cyber security is our roman empire. WHAT IS yours?

Hi,I’m Eva Georgieva,

and I’m a Security Engineer.

Let's join forces to piece together the perfect security solution for you.

Isometric Geometric 3d Objects And Lines
Isometric Geometric 3d Objects And Lines
Isometric Geometric 3d Objects And Lines
Isometric Geometric 3d Objects And Lines
Isometric Geometric 3d Objects And Lines


penetration ​testing

Download Outline Icon
Add Button Icon


Add Button Icon


Add Button Icon

Cybersecurity ​Training and ​Awareness ​Programs

Add Button Icon

Cloud ​Security ​Solutions

Add Button Icon

Research and ​Article Writing

Add Button Icon




Location Pin Illustration

munich, germany


I have over 3 years of experience ​with working on both offensive and ​defensive teams, from conducting ​penetration tests for web ​applications, web servers, mobile ​applications, APIs to setting up a ​SOC center from scratch, ​analyzing logs, setting up alerts, ​monitoring the systems, creating ​reports based on that data, ​maintaining and improving the ​overall alerting system. Having a ​wide spectrum of job roles and ​responsibilities allowed me to build ​methodologies and skills utilizing ​the perspective of both the ​defender and the attacker.



  • Penetration Testing (Android, IOS, Web, ​API)
  • Security Automation (Python)
  • Cloud Security Assessments
  • Log Analysis
  • Incident Response and Forensics

projects dear to heart

#hackintocybersec - In partnership with ​Ollmoo ( we ​created a beginner course where we ​specifically target women with a goal to ​bring free cybersecurity education to ​women worldwide and contribute towards ​reducing the gender gap in the field.

BS Computer Science

Computer Science and Engineering



Modern Geo Rounded Rectangle


Modern Geo Rounded Rectangle


Modern Geo Rounded Rectangle


Modern Geo Rounded Rectangle



Monoline Lab Tested Icon

Wide range of testing packages available, ​including vulnerability scanning, cloud ​infrastructure assessments, web, API, ​mobile penetration testing packages.

Cybersecurity is not just a checkbox, ​assess and maintain your security at a ​continuous cycle.


  • Initial Consultation and Scoping
  • Pre-Testing Preparation
  • Ethical Hacking and Penetration ​Techniques
  • Manual and Automated Testing
  • Post-Exploitation Analysis
  • Comprehensive Reporting
  • Remediation and Recommendations
  • Follow-Up and Re-Testing
  • Ongoing Support and Consultation
Isometric Geometric 3d Objects And Lines


Bubble Chat Typing

We specialize in providing expert Security ​Consultation services, tailored to ​safeguard your business in the digital ​landscape. Our team of seasoned security ​professionals is dedicated to identifying ​and mitigating risks, ensuring your data ​and assets are protected against evolving ​cyber threats.

Isometric Geometric 3d Objects And Lines

From comprehensive risk assessments to strategic ​security planning, we offer personalized guidance to ​fortify your defenses, comply with regulations, and ​foster a resilient security culture. Partner with us to ​navigate the complexities of cybersecurity and secure ​your business's future.


Embarking on a career in cybersecurity can often feel like ​stepping into an intricate telenovela – full of complex ​characters and a plot that twists and turns unpredictably. ​For those who are new to this dynamic field and seeking a ​pathway to an entry-level job, especially without the ​daunting 3-5 years of experience usually required, our ​mentorship services are here to guide you through every ​scene of this thrilling journey.

Skill ​Development ​Guidance

Resume and ​LinkedIn ​Optimization

Isometric Geometric 3d Objects And Lines

Interview ​Preparation

Personalized ​Career Mapping

3D Geometric Shape 09


Cybersecurity is not just about having the right tools; it's about having a team that's ​aware, trained, and prepared. Our Cybersecurity Training and Awareness Programs are ​designed to empower your workforce with the knowledge and skills needed to protect ​your organization from digital threats. We believe that a well-informed team is your first ​and best line of defense against cyber attacks. Our programs are tailored to suit the ​unique needs of your organization, ensuring that every employee, from the front desk to ​the executive suite, understands their role in maintaining cybersecurity. Engage with us to ​transform your team into an informed, vigilant, and resilient force against cyber threats.


In today's digital age, the shift to cloud ​computing is inevitable, but it brings a unique ​set of security challenges.

Our Cloud Security Solutions are crafted to ​address these challenges head-on, ensuring ​your business leverages the power of cloud ​computing while maintaining robust security.

Lined Doodle Clouds

Cloud Security Risk Assessment

A comprehensive assessment of your cloud environment. This includes ​identifying sensitive data, understanding your cloud architecture, and ​evaluating existing security measures. Our goal is to pinpoint vulnerabilities ​and provide a clear picture of your cloud security posture.

Cloud Penetration Testing

This service involves simulating sophisticated cyber attacks against your cloud ​environment to identify vulnerabilities before they can be exploited by malicious ​actors. Our expert team uses a variety of techniques, tailored to cloud ​architectures, to rigorously test the security of your cloud services.

Detailed Vulnerability Reporting and Remediation ​Guidance

Post-testing, we provide an in-depth report detailing any vulnerabilities and ​security gaps discovered. This report not only prioritizes the risks but also ​includes detailed remediation steps. We guide you through fixing these ​vulnerabilities, enhancing your overall cloud security posture.


Stay ahead in the ever-evolving world of ​cybersecurity with our specialized Security ​Research and Article Writing Service. We ​delve deep into the latest trends, emerging ​threats, and innovative solutions in the ​cybersecurity landscape to bring you ​insightful, well-researched articles.

Information gradient icon

Our team of expert researchers and skilled writers are dedicated to ​producing high-quality, engaging content that not only informs but ​also empowers. Whether you’re looking to educate your audience, ​keep your team updated on the latest security protocols, or establish ​thought leadership in the cybersecurity domain, our bespoke articles ​are tailored to meet your objectives. Partner with us to illuminate the ​complex world of cybersecurity with clarity and expertise.

work with us

For inquiries

For mentoring