Two Raccoons A pre-product software security startup & consulting firm

Two Raccoons brings hands-on security expertise forged at high-growth startups and refined inside Fortune 500 enterprises. We don’t sell slides — we ship outcomes.


Penetration Testing

We find the holes before someone else does. Our testing goes beyond automated scanning to deliver adversary-realistic assessments of your applications, infrastructure, and cloud environments.

  • Web & Mobile Application Penetration Testing — OWASP Top 10 and beyond, covering business logic flaws, authentication bypasses, and API abuse
  • Network & Infrastructure Testing — Internal and external network assessments, Active Directory attack paths, and lateral movement analysis
  • Cloud Security Assessments — AWS, Azure, and GCP configuration review, IAM policy analysis, and cloud-native attack simulation
  • Red Team Engagements — Multi-phase, objective-driven assessments that simulate real-world adversaries targeting your organization

Security Engineering & SDLC Integration

Security bolted on at the end breaks things. We embed security into every stage of your development lifecycle so your teams ship faster with fewer vulnerabilities.

  • Secure SDLC Design — Threat modeling, secure architecture review, and security requirements integrated into your sprint process
  • CI/CD Pipeline Security — SAST, DAST, SCA, and secrets detection tooling deployed and tuned to reduce noise and catch real issues
  • Container & Infrastructure as Code Security — Policy-as-code enforcement, image scanning, and runtime protection for Kubernetes and serverless environments
  • Security Tooling Architecture & Deployment — We select, deploy, configure, and operationalize the security tools that actually fit your stack — not the ones with the best sales team

Application Security Engineering

Reducing your attack surface isn’t a one-time project — it’s an engineering discipline. We work alongside your development teams to harden what matters most.

  • Attack Surface Reduction — Identify and eliminate unnecessary exposure across APIs, services, and external integrations
  • Authentication & Authorization Hardening — OAuth/OIDC implementation, session management, MFA integration, and least-privilege access controls
  • Secrets Management — Vault architecture, key rotation strategies, and eliminating hardcoded credentials from your codebase
  • Critical Asset Protection — Data classification, encryption-at-rest and in-transit, and access controls around your most valuable software and information assets

Compliance & Certification Readiness

We’ve helped companies navigate the audit gauntlet — not by generating paperwork, but by building the controls and evidence that auditors actually want to see.

Framework What We Deliver
SOC 2 Type II Control design, evidence collection, continuous monitoring, and audit prep through successful completion
ISO 27001 ISMS implementation, risk assessment, policy development, and certification support
HIPAA Technical safeguard implementation, risk analysis, BAA review, and PHI data flow mapping
FedRAMP System security plan development, control implementation, and authorization package preparation
PCI DSS Cardholder data environment scoping, network segmentation, and SAQ/ROC preparation

We don’t just help you pass the audit — we build the programs that keep you compliant year-round.


Why Two Raccoons

We’ve done this at scale. Between us, we’ve built and led security programs at startups that were acquired by Ford Motor Company and JPMorgan Chase — environments where “good enough” security doesn’t exist. We bring that same rigor to organizations of every size.

  • No long-term contracts required — engagement-based or retainer, your call
  • Direct access to senior engineers, not a rotating bench of juniors
  • We integrate with your tools, your workflows, your Slack channels

Ready to talk? Get in touch and let’s figure out what you actually need.