Founded in 2019 as a consulting firm specializing in offensive security, threat landscape, and risk analysis. We attract and retain top talent by fostering a challenging, encouraging, and unique work environment that encompasses the hacker ethos; we value and respect skill, competence, ingenuity, and knowledge over formal education and status. Since our inception, we have secured high-profile cont...Founded in 2019 as a consulting firm specializing in offensive security, threat landscape, and risk analysis. We attract and retain top talent by fostering a challenging, encouraging, and unique work environment that encompasses the hacker ethos; we value and respect skill, competence, ingenuity, and knowledge over formal education and status. Since our inception, we have secured high-profile contracts in which we implemented solutions in conflict/post-conflict regions such as Latin America, Africa, Eastern Europe, and the Middle East. As a result of partnering with XIVX, our clients have successfully improved their security posture, conduct complex, covert, and bleeding-edge field projects, mitigate risk, and fulfill requirements governed by local and international regulatory bodies.XIVX services include (but are not limited to):- Penetration Testing, Vulnerability Assessment, Red Teaming- Setup, maintain, and audit network and infrastructure security- Deploy and maintain bespoke encrypted communication solutions- Assist organizations in analyzing their exposure to emerging threats and creating response mechanisms for the rapidly advancing attack vectors used by global threat actorsSpotlighted Engagements:- Implemented security measures for embassies and consulates, ensuring the protection of sensitive information and assets, along with meeting the required expectations of regulatory bodies- Provided unbiased, third party cybersecurity solutions for political elections in Latin America and Africa, bolstering the integrity of the democratic process- Conducted simulated, full-scale cyber attacks on networks, systems and critical applications, resulting in the strengthening of the target's security posture- Assisted global intel groups by providing advanced surveillance capabilities resulting in intercepting secure communications and illegal payment transactions of treat actors