Secure Your Information
Assets And Technological Systems

Secure Your Information Assets And Technological Systems

Discover and avoid your vulnerabilities before they can be used against you
by finding the perfect solution that is precisely tailored to your needs.

We adapt our services to your best intersts and according to the stage your organization is at.
Let us help you and see where you stand!

20 years of experience in the field of cyber
information systems together with our professional
services, leads to an end-to-end solution

TMC is expanding and looking for top talented
cyber security professionals!
Want to be a part of our vision?

OUR POINT OF VIEW

Comprehensive 360
Cyber Solutions

TCM-Cyber gained years of experience in the sectors of security, transportation, public and civilian with a specialization in ICT (networks, IT, OT, IoT).
Choosing the right strategy requires expertise and a 360° comprehensive overview that will adapt technology and working methods to the business needs of the organization.

With an extensive knowledge in the field of cyber along with decades of experience, we enable the implementation of technological solutions that are precisely tailored to your needs and overcome cyber threats.

BRING YOU TO SAFETY

Inspect Your Vulnerability

Our methodology is focusing on the areas of cyber and privacy protection. Integration of all aspects such as legal, technological, and organizational methods will make your company more secured.

Legal – Assimilation of privacy protection regulations inside organizational policy.

Work Procedures – implementation of working methods in the field of cyber protection inside organizational culture.

Technological Issues – review, map and analysis of all organizational systems, software, products and information assets along with risk surveys, treatment priorities and a solid work plan.

Procurement – consultancy and assist in procurement processes while finding the most innovative products for the best solutions.

Integration and Implementation of Cyber Solutions – with the help of our professional knowledge together with an international network of contacts, most advanced manufacturers, and leading technology suppliers, we at TCM will tailor a solution that suits your organization’s needs.

FEW STEPS SAFER

Services

TCM enable to provide services according to the stage your organization is at.
With the help of our skilled personnel, we are committed to the highest level of professional!

We are able to identify and address risks in the organizational space by mapping all technological systems, regulation issues and organizational behavior among employees.

  • Cyber exposure survey
  • Mapping of technological systems
    regulations, and suppliers
  • Penetration test (PT)
  • Risks survey
  • Cyber intelligence survey

The needs and complexity of your organization will determine which of our services will be the most relevant. Our cyber experts will give you the best information security support in a managed or on-premises model.

  • Penetration tests
  • Cyber protection system, Analyst, Ciso, DPO, etc.
  • Testing and control operation of cyber systems

A product that suites your needs will give you the right solution. Let our experts assist with the procurement process and advice what
we think is best.

  • Recommendation and assistance in the required procurement
  • Management in the procurement processes

Integration and implementation of new and efficient work procedures is the key for success. We do it with the most innovative software and the best information protection systems on the market

  • Compliance regulations
  • Implementing secure remote access (MFA) mechanisms
  • Segmentation of hardening: servers,
    endpoints, databases
  • International standards
Learn More
  •  Compliance regulations
  • Segmentation of hardening: servers, endpoints, databases
  • Secure set of the organization’s technologies and systems (on-premises, Cloud, SCADA, Web, Mobile, IoT, etc.)
  • International standards
  • Implementing secure remote access (MFA) mechanisms
  • Assistance in moving to the cloud
  • project management
  • Integration and assimilation of the products
  • Complying with privacy protection regulations
  • Registration of databases
  • integration of information protection systems (encryption, access permissions, etc.)
  • Trainings and awareness of employees and suppliers
  • Writing information security procedures and response plans for events and business continuity

Why Us ?

TCM’s Mission

Our goal is to empower organizations and individuals around the world in choosing reliable solutions tailored to their needs in the fields of ICT and cyber security.
The knowledge we share in complex systems and projects, enables a holistic and professional vision for the benefit of our customers, as well as the ability to obtain an end-to-end solution.

Contact Our Cyber Security Experts:

Company Management

Moshe Dahan

CEO & Founder

30 years of experience have led Moshe to become an expert in the field of ICT, communications, cellular and cyber alongside expertise in technological business strategy and project management.

Get to Know Moshe

Avi Berger

Strategic Technology Specialist

30 years of experience have led Moshe to become an expert in the field of ICT, communications, cellular and cyber alongside expertise in technological business strategy and project management.

Get to Know Avi

Ezra Salem

VP Project Management

30 years of experience have led Moshe to become an expert in the field of ICT, communications, cellular and cyber alongside expertise in technological business strategy and project management.

Get to Know Ezra

Partner Program

Are you willing to sell your product to the Israeli government, the IDF, the ministry of defense or other various security bodies?

And what about conducting business development and distributing information security products to start-ups and large companies in the economy? For further information contact us below and we will explore the possibility for cooperation!

Why With Us ?

Careers

TCM is expanding and is looking for talented experts who want to integrate into the company while identifying with the company’s vision, think outside the box and breathe technological innovation. You are welcome to review our open positions and apply!

Cyber Analyst

TCM is looking for an experienced Cyber Analyst to join our team!

What you will do:

  • Performing analysis tasks in favor of improving response to cyber incidents and information security.
  • Assimilation and improvement of the defense tools and accompaniment of business processes in the cyber aspects in order to strengthen the organization’s resilience to a variety of cyber-attack scenarios.
  • Identifying cyber threats, analyzing them, characterizing the response, and providing a response using the protection tools.
  • Analysis of fraud cases and assimilation of lessons learned in the defense tool
  • Implementation, operation, maintenance, and control of cyber tools for network protection.

 

What you are:

  • 3+ years of experience in the field
  • Familiarity and experience working with protection systems for cloud environment
  • Expertise in writing scripts
  • Extend knowledge with information security systems such as FW, EDR, SIEM and Big data systems.
Cyber Protection Architect / Cyber Protection Technologies Specialist:

TCM is looking for an experienced Cyber Protection Architect and/or Technologies Specialist to join our team!

What you will do:

  • Designing information security solutions for the organization’s IT environment
  • Obtaining management approvals for the implementation of information security and acquisition policies
  • Planning how to implement the actual solution with engineering and project planning teams.
  • Addressing network security problems and challenges, recognizing diverse information security threats, and assisting and alerting to periodic risk analysis.
  • Examining advanced solutions, improving, and implementing information security products

What you are:

  • Sc. in Computer Science and Technology – an advantage
  • Relevant certification in the field of information security CISSP, CISO, CASP, CISM, CRISC
  • Additional courses in information security and / or systems analysis and project management
  • Familiarity and experience in characterizing and writing documents Information requirements for information system and cyber protection
  • Attempt to implement information security tools as an implementer – an advantage
  • Experience working in a regulatory environment and standards Familiarity with the functionality of technologies from the following work environments: system, communication, WEB, applications, Cloud, Wireless, Mobile, information leakage, end stations. Sometimes also ICS, IoT, SIEM
Cyber Protection Methodologies Specialist:

TCM is looking for an experienced Cyber Protection Methodologies Specialist to join our team!

What you will do:

  • working with all the guidance and direction bodies, with an emphasis on building tools for national assessments of crisis situations.
  • Performing critical processes in organizations, weaknesses, and cyber risk analysis.

What you are:

  • 2+ years of experience in the field
  • 2+ years of experience and extend knowledge in the field of intelligence and operations in the cyber space
  • Professional knowledge of cyber methodology in vector depth
  • High capability of process analysis, threats, and cyber risks
  • Analysis of infrastructure, assets, and critical processes in organizations
Director of Information Security / Cyber Protection CISO

TCM is looking for a Director of Information Security / Cyber Protection CISO to join our team!

What you will do:

  • Responsibility for the organizational information security strategy, risk management in the IT network, response to information security events and ongoing contact as part of the organization’s IT team
  • Management and implementation of the data protection strategy in the organization in accordance with Best Practices on the variety of embedded products
  • Responsibility for implementing information security procedures in the organization and increasing awareness of the issue of information security

What you are:

  • 3+ years of experience in the field of information security and communication infrastructures.
  • Relevant certifications in a field such as CCNA/CISO
  • In-depth knowledge and experience in the field of networking and implementation of products at the Enterprise level
  • Experience in managing complex projects in the field of network and information security, architecture, and infrastructure solutions
  • Former experience in writing procedures and information security policies in SMEs
  • Experience in planning, establishing, and maintaining existing communication infrastructures and implementing new information security technologies in the organization
  • Extensive experience in information security products such as Varonis/Cynet /Edr and segmentation
  • Familiarity with WAF / EDR / DLP / IPS products
  • Familiarity with communication products such as Arista/Cisco/Aruba
  • Experience in Citrix/VMware virtualization

Didn't find what you're looking for?

Don’t worry, we still want to get to know you. Stay updated and
maybe something will change! contact us

Website Sections

TCM Group has 20 years of experience in the Israeli and international communications economy as well as a variety of professional services in the fields of ICT. The knowledge we share together with dozens of experts in various disciplines allows for an end-to-end solution.

Choose Language

Follow Us

Copywriting 2022 By TCM