Services Assessment Stack Process FAQ Contact

The quiet work of keeping things safe.

CD Grayson is a small data and cybersecurity consultancy. We audit, test, harden, and watch — on your behalf, on purpose, without noise. For companies that need careful attention, not a kitchen-sink platform.

Five practices. One standard.

Services priced to start. Every engagement is scoped against what you actually need, not a template. Starting prices reflect minimum engagement; real numbers come after a conversation.

001Security

Security audits & assessments

A structured review of how your technology, data, and access are configured — measured against reasonable standards for a business your size. Findings, evidence, remediation plan. Readable by non-specialists, actionable by engineers.

Infrastructure review Identity & access Data handling Vendor risk
From $4,500 / engagement Request scoping →
002Security

Penetration testing

Hands-on testing of web applications and internal networks. We find what an attacker with moderate skill and patience would find, before they do. Reports include technical findings, business impact, and a ranked remediation path.

Web application External network Internal network OWASP methodology
From $7,500 / engagement Request scoping →
003Security

Managed security & monitoring

Ongoing vulnerability scanning, log review, tool configuration, and a person to call when something looks wrong. Built for companies that need security attention but don't need — or can't afford — a full in-house security team.

Continuous scanning Log review Tool management Incident triage
From $2,500 / month Request scoping →
004Data

Data engineering & analytics

Clean the data, move the data, visualize the data. We build pipelines between systems that don't talk to each other, remediate datasets that have drifted, and stand up dashboards a non-analyst can read.

ETL pipelines Data cleaning Platform migration Dashboard build
From $3,500 / project Request scoping →
005Infrastructure

Secure hosting & infrastructure

Managed hosting and compute for clients who'd rather have it run by the people already handling their security. Bundled with monitoring, backups, and hardened configurations by default. A supporting service for the companies we're already working with.

Hardened configs Managed backups Cloud & dedicated Monitoring included
From $1,200 / month Request scoping →

Where does your security actually stand?

Five questions. Honest answers. A calibrated sense of where you are, and where to start, in under a minute. No email required.

Tools we actually use.

Deliberate about what we adopt. These are the tools we use day-to-day — not a logo wall of every vendor we've ever heard of.

Vulnerability

Scanning & discovery

  • Nessus
  • OpenVAS
  • Nuclei
Offensive

Pentesting toolkit

  • Burp Suite
  • Metasploit
  • OWASP methodology
Cloud

Cloud security

  • AWS Security Hub, Config
  • Azure Security Center
  • Google Cloud security
Data

Analytics & dashboards

  • Looker Studio
  • Power BI
  • Custom ETL

Calm. Deliberate.
Evidence-based.

A few principles we hold to — because security and data work done in a rush produces work you'll have to redo later.

01

Scope before we scan.

Every engagement starts with a conversation about what matters to your business. We don't run tools for the sake of running tools. What we test, where, and why — decided together, in writing, before we start.

02

Findings you can act on.

A finding without a fix is a fear. Our reports describe what's wrong, what it means in business terms, and what to do — ordered by actual risk, not by the alphabet.

03

Relationships over transactions.

Most of our work is ongoing. We'd rather know ten clients well than fifty clients superficially. If that's not the kind of fit you're looking for, we'll say so.

04

Honest about limits.

We're a small team. We say no to work we can't do well. If your need is outside our strength, we'll tell you, and refer you if we can.

Frequent questions.

Who do you typically work with?

Small to mid-sized businesses — especially ecommerce stores, professional services firms, and healthcare practices. Engagements generally run between $3,000 for a focused project and $60,000 annually for a retainer relationship. If you're smaller, we'll usually suggest a narrower scope rather than turn you away. If you're larger, we may not be the right fit, and we'll tell you.

Do you handle compliance prep?

Yes — we help clients prepare for SOC 2, PCI, and HIPAA audits by identifying gaps, implementing required controls, and producing evidence. We're not an auditor and don't issue attestation reports. We make you ready for the auditor who does.

What's a typical engagement timeline?

Security audits run 2–4 weeks. Penetration tests run 1–3 weeks depending on scope. Data engineering projects vary from a week to several months. Retainer relationships are ongoing with monthly deliverables. Concrete timelines come after the scoping conversation.

Do you sign NDAs?

Yes, as a matter of course. Either your NDA or ours — we don't insist on one over the other. Sensitive engagements usually operate under mutual NDA plus a scoping agreement that defines boundaries and authorization.

How does the hosting piece fit?

Secure hosting is a supporting service for clients already working with us on security or data. We bundle hardened configurations, backups, and monitoring. It's not a standalone product, and we don't compete with general-purpose hosting providers.

What makes you different from a bigger firm?

Smaller. More deliberate. You talk to the people doing the work, not an account manager. The tradeoff is that we can't scale to very large engagements or 24/7 global coverage. If you need those, a larger firm is probably a better fit. We'll be honest about which side of that line you fall on.

Let's have a conversation.

Tell us what you're working with. We'll reply within a business day with questions, a scope, or an honest note that we're not the right fit.

hello@cdgrayson.net