— Services

Five things,
done well.

A small surface area on purpose. Each of these is something I actually do — not a marketing list. If your problem isn’t here, ask anyway, I’ll tell you honestly whether I can help or who you should call instead.

01

Pen testing & security assessments

Hands-on testing of your network, devices, and exposed services. Findings that prioritize real impact, not checklist theater.

— Who it’s for

Small businesses, professional offices, and individuals who need to know whether their setup would survive an attempt to break in.

— What you get
  • Scoped engagement document before work starts
  • Active testing of in-scope assets — network, exposed services, common attack paths
  • Written report with findings ranked by exploitability and impact
  • Executive summary suitable for non-technical stakeholders
  • A short call to walk through findings and answer questions
— Pricing

Fixed fee per engagement. Most small-business assessments land in the low-to-mid four figures, depending on scope. You get a quote before you commit.

— Timeline

1–3 weeks from start to report.

02

Threat assessments

Strategic posture review. What’s exposed, what’s likely, and what to fix first — for people who want to act before they get tested.

— Who it’s for

Owners and operators who haven’t had a security review in years (or ever) and don’t know where to start. Less invasive than a pen test, more strategic.

— What you get
  • Asset and exposure inventory — what you actually have running
  • Threat model: who realistically targets you, and how
  • Prioritized remediation plan with quick wins, medium-effort fixes, and longer-term improvements
  • Plain-language report — readable by you, your bookkeeper, your IT person
— Pricing

Fixed fee. Lower than a full pen test because we’re not actively breaking in. Quoted after a 30-minute scoping call.

— Timeline

1–2 weeks.

03

Network audits & UniFi consulting

Hardening home and small-business networks. Segmentation, IoT isolation, monitoring, VPN. UniFi specialty.

— Who it’s for

Anyone running a non-trivial home or office network — multiple VLANs, IoT devices, cameras, work-from-home gear, smart home integrations.

— What you get
  • Review of your current network topology and configuration
  • VLAN and segmentation recommendations (especially IoT isolation)
  • Firewall rule audit
  • WiFi security review — guest networks, hidden SSIDs, WPA configurations
  • Optional: setup or migration help if you’re moving to UniFi or hardening an existing deployment
— Pricing

Hourly for setup work, fixed-fee for audits. UniFi migration projects quoted after a scoping call.

— Timeline

Audit: a few days. Setup work: scoped per project.

04

Custom hardware & tooling

ESP32, RF, SDR, embedded sensing. Built for a specific job, documented, repairable. Open to weird requests.

— Who it’s for

People who need a tool that doesn’t exist commercially — a passive RF logger, a custom sensor rig, a security-focused embedded device for a specific environment.

— What you get
  • Working hardware, designed and built to spec
  • Source code in your hands (typically published to GitHub unless you need it private)
  • Documentation — wiring, config, how to maintain or modify it
  • Optional: enclosure, mounting, deployment
— Pricing

Quoted per project after a scoping conversation. Most small builds run in the high three to low four figures including parts.

— Timeline

2–6 weeks depending on complexity.

05

Cyber awareness workshops

Free community classes on phishing, scam calls, AI voice cloning, and how to actually stop them. Designed for everyone, with extra focus on the scams targeting older adults.

— Who it’s for

Libraries, senior centers, HOAs, churches, community centers, professional offices. Anyone with a room and an audience that’d benefit.

— What you get
  • 60-minute, 2.5-hour, or 4-week format depending on what works for you
  • Live AI voice cloning demo
  • Printed wallet cards and red-flag handouts for every attendee
  • "Bring your weird email" Q&A clinic at the end
  • Optional pre/post survey if you’re tracking outcomes
— Pricing

Free. Always. The workshops are not a sales funnel.

— Timeline

Book 2–4 weeks ahead.

— How pricing works

No hourly meter.
No surprises.

Most security consultants bill hourly, which incentivizes the wrong things — long engagements, padded reports, slow turnarounds. I don’t work that way.

Every engagement gets a fixed fee, agreed in writing before any work starts. If a project gets bigger than expected, I tell you before I keep going. If it gets smaller, you don’t get a surprise invoice. The only services I bill hourly are setup and migration work, where the scope is genuinely open-ended — and even then, you get an estimate up front.

The workshops are free, period. That’s not a loss leader or a funnel. It’s the part of this work that I think shouldn’t cost money.

Not sure which fits?
That’s normal.

Email me with what’s going on, in plain language. No form, no qualifying questions, no sales call. I’ll tell you honestly which (if any) of these is the right fit, or send you to someone who can help.