Defensive cybersecurity, delivered with integrity.

Matin Cyber Security helps individuals and small businesses protect what matters — through independent vulnerability assessments, endpoint hardening, and security awareness training. Every engagement is documented, invoiced, and conducted under a written authorization to work.

Written authorization required for all work Invoice issued before any payment Defensive services only
// About & Legal

An independent, legitimate cybersecurity practice.

I am Matin — an independent cybersecurity consultant. Matin Cyber Security operates as a sole-proprietor defensive-security practice. The work I do is strictly lawful, contract-based, and limited to systems for which I hold explicit written authorization from the asset owner.

How I work

Every engagement starts with a written Statement of Work that defines the scope, target systems, time window, deliverables, and emergency contacts. Nothing is scanned, tested, or touched outside of that scope. Clients receive a clear report at the end of every engagement.

Code of conduct

Matin Cyber Security follows the principles published by recognized industry bodies and adapts them to a small-business context:

Note: Matin Cyber Security is not a law firm. Where legal interpretation is required (data-breach notification, regulatory disputes, etc.), clients are referred to qualified counsel.

// Services

Consulting that fits your situation.

One-on-one advisory for individuals and small businesses. Billed hourly, invoiced in advance, with deliverables you can share with auditors or insurers.

Vulnerability Review

Walk through your existing systems and configurations together, identify weaknesses, and prioritize fixes by risk and effort.

Hardening Advisory

Step-by-step guidance to harden laptops, servers, routers, and cloud accounts using vendor best practices and free or low-cost tooling.

Incident Triage

Help responding to a suspected compromise — containment guidance, evidence preservation, and a referral pathway when forensics expertise is required.

1:1 Cybersecurity Consulting

Hourly consulting over secure video call. Includes a written summary of recommendations after each session. Minimum booking: 1 hour. Sessions are scheduled after the invoice is paid.

$50 / hour (USD)
// Products

Four packaged services to get you protected fast.

Fixed-scope packages with fixed or quoted pricing. Each product is delivered after the invoice is settled and an authorization-to-work form is signed.

MCS-01 SKU: MCS-SENTINEL-01

SentinelScan — Vulnerability Assessment

A defensive, non-intrusive assessment of one website, network range, or small cloud environment, followed by a written executive report.

  • Scope-limited scan (single domain or /24 subnet)
  • Manual review of top-10 findings
  • Executive summary + technical appendix (PDF)
  • 30-day follow-up question window
$299/ assessment
MCS-02 SKU: MCS-GUARDENDPOINT-02

GuardEndpoint — Hardening Package

Remote hardening of up to 10 devices (macOS, Windows, Linux) using vendor best practices: disk encryption, MFA, patching, and reputable AV configuration.

  • Up to 10 endpoints
  • Full-disk encryption + secure boot review
  • MFA & password-manager rollout guidance
  • Hardening checklist signed off by you
$499/ package
MCS-03 SKU: MCS-PHISHSHIELD-03

PhishShield — Security Awareness Training

Ten on-demand training modules for your team covering phishing, password hygiene, social engineering, and safe remote work — with quizzes and certificates.

  • 10 modules + downloadable handouts
  • Phishing simulation (consent-based)
  • Quizzes & completion certificates
  • Manager dashboard with progress reports
$199/ team (up to 25)
MCS-04 · CUSTOM SKU: MCS-FORTRESS-04

Fortress — Custom Security Engagement

Bespoke, scope-built engagement for larger environments or non-standard requirements: multi-site assessments, regulated industries, M&A due-diligence reviews, or extended advisory retainers.

  • Discovery call & written scoping document
  • Custom deliverables (audit report, attestation letter, policy pack)
  • Optional monthly retainer with response SLA
  • NDA available before any technical detail is shared
Custom quote— priced after scoping call
// Tools

Managed security tools — priced to your environment.

Subscription tools billed monthly. Your price is set after a short scoping call based on the capacity (asset count, mailbox count, cloud footprint) and type of your environment. The ranges below are the published floor and ceiling — most small-business customers land near the lower end.

MCS Watchtower

SKU: MCS-WATCH · External attack-surface monitoring

Continuous, non-intrusive monitoring of your public-facing assets. New issues are triaged and reported with remediation guidance — not just raw scan output.

  • Weekly external scans + daily port/cert checks
  • Critical-issue alerts within 24h
  • Monthly executive PDF report
  • Read-only customer portal
$99 – $1,499 / month USD · billed monthly · 30-day cancellation

Price varies with: number of domains, number of public IPs, web apps in scope, alerting SLA, and report frequency.

MCS MailGuard

SKU: MCS-MAIL · Managed email security

Managed email-security service that sits in front of Microsoft 365 or Google Workspace. Blocks phishing and malware, enforces SPF / DKIM / DMARC, and gives end-users a one-click report button.

  • Anti-phishing & impersonation protection
  • SPF / DKIM / DMARC configuration & monitoring
  • Quarantine review & weekly digest
  • User reporting add-in (Outlook / Gmail)
$39 – $899 / month USD · billed monthly · per organization

Price varies with: number of mailboxes, log-retention period, presence of executive-impersonation protection, and incident-response inclusion.

MCS CloudSentry

SKU: MCS-CLOUD · Cloud security posture management

Continuous, read-only review of your AWS, Azure, or Google Cloud configuration. Finds public buckets, over-permissioned roles, missing encryption, and drift from compliance baselines — before someone else does.

  • Read-only IAM role (no write access ever)
  • Daily configuration scan & drift detection
  • CIS / SOC 2 / ISO 27001 control mapping
  • Monthly executive report + remediation playbook
$249 – $2,499 / month USD · billed monthly · per environment

Price varies with: number of cloud accounts / subscriptions, total resource count, compliance framework selected, and scan frequency.

All tools follow the same payment rules as the rest of the site: a scoping call → a written quote → a numbered PDF invoice → payment from your own bank account → confirmation by phone and email.

// Payment & Compliance

How payment works — and the rules that keep it safe.

Payments are handled by bank transfer against a numbered invoice. To protect you, your bank, and Matin Cyber Security, the rules below are non-negotiable and apply to every transaction.

The bank account that pays the invoice must be in the customer's own name. Payments from a third party (a friend, relative, employer, or unrelated company) cannot be accepted. If a third-party payment arrives, it will be returned in full and the order will not be processed. This rule exists to comply with anti-money-laundering (AML) and know-your-customer (KYC) requirements that protect both parties and their banks.
No payment is ever taken before an invoice is issued. If anyone — including someone claiming to be Matin Cyber Security — asks you to pay before you have received a numbered PDF invoice from support@matinsecurity.com or from the contact form on this site, do not pay. Report it immediately.

The 4-step payment flow

1

You request a service

Use the contact form or email and tell me which product or how many consulting hours you need. I'll confirm scope and pricing in writing.

2

I send you a PDF invoice

You receive a numbered invoice listing your full legal name, the service description, the amount in your chosen currency, applicable taxes, and the matching bank details. No payment is taken before this step.

3

You pay from your own account

You transfer the exact amount from a bank account that is in your own name, using the invoice number as the payment reference. Third-party payments are refused.

4

I confirm receipt immediately

As soon as the funds clear, I contact you by phone and email to confirm receipt, send a paid-stamped receipt, and schedule the work.

Multi-currency payment — pick what suits you

To make cross-border payment easy, Matin Cyber Security holds accounts with several regulated financial providers and can issue your invoice in the currency that best fits your country and bank. The specific account that matches your invoice currency is printed on your PDF invoice — you transfer to that account only.

Providers we currently work with:

Revolut GuruPay Wise iFast Global Banking PayPal + other licensed providers
Beneficiary nameMatin Jamal Hassan
Trading nameMatin Cyber Security
Account number / IBANProvided on your PDF invoice
SWIFT / BIC / RoutingProvided on your PDF invoice
Currencies we can invoice in
USDEURGBP CADAUDCHF SGDAED+ more on request
Payment referenceInvoice number (e.g. MCS-2026-0001)

For your protection, the live account numbers are never published on this website. They are printed only on the signed PDF invoice sent from support@matinsecurity.com. Always verify the details on the invoice itself before transferring funds — this is the simplest way to defeat invoice-fraud scams that target small businesses and their customers.

Compliance & refund policy

  1. Customer identity. Before the first invoice is issued, you confirm your full legal name and a phone number that I can call. The name on your payment must match exactly.
  2. Same-name rule. The remitting account must be held by the same person or legal entity named on the invoice. Payments from any other account are returned in full at the customer's cost.
  3. Bank transfer only. Payments are accepted by bank transfer or by a regulated payment provider listed above. We do not accept cash, prepaid cards, gift cards, or cryptocurrency.
  4. Source-of-funds. By paying an invoice you confirm that the funds are from a lawful source and that you have the right to remit them.
  5. Receipts & records. Every paid invoice is followed by a paid-stamped receipt. We keep transaction records for at least 5 years for tax and audit purposes.
  6. Refunds. Full refund within 7 days of payment if work has not yet started. Once an engagement is in progress, refunds are pro-rated for unspent hours. Refunds are paid back to the same account that made the original payment — no exceptions.
  7. Chargebacks & disputes. If you have a concern, please email me first so we can resolve it directly. Disputes raised without contact may delay refunds.
  8. Sanctions screening. Engagements with individuals or entities located in jurisdictions subject to comprehensive sanctions cannot be accepted.
  9. Tax. Invoices show any applicable tax separately. Cross-border invoices include a tax-status declaration as required.
// FAQ

Common questions.

Is this work legal?

Yes. All services are defensive in nature and are only performed against systems for which the client provides explicit written authorization. I do not offer offensive services, do not work against third parties, and do not provide tools or guidance intended for unlawful use.

Which currency can I pay in?

We can invoice in USD, EUR, GBP, CAD, AUD, CHF, SGD, AED and more by request. Tell us which currency suits your bank and we'll pick the matching account from our regulated provider network (Revolut, GuruPay, Wise, iFast Global Banking, PayPal, and others). The exact details are printed on your PDF invoice.

Why can't someone else pay on my behalf?

Banks and payment regulators require that the name on the paying account match the name of the invoiced customer. This protects everyone from fraud and money-laundering risk. If a third party pays, the funds are returned and the order is not processed.

What happens after I pay?

As soon as the funds clear, I contact you by phone and email to confirm receipt, send a paid-stamped receipt, and schedule the work. Consulting calls are booked into the next available slot; products are kicked off within two business days.

Do you store my card or bank information?

No. Payment is by direct bank transfer from your account to the one printed on the invoice. I never see, store, or process card data, and I do not hold a copy of your account number beyond what appears on the incoming transfer.

Can I get a refund?

Yes — within 7 days of payment and before work has started, you receive a full refund. After work has started, refunds are pro-rated. Refunds are always returned to the same account that made the original payment.

Will I get a written contract?

Every engagement includes a short Statement of Work (SOW) that lists the scope, schedule, deliverables, and emergency contacts. It is signed by both sides before any technical work begins.

// Contact

Get in touch.

Tell me what you need. I'll reply within one business day with scope and pricing. No payment is taken until you receive a numbered PDF invoice.

This form submits to your default email client with the details pre-filled. Nothing is sent to a third-party server.

Response time

Within one business day, Monday – Friday.

What I'll send back

A short scope confirmation, fixed pricing or hourly estimate, and (once you accept) a numbered PDF invoice in your chosen currency.

Security notice

Genuine invoices come only from support@matinsecurity.com. If in doubt, call before paying.