Matin Cyber Security helps individuals and small businesses protect what matters — through independent vulnerability assessments, endpoint hardening, and security awareness training. Every engagement is documented, invoiced, and conducted under a written authorization to work.
I am Matin — an independent cybersecurity consultant. Matin Cyber Security operates as a sole-proprietor defensive-security practice. The work I do is strictly lawful, contract-based, and limited to systems for which I hold explicit written authorization from the asset owner.
Every engagement starts with a written Statement of Work that defines the scope, target systems, time window, deliverables, and emergency contacts. Nothing is scanned, tested, or touched outside of that scope. Clients receive a clear report at the end of every engagement.
Matin Cyber Security follows the principles published by recognized industry bodies and adapts them to a small-business context:
Note: Matin Cyber Security is not a law firm. Where legal interpretation is required (data-breach notification, regulatory disputes, etc.), clients are referred to qualified counsel.
One-on-one advisory for individuals and small businesses. Billed hourly, invoiced in advance, with deliverables you can share with auditors or insurers.
Walk through your existing systems and configurations together, identify weaknesses, and prioritize fixes by risk and effort.
Step-by-step guidance to harden laptops, servers, routers, and cloud accounts using vendor best practices and free or low-cost tooling.
Help responding to a suspected compromise — containment guidance, evidence preservation, and a referral pathway when forensics expertise is required.
Hourly consulting over secure video call. Includes a written summary of recommendations after each session. Minimum booking: 1 hour. Sessions are scheduled after the invoice is paid.
Fixed-scope packages with fixed or quoted pricing. Each product is delivered after the invoice is settled and an authorization-to-work form is signed.
A defensive, non-intrusive assessment of one website, network range, or small cloud environment, followed by a written executive report.
Remote hardening of up to 10 devices (macOS, Windows, Linux) using vendor best practices: disk encryption, MFA, patching, and reputable AV configuration.
Ten on-demand training modules for your team covering phishing, password hygiene, social engineering, and safe remote work — with quizzes and certificates.
Bespoke, scope-built engagement for larger environments or non-standard requirements: multi-site assessments, regulated industries, M&A due-diligence reviews, or extended advisory retainers.
Subscription tools billed monthly. Your price is set after a short scoping call based on the capacity (asset count, mailbox count, cloud footprint) and type of your environment. The ranges below are the published floor and ceiling — most small-business customers land near the lower end.
Continuous, non-intrusive monitoring of your public-facing assets. New issues are triaged and reported with remediation guidance — not just raw scan output.
Price varies with: number of domains, number of public IPs, web apps in scope, alerting SLA, and report frequency.
Managed email-security service that sits in front of Microsoft 365 or Google Workspace. Blocks phishing and malware, enforces SPF / DKIM / DMARC, and gives end-users a one-click report button.
Price varies with: number of mailboxes, log-retention period, presence of executive-impersonation protection, and incident-response inclusion.
Continuous, read-only review of your AWS, Azure, or Google Cloud configuration. Finds public buckets, over-permissioned roles, missing encryption, and drift from compliance baselines — before someone else does.
Price varies with: number of cloud accounts / subscriptions, total resource count, compliance framework selected, and scan frequency.
All tools follow the same payment rules as the rest of the site: a scoping call → a written quote → a numbered PDF invoice → payment from your own bank account → confirmation by phone and email.
Payments are handled by bank transfer against a numbered invoice. To protect you, your bank, and Matin Cyber Security, the rules below are non-negotiable and apply to every transaction.
support@matinsecurity.com
or from the contact form on this site, do not pay. Report it immediately.
Use the contact form or email and tell me which product or how many consulting hours you need. I'll confirm scope and pricing in writing.
You receive a numbered invoice listing your full legal name, the service description, the amount in your chosen currency, applicable taxes, and the matching bank details. No payment is taken before this step.
You transfer the exact amount from a bank account that is in your own name, using the invoice number as the payment reference. Third-party payments are refused.
As soon as the funds clear, I contact you by phone and email to confirm receipt, send a paid-stamped receipt, and schedule the work.
To make cross-border payment easy, Matin Cyber Security holds accounts with several regulated financial providers and can issue your invoice in the currency that best fits your country and bank. The specific account that matches your invoice currency is printed on your PDF invoice — you transfer to that account only.
Providers we currently work with:
| Beneficiary name | Matin Jamal Hassan |
| Trading name | Matin Cyber Security |
| Account number / IBAN | Provided on your PDF invoice |
| SWIFT / BIC / Routing | Provided on your PDF invoice |
| Currencies we can invoice in |
USDEURGBP
CADAUDCHF
SGDAED+ more on request
|
| Payment reference | Invoice number (e.g. MCS-2026-0001) |
For your protection, the live account numbers are never published on this
website. They are printed only on the signed PDF invoice sent from
support@matinsecurity.com. Always verify the details on the invoice itself before
transferring funds — this is the simplest way to defeat invoice-fraud scams that target
small businesses and their customers.
Yes. All services are defensive in nature and are only performed against systems for which the client provides explicit written authorization. I do not offer offensive services, do not work against third parties, and do not provide tools or guidance intended for unlawful use.
We can invoice in USD, EUR, GBP, CAD, AUD, CHF, SGD, AED and more by request. Tell us which currency suits your bank and we'll pick the matching account from our regulated provider network (Revolut, GuruPay, Wise, iFast Global Banking, PayPal, and others). The exact details are printed on your PDF invoice.
Banks and payment regulators require that the name on the paying account match the name of the invoiced customer. This protects everyone from fraud and money-laundering risk. If a third party pays, the funds are returned and the order is not processed.
As soon as the funds clear, I contact you by phone and email to confirm receipt, send a paid-stamped receipt, and schedule the work. Consulting calls are booked into the next available slot; products are kicked off within two business days.
No. Payment is by direct bank transfer from your account to the one printed on the invoice. I never see, store, or process card data, and I do not hold a copy of your account number beyond what appears on the incoming transfer.
Yes — within 7 days of payment and before work has started, you receive a full refund. After work has started, refunds are pro-rated. Refunds are always returned to the same account that made the original payment.
Every engagement includes a short Statement of Work (SOW) that lists the scope, schedule, deliverables, and emergency contacts. It is signed by both sides before any technical work begins.
Tell me what you need. I'll reply within one business day with scope and pricing. No payment is taken until you receive a numbered PDF invoice.
Within one business day, Monday – Friday.
A short scope confirmation, fixed pricing or hourly estimate, and (once you accept) a numbered PDF invoice in your chosen currency.
Genuine invoices come only from support@matinsecurity.com. If in doubt, call before paying.