advisory analysis assessment attack attackers automation aws cmmc code compliance consultancy cyber cyber-security cybersecurity deception defence defenders detection disaster-recovery edr endpoints enumeration forensics hackers infrastructure invinsense iso mdr migration monitioring monitoring offensive optimization orchestration organization payloads penetration phishing pretext process python reconnaissance redteam response security services siem soar soc technologies technology testing toc vishing visibility vulnerabilities vulnerability xdr