About Us
CyberByte was founded in 2022 with the goal of supporting local, state, and tribal government agencies, small businesses, and non-profit organizations with their cyber security needs. Providing these industries with proactive network security consulting, vulnerability assessments, and penetration testing services in a cost effective manner.
With a background in network intrusion investigations and network forensics, the staff of CyberByte has experience and training in investigating network intrusion attacks and the understanding of how the malicious actors abuse computer systems for their personal and financial gain. Using those investigative skills and seeing first hand how unauthorized users access network systems has allowed CyberByte staff to use the same methodologies that occur in real-world attacks to help your organization mitigate and prevent these incidents from occurring in your organization.
CyberByte provides consultation services to speak and discuss with shareholders or officials at your agency or organization on the risks of cyberattacks, the financial and reputational cost of a breach, and steps that can be taken to defend network systems in a cost effective manner.
CyberByte Staff
Jeremy Brice
Owner
Working in the law enforcement sector for over 17 years with more than a decade of investigative experience in cybercrime related incidents, Jeremy has investigated hundreds of cybercrime related cases and examined thousands of digital evidence items as a forensic examiner. While working full time as a network intrusion and exploitation investigator with State and Federal government agencies, Jeremy is experienced in the response to network intrusion related incidents.
Jeremy is a certified Penetration Tester and holds numerous certifications and has attended thousands of hours of advanced cybercrime and computer related trainings sponsored and taught by the FBI, USSS, NW3C, SANS, CompTIA, 13Cubed, and many other internationally recognized organizations. Additionally, Jeremy has been qualified as an expert witness in both Federal and State Courts in giving testimony during criminal trials.
Network Security Services
Penetration Testing
This in-depth service identifies and discovers your network systems that are exposed and vulnerable to attack from external or internal sources. If located, these vulnerable systems will be actively exploited to determine the risk to the organization and reports will be generated on how best your organization can mitigate these exposed risks. This testing is a full service test to attack the network from outside and attempt to gain access internally and then move across devices on the network to attack as many systems as possible within the scope of the testing.
Vulnerability Assessments
This service scans the agency or organizations network internally and/or externally to determine what risks may be exploited for use by a malicious actor. Actual exploitation does not occur so false positives may be found, however, this service is good for those that can not risk any downtime to their network or that do not need a full penetration test.
Assumed-Breach Testing
This testing simulates a malicious actor that has already penetrated your computers and is inside of your network to provide insight on the impacts post-breach. This service is ideal for those agencies that have sensitive information and want to test their network security appliances to ensure if a breach were to occur the information internally stored is secure from being released.
Cyber Insurance Audits
Many cyber insurance policies require an annual audit of the computer network of an agency or organization to remain compliant. This cost-effective service satisfies that requirement by combining a vulnerability assessment, assumed breach test, and a penetration test if determined to be needed to meet those needs. A copy of the organization’s insurance policy will be reviewed to ensure that all requirements are met and a certification of the audit will be provided for proof to your insurance that the audit was completed.
How We Work
1. Consultation
Discuss your security needs and objectives
2. Scoping
Define testing scope and timeline
3. Testing
Comprehensive security assessment
4. Reporting
Detailed findings and recommendations
Payment Options
We accept Business Checks (invoiced) and Credit Cards. Custom payment arrangements available for government contracts.
Frequently Asked Questions
How long does a penetration test take?
The duration depends on the scope and complexity of your network. A typical engagement ranges from 1-2 weeks for testing, followed by 1 week for report generation. We’ll provide a detailed timeline during the scoping phase.
Will testing disrupt our operations?
We work closely with your team to minimize disruption. Vulnerability assessments are typically non-intrusive. For penetration testing, we coordinate timing and can perform tests during off-hours if needed. We maintain constant communication throughout the engagement.
Do you provide remediation support?
Yes. Our comprehensive reports include detailed remediation recommendations with prioritized action items. We’re available for consultation calls to discuss findings and can provide guidance on implementing security improvements.
What industries do you serve?
We specialize in serving government agencies (local, state, and tribal), small to medium businesses, and non-profit organizations. Our experience with law enforcement and government compliance makes us particularly well-suited for public sector clients.
What makes CyberByte different from other security firms?
Our founder brings 17+ years of law enforcement cybercrime investigation experience, providing unique insight into how attackers operate. We’re Federal court-qualified experts with extensive training from the FBI, USSS, and SANS. We understand both the technical and legal aspects of cybersecurity.
Contact Us
If you would like to know more about our services or have questions regarding any of the services we offer, please fill out the form below and our team will get back to you as soon as possible.

