.-.     .-.     .-.     .-.     .-.     .-.     .-.     .-.     .-.     .-.     .-.     .-.     .-.     .-.     .-.     .-.     .-.
offen\sive-s\ecurity♥\malware\researc\h♥foren\sics♥os\int♥inc\ident-r\esponse\♥threat\hunting\♥corpor\ate-esp\ionage-\investi\gation♥\
'     `-'     `-'     `-'     `-'     `-'     `-'     `-'     `-'     `-'     `-'     `-'     `-'     `-'     `-'     `-'     `-'     `

Emergency Response Security Group

Cyber Security since 1337
  .-.     .-.     .-.     .-.     .-.     .-.     .-.     .-.     .-.     .-.     .-.     .-.     .-.     .-.     .-.     .-.     .-.
secur\ity-res\earch♥t\hreat-h\unting♥\reverse\engineer\♥inves\tigatio\ns♥scri\pting♥l\inux-uni\x♥host\ing♥reg\istrars\exploit\s♥vuln♥\
'     `-'     `-'     `-'     `-'     `-'     `-'     `-'     `-'     `-'     `-'     `-'     `-'     `-'     `-'     `-'     `-'     `

Let Us Battle your Security Dragons



My name is Rhiannon, with my company, Emergency Response Security Group. I work with organizations that need support in email and operational cyber security. I am highly effective in high pressure situations, maintain strict discretion, and apply deep expertise across digital landscapes, open source intelligence, corporate investigation, malware analysis, and phishing defense. My approach is hands on and outcome driven, focused on strengthening your security posture and ensuring your operations run smoothly.

My goal is to help medium-large sized companies with their cyber security efforts. I bring 27 years of experience in cybersecurity and operate an established LLC. I existed before the bloatware, and before AI proved repeatable inefficiency. In fact, my entire craft is built on accuracy, an art-form that has been lost. My goal would be to support you, your organization, show marked improvement.

A conversation is welcome should you want to explore how I can support your organization. My standard terms are net 15, with an upfront engagement of half of one month to initiate services. I am based remote out of Oregon, and can work domestically from any US State. Travel optional.

There are an overwhelming number of solutions out there for any one thing, and what I'm finding is that those of us who know what were are doing are still fairly rare, thus I seek a signed engagement, 40 hours/week, for 1 calendar year of consulting.

Please let me know if you have any interest to discuss further or if you know someone who is looking for directness and an honest approach. I am eagerly seeking new contracts in this space.

_,.-'~'-.,__,.-'~'-.,__,.-'~'-.,__,.-'~'-.,__,.-'~'-.,_


For Hire - Service Offerings


  • Chief Information Security Officer
  • Cyber Defense and Security Operations
  • Brand and Executive Protection Advisory
  • Vulnerability and Exposure Management
  • Crisis and Business Continuity Planning
  • Threat Hunting - Security Research
  • Adversary Simulation
  • Open Source Intelligence
  • Corporate Espionage Investigation
  • Email Security & Intelligence
  • Digital Forensics and Investigations
  • Malware & Incident Analysis
  • Proactive Security Monitoring
  • Post Incident Review
  • Ransomware & Data Recovery
  • Corporate Security & Proactive Response
  • Security Awareness Training
  • Senior/Lead Staff Augmentation
  • Corporate Communications
  • Digital Ambassador Services
  • Blacklist Investigation
  • Digital Footprint Analysis
  • Private Investigation (pending)
  • Business Guidance

See pricing for more detail. We package by the hour or project.

Don't get caught with bad posture as ransomware hits. Prepare for an effective response with a professional.

_,.-'~'-.,__,.-'~'-.,__,.-'~'-.,__,.-'~'-.,__,.-'~'-.,_



Know thy Enemy


Email is the most common entry point for cyberattacks targeting small businesses. Hackers often use fake invoices, impersonation schemes, and malicious links to exploit busy teams. At Emergency Response Security Group, we deliver affordable, expert email security designed specifically for small business owners. With 26 years of hands-on experience and more than 55,000 hours in the field, I have built and trained a team equipped to safeguard your inbox, monitor threats, and provide detailed monthly reports so you can focus on your customers instead of cybercriminals. We do not just offer tools; we bring an advanced skillset that cannot be taught in schools. Allow us to demonstrate the difference. Our services are effective, reliable, and budget friendly.

See more here.

_,.-'~'-.,__,.-'~'-.,__,.-'~'-.,__,.-'~'-.,__,.-'~'-.,_