetration testing experience spans many companies and industries working across USA, UK and India, prior to residing in New Zealand. He was part of Advanced Infrastructure hacking training team in Blackhat EU (2015, 2016) and Blackhat US (2019).

However, his chicken Biryani is his self-proclaimed greatest talent.

Qualifications:

  • Bachelor of Technology in Computer Science Engineering

Certifications:

  • Offensive Security Certified professional
  • CREST Registered Penetration Tester (CRT)
  • CREST Practitioner Security Analyst
  • Microsoft certified azure security engineer associate
  • Microsoft certified azure administrator associate
  • Microsoft certified azure devops engineer expertStuff

Jon Hautler
Principal Security Consultant

Jon lives and breathes cyber security, even when he’s scuba diving. His 20 years of extensive information security experience helps companies develop and implement security strategies and solutions.

John Hautler
He has held senior security roles in both corporate and advisory contexts with time spent in Defence, Financial Services and Telecommunications. Jon’s ability to gain a sound understanding of an organisation’s technical security controls, its weaknesses, and then make pragmatic recommendations to improve them is invaluable.

Patrick Fautuaalii Taia.
Cyber Threat Analyst

Patrick can dribble a basketball like a pro, but these days he’s also busy being a new Dad (a different kind of dribbling we think). He joined us from Skycity where he was a Systems Analyst responsible for a wide range of security products including Web Proxies, Mail Gateway, SIEM and Endpoint Protection.

Patrick Fautuaalii Taia

His experiences have led to a strong interest in environment hardening, focusing on optimising our clients security tools. Recently Patrick came first in Asia Pacific while competing in LogRhythm's "Log Wars" competition. Champ!

Qualifications:
BCom/BSC from University of Auckland. COMPTA Cyber Security Analyst+

Harwinder Singh
Cyber Threat Analyst, Penetration Tester

Harwinder is extremely strong in a number of areas, literally. He brings a wealth of knowledge from his comprehensive training in networking, programming and cyber security, but with a love of bodybuilding and fitness he can also out-lift, out-bench and out-run nearly all of us here at Cyber Research.

Harwinder Singh

He’s also an absolute pro at the CTF challenges on Hackthebox. The rest of the time Harwinder provides Threat Hunting and operation maintenance of SIEMs for our clients.

Qualifications:
B.C.A. (Bachelor of Computer Applications) India. Masters in Networking Administration. Graduate Diploma in Computing ( Major Cyber-Security) UIT Auckland. OSCP and LRPA Certificates

Anoop Issac
Cyber Security Threat Analyst – SOC Team

Lucky for us Anoop chose cyber security over a career as a Formula One driver or a professional footballer. His specialism is transaction risk investigation, threat hunting, SIEM operation and management.

Anoop Issac

Lucky for us Anoop chose cyber security over a career as a Formula One driver or a professional footballer. His specialism is transaction risk investigation, threat hunting, SIEM operation and management.

Qualifications:
B.Eng in electronics and communication engineering. University VTU, India.

Certifications:
Crowdstrike Certified Falcon Administrator

Tenable.io Certificate of Proficiency

 

Mike Stoodley
Principal Security Consultant

Mike dabbles in music – playing and recording, but his musicality takes a backseat to his talent as a Cyber Security specialist with 20+ years of experience, including being a virtual CISO, awareness specialist and security manager.

Mike Stoodley

Mike's a legend at managing security in ambiguous environments, always looking for creative ways to solve problems, with a record of standing up security capabilities and turning around struggling compliance (PCI DSS, ISM) programs.

He’s especially on song in the creation and delivery of security governance models, strategies, roadmaps, risk assessments, reviews, architecture, policies and processes. Mike brings a lot of experience in Financial Services, Health, Broadcast, Technology Integrator and Telecommunications sectors.

Qualifications:
CISSP, CISM, SABSA foundations & BSc(hons) Information Science

Mark Richardson
Principal Security Consultant vCISO

Mark is a keen sailor and musician – often at the same time. He just loves Cyber Security with his last six years specialising in enterprise security remediation as CISO and vCISO.

Mark Richardson

Mark is a keen sailor and musician – often at the same time. He just loves Cyber Security with his last six years specialising in enterprise security remediation as   CISO and vCISO.  His 20 years of experience across IT, commenced as a network security engineer deploying and maintaining multi-vendor technologies such as forward/reverse proxy, firewall, mail scrubbing, WAF, IPS, RADIUS and VPN concentrators across a multitude of NZ based and and global organisations.

Qualifications:
MBA University of Auckland Business School.

Murdoch Thomson

Murdoch enjoys emersion in complex privacy and data protection matters. He has worked for some of the most recognisable Fortune 100 organisation in finance, banking, healthcare, mass market retail & telecommunications across USA, UAE, UK and now New Zealand.

Murdoch Thomson

Murdoch enjoys emersion in complex privacy and data protection matters. He has worked for some of the most recognisable Fortune 100 organisation in finance, banking, healthcare, mass market retail & telecommunications across USA, UAE, UK and now New Zealand.

His area of expertise is in developing and implementing policy and procedures to meet compliance requirements in data privacy risk and protection. Space technologies and space traffic management provide distractions outside of his day job (Did we mention his interest in Star Wars Lego?)

Qualifications:
LLB (1st Class Honours)

LLM (Distinction) International and Commercial Law

LLM Space, Cyber, and Telecommunications Law

Certifications:
IAPP Certified Information Privacy Professional US (CIPP/US)

IAPP Certified Information Privacy Manager (CIPM)

IAPP Certified Information Privacy Technologist (CIPT)

BSI ISO 27001 Lead Implementer

BSI ISO 9001 Internal and External Auditor

Richard Brenan
Commercial Manager

When he’s not biohacking his body to improve his fitness, Richard is an integral part of our elite team. His broad range of skills provide valuable internal services including sales and marketing, vendor liaison, commercial support, and project management of our complex customer engagements.

Richard Brenan

Richard’s career has seen time spent working for fintech, legal, IT, engineering, entertainment, food and logistics companies in London, Melbourne and Auckland. As such, he’s like a utility player who is able to manage tasks from several disciplines concurrently and coordinate work between disparate teams. He is regularly engaged by our clients in a professional services capacity.

Qualifications:
BBus (IT & Marketing)
ITIL Foundation Cert.

Megan Barr
People and Culture

Some working mothers take their kids to school in a car. In the past, Megan used a jetski. That’s how she rolls, or rides for that matter. Megan has led the people and culture side of the business since inception, as well as project management of internal company change initiatives.

Megan Barr

She is an experienced OSINT practitioner, and an accomplished social engineer who plays integral roles in red teaming and cyber awareness engagements.

Megan has worked extensively in fraud investigation support roles providing CCTV analysis, OSINT, and surveillance.

Marcus Kohn-Taylor
Chief Operating Officer

The one who collects New Zealand art, cooks and can apparently still touch his toes thanks to years of yoga. Marcus has a proven Executive track record in driving growth strategies from ‘start-up to scale-up’ in complex, & regulated markets of Australia and New Zealand.

Marcus Kohn-Taylor

In the past, in three LT roles, he's contributed to two trade sales ($65m and $70m) and another (at time of exit) from start-up to $A700m annual revenues. Now that’s as sharp as the knives he uses to slice the Chateaubriand.

Qualifications:
NZCM

The Last Word

Because cyber-crime is constantly evolving, we keep expanding and improving our industry-leading products and services with one aim – to become Australasia’s strongest and most effective security partner for your business. So isn’t it time we had a talk?

The best place to start is with a conversation so we can listen to your needs; please call or email us here.

Phone +64-9-869-8825

    This site is protected by reCAPTCHA, Google's Privacy Policy and Terms of Service apply.