PA Consulting Services Limited (UK)

Threat Hunting

It’s possible that threat actors are already active within your organisation’s networks. PA’s threat hunting service is designed to find evidence of compromise and network-based anomalies, whilst also providing practical recommendations. Every threat hunt is tailored to your infrastructure, existing policies and procedures, and priorities with regards to Cyber Security.


  • Identifies threats previously hidden within your network
  • Tailored service offering based on your business priorities
  • Bolster existing components of your Cyber Security Strategy
  • Integrate with PA’s retained incident response and penetration testing services
  • Identify data being exfiltrated using file sharing applications
  • Detect personal data being stored in insecure locations
  • Find out-of-date or unpatched software on critical systems
  • Discover sensitive data being regularly copied to removable media devices
  • Identify unusual file access activity being recorded by file shares
  • Detect privilege escalation and unusual network traffic in core systems


  • Demonstrate GDPR or other compliance by appropriate ‘technical measures’
  • Evidence of going above-and-beyond information and cyber security obligations
  • Verify the effectiveness of existing cyber security controls
  • Identify areas for improvement in existing cyber security controls
  • Detect and understand any insider threats or data leakage
  • Thorough investigation of suspicious findings, allowing efficient mitigation
  • Receive practical recommendations that deliver benefits and security improvements


£800 per person per day

Service documents


G-Cloud 11

Service ID

3 1 2 1 6 4 1 3 7 4 2 5 0 2 8


PA Consulting Services Limited (UK)

Lia Shaw

0207 730 9000



Planning service No


Training service provided Yes
How the training service works PA is independent from all vendors and provides impartial advice and training. We can provide training services for any cloud software service and any hosting service. We have strong partnerships with a number of vendors inc: Microsoft, AWS, Google, UK Cloud, Crown Hosting and others, which allows us to do this. We also provide certified courses in Scales Agile (SAFe) and cyber security areas tailored specifically for cloud software and hosting capabilities.
Training is tied to specific services No

Setup and migration

Setup and migration
Setup or migration service available No

Quality assurance and performance testing

Quality assurance and performance testing
Quality assurance and performance testing service No

Security testing

Security testing
Security services Yes
Security services type
  • Security strategy
  • Security risk management
  • Security design
  • Cyber security consultancy
  • Security testing
  • Security incident management
  • Security audit services
  • Other
Other security services
  • Digital Forensics and Investigation Services
  • EDiscovery
Certified security testers Yes
Security testing certifications
  • Cyber Scheme
  • Other
Other security testing certifications
  • Offensive Security Certified Professional
  • ISC²: Certified Information Systems Security Professional (CISSP)
  • ISC²: Certified Secure Software Lifecycle Professional (CSSLP)
  • ISACA: Certified Information Security Manager (CISM)
  • ISACA: Certified in Risk and Information Systems Control
  • BSI: ISO/IEC 27001 Lead Auditor
  • PCI Council: QSA; IISP Members (Associate to Fellow)
  • CCP: Practitioner to Lead Practitioner: IA Architecture
  • CCP: Practitioner to Lead Practitioner: Security and Information Risk Advisor
  • CCP: Practitioner to Lead Practitioner: Information Security Audit

Ongoing support

Ongoing support
Ongoing support service Yes
Types of service supported
  • Buyer hosting or software
  • Hosting or software provided by your organisation
  • Hosting or software provided by a third-party organisation
How the support service works We provide a range of managed service support capabilities for our clients. This includes first line user support through to third line technical software support. We make use of an existing service desk that already provides extended UK business hours support for over 35,000 users. We also offer offshore support capabilities to provide lower cost application support services and software development.

Service scope

Service scope
Service constraints There are no significant limitations in our service offering.

User support

User support
Email or online ticketing support Yes, at extra cost
Support response times Response times will be agreed as part of a service level agreement with the client.
User can manage status and priority of support tickets Yes
Online ticketing support accessibility WCAG 2.1 A
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support Yes, at an extra cost
Web chat support availability 24 hours, 7 days a week
Web chat support accessibility standard WCAG 2.1 A
Web chat accessibility testing Web chat testing protocol will be agreed with the client as part of our service design process.
Support levels We adapt our support to the needs of the users and can offer most support levels requested by clients. We have provided all combinations of first, second, and third line support to our clients; we have provided all combinations of UK business hours, UK extended business hours, US business hours and 24/7 support facilities to our clients. We have provided both real-time telephone support, email support, and on-call support. The costs of each of these models is tailored to the specific needs of our clients to ensure the right level of support is provided to the service in question. In all of our client engagements there will be a dedicated account manager – and typically a cloud support engineer or technical account manager depending on the needs of the client.


Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Developed Vetting (DV)


Price £800 per person per day
Discount for educational organisations No

Service documents

Return to top ↑