Cybersecurity consulting · Potsdam · DACH

Cybersecurity and AI governance – full scope or pinpoint.

For organisations within the scope of ISO 27001, BSI IT-Grundschutz, KRITIS, NIS 2 or the EU AI Act. We take on the mandate, build the management system and secure the supply chain: at the depth today's maturity demands, with a handover state that carries tomorrow's.

Substance over marketingWhat we deliver is proven in practice: code, tools and methodology drawn from real projects, not from slides.
Verifiable in-house teamCISSP, CISA, BSI IT-Grundschutz, CISO (TÜV). No subcontractors, no body-leasing pyramid.
Depth on demandFrom internal audit to CISO mandate: same methodology, same team, different cut.
Outcome artefacts from real engagements
01 · Where you stand todayWhere you stand today, documented before the auditor asks.
Controls in SoA
78/93
+6 since Q3
Effective
61/78
+4 since Q3
Open findings
12
3 overdue
A.5Organizational controls30/37
25 Effective5 In progress7 Gap
A.6People controls7/8
6 Effective1 In progress1 Gap
A.7Physical controls12/14
11 Effective2 In progress1 Gap
A.8Technological controls29/34
19 Effective9 In progress6 Gap
Example artefact · Anonymised clientVisible in 30 days · CISO & board ready

Anonymised from real engagements. Form and depth are set on day one, not in sales.

Our way. Four principles, every project.

Four guiding principles we measure every decision against, from the first discovery call through to the handover to your team.

01 · ENABLE

Enable

We hand over what we build, with documentation and runbooks, so your team can carry on without us. We don't come to stay. But we'd be glad to come back.

02 · AUTOMATE

Automate

Automate once, never manually again. Recurring work gets a script, a pipeline, an agent. Your time with us is finite; the automation stays.

03 · SHARE

Share

What we build in other projects feeds our internal libraries: policy templates, risk catalogues, audit routines. You don't start from zero, you start at the level previous engagements have reached. And what we build with you, if it generalises, goes back into our Open Research repositories.

04 · SCALE

Scale

When a project outgrows us, we curate. No body-leasing, no partner pyramid. The accountability stays with us; the expertise comes from a pre-vetted network of individual specialists. Your contract stays one, your escalation chain too.

Cybersecurity consulting services.

From long-term mandates through defined projects and recurring controls down to one-off tasks. A scale, not a catalogue.

Qualified through teaching and practice.

Through targeted upskilling of our team, we make sure every capability we need is in place and continuously developed. Academically and in practice.

2
Founders
4
Team Total
12*
Unique Professional Certifications
3
Teaching Assignments Held
*including:CISSPCISABSI IT-Basic Protection ConsultantCISO (TÜV)BCM 200-4 (TÜV)Data Protection Officer (TÜV)SCRUM Master IPRINCE2 Practitioner

Our research is free to use: as code, papers and tools.

We publish our tools and research on git.neomint.com/nm. Permissive licences, traceable commits, usable from the first release.

All repos on Forgejo
nm/magic-wormhole-web

Secure file transfer via PAKE. Browser-based wormhole frontend without server trust.

TypeScriptApache-2.0
nm/win11-vhdx-creator

Reproducible VHDX containers for forensics labs and isolated malware analysis.

PowerShellMIT
nm/

More repositories are in preparation. We only publish once a tool runs reliably, is documented and has proven itself across several of our projects.

Coming soon
Working at NeoMINT

We grow when it fits.

We're not actively hiring right now. Even so: if you see cybersecurity as a craft and want to contribute to Open Research, write to us. We'll answer honestly about whether and when it could fit.

  • 01
    Hiring is a consequence, not a goal.We hire when it moves us forward, not because a plan demands it.
  • 02
    Remote-first, with fixed sync rituals.DACH time zone, German-speaking. No office obligation, but shared rituals.
  • 03
    Open Research time is paid time.What we publish emerges within projects, not on weekends.
30-minute intro call · no commitment

A conversation costs nothing. Incidents do.

You describe your situation. We listen, ask follow-ups, and at the end we tell you honestly whether we're a fit. No sales funnel, no slides.

What you get

Duration30 min
FormatVideo call
Prepnone
Response< 24 h weekdays
NDAon request beforehand