Security architecture, physical security assessments, penetration testing and threat modelling
Internet-scale web applications and APIs, robotics control algorithms and SCADA test automation
High-availability market-trading desktop applications, web applications and APIs