Discuss an Engagement

Jiva Security works with startups, SaaS companies, hardware manufacturers, and security-conscious technology organizations. Engagements range from focused penetration tests to multi-phase red team operations and ongoing advisory relationships.

When reaching out, it is helpful to include a brief description of what you are looking to assess, your timeline, and any relevant context about your environment or technology stack.

contact@jivasecurity.com jiva.io LinkedIn X / Twitter GitHub YouTube
PGP

For sensitive disclosures or engagements requiring encrypted communication, Jiva's PGP public key is available at https://jivasecurity.com/jivasecurity-pgp.asc.

Fingerprint: A103 128C D5B6 5980 1248 96A6 99E4 7C69 92E9 392E

Engagement Process

01

Initial Inquiry

Send a brief description of your security assessment needs, your organization type, and any relevant timeline constraints.

02

Scoping Discussion

A short call or email exchange to define scope, objectives, rules of engagement, and methodology. This ensures the engagement is tailored to your environment.

03

Proposal & Agreement

A written statement of work covering scope, timeline, deliverables, and terms. No ambiguity about what is and is not included.

04

Engagement & Delivery

The assessment is performed directly by Jiva. Findings are delivered in a clear, technical report with reproduction steps, impact analysis, and remediation guidance.

05

Debrief & Follow-up

A debrief walkthrough of findings is included with every engagement. Follow-up verification of remediated issues is available on request.

Note

If you are a vendor responding to a vulnerability disclosure from Jiva Security, please reply to the original disclosure report or use the email above with reference to the report. Coordinated disclosure timelines are included in every report.