Range of works on checking the cyber security processes quality in a company and the ability to track or prevent a possible attack. During the work, there is close interaction with the defense team to track down possible gaps in correlation rules, deficiencies in security information configurations or incident response processes.