LMNTRIX
Linkedin LMNTRIX
Crunchbase LMNTRIX
Facebook LMNTRIX

People

HOW WE DO IT
- PEOPLE -

People are the most important aspect of LMNTRIX. It’s a cliché in virtually all areas of business, but it’s true.
In cyber defense one good analyst can do the job of 100 mediocre ones and so at LMNTRIX the quality
of our intrusion analysts is vastly more important than analyst quantity.

Moreover, while analysts can be trained to use a tool in a rudimentary manner, they cannot be trained in the mind-set or critical thinking skills needed to master the tool. As such at LMNTRIX we exercise great care in hiring and retaining our intrusion analysts.

A typical intrusion analyst at LMNTRIX is skilled in software development, scripting, ethical hacking, forensics, incident response, malware & threat analysis, reverse engineering, threat intelligence, PCAP analysis, network security and possesses multiple GIAC certifications.

To summarize
.01
Our team comes from diverse backgrounds,
possesses deep experience in IT, offense & defense
.02
We look for
out-of-the-box thinking like the adversary
.03
Our team understands
our mission and our customers networks
.04
We look for people who can build trust,
credibility, strong customer connections
.05
We hire for
Quality not Quantity
people-team
PROCESSES
While clearly defined processes are fundamental to achieving repeatable outcomes, at LMNTRIX we also understand that processes may need to be updated rapidly in response to new intelligence.
TECHNOLOGY
ACTIVE DEFENSE
Often times, the difference between preventing a cyber attack or suffering a crippling loss is simply knowing
where to look for the signs of a compromise.
DATA CENTRES,
SECURITY & CERTIFICATIONS
The LMNTRIX ACTIVE DEFENSE is hosted on Amazon Web Services; however, our platform can also be deployed in-house if there are security compliance regulations or audit standards that preclude you from using cloud services.
CYBER
DEFENCE CENTRES
At the core of our CDC is a strong foundation for operational excellence driven by well-designed and executed processes, strong governance, capable individuals and a constant drive for continuous improvement to stay ahead of the cyber adversaries
READY TO GET STARTED ?

Our security experts are standing by to help you with an incident or answer questions about our
consulting and managed detection and response services.

Privacy Statement | Terms of Use