Skip to content
MVPeople Group Logo
MVPeopleGroup
MVProjects Statement of Work
MVProjects — Statement of Work

Hire an ISO 27001 Implementation Consultant

MVProjects delivers project-based cybersecurity services with a clear scope, fixed deliverables and a predictable timeline. From ISO 27001 implementations and NIS2 compliance trajectories to DORA readiness assessments, penetration tests and IAM projects. We work with fixed project prices, certified consultants and a proven methodology based on ISO, OWASP and NIST. The result: tangible deliverables, a management presentation and a concrete improvement plan.

Fixed

Project price

ISO/NIST

Certified methodology

100%

Deliverable guarantee

Incl.

Management presentation

Our Project Types

MVProjects delivers the full spectrum of cybersecurity projects. Every project is executed by certified consultants with proven experience in the specific domain.

ISO 27001 Implementation

Full implementation of an Information Security Management System (ISMS) in accordance with ISO 27001:2022. From gap analysis to certification audit preparation. Including policy framework, risk management and internal audit.

ISMSCertificationGap Analysis

NIS2 Compliance

NIS2 directive gap analysis, roadmap and implementation. We map your current maturity level, identify the gaps and implement the measures needed for compliance before the deadline.

NIS2Gap AnalysisRoadmap

DORA Readiness

Digital Operational Resilience Act assessment for financial institutions. Gap analysis, ICT risk management framework, incident reporting procedures and third-party risk management implementation.

DORAFinancial SectorResilience

Penetration Testing

Professional penetration tests conducted by certified ethical hackers (OSCP, CEH, GPEN). Web application, infrastructure, API, red team and social engineering assessments with actionable reporting.

Red TeamWeb AppOSCP

IAM/IGA Implementation

Identity & Access Management and Identity Governance & Administration projects. From architecture design to implementation of platforms such as SailPoint, Saviynt, Azure AD and CyberArk.

IAMIGAZero Trust

Cloud Security Assessment

Security assessment of your Azure, AWS or GCP environment. Configuration audit, compliance check (CIS Benchmarks), architecture review and roadmap for cloud-native security improvement.

AzureAWSGCP

GDPR Gap Analysis

GDPR compliance gap analysis, records of processing activities, DPIAs and privacy policies. Including DPO-as-a-service option for organisations seeking an external data protection officer.

GDPRDPIADPO

Our Methodology

Every MVProjects project follows a structured methodology that ensures predictability, quality and concrete results.

1

Intake & Scoping

Detailed project intake to establish scope, deliverables, timeline and budget. You receive a clear Statement of Work with a fixed project price.

2

Assessment & Analysis

Our experts conduct a thorough analysis of the current situation: documentation review, interviews, technical scans and gap identification.

3

Design & Roadmap

Based on the analysis, we design the target architecture and prepare a prioritised roadmap with concrete measures and quick wins.

4

Implementation

Hands-on implementation of the agreed measures: policies, procedures, technical configurations, training and processes.

5

Validation & Testing

Validation of the implemented measures through internal audits, technical tests and simulations. We ensure everything works as designed.

6

Reporting & Handover

Final report with findings, recommendations and management summary. Including presentation to management/board and handover to your team.

Why MVProjects for Your Cybersecurity Project?

MVProjects distinguishes itself through the combination of deep cybersecurity expertise, a project-based approach and transparent commercial terms. We are not a generic IT consultancy that also does "something with security" — cybersecurity is our sole domain.

  • Fixed project price, no surprises afterwards
  • In-house team of certified cybersecurity experts
  • Certified methodology (ISO, OWASP, NIST)
  • Final report and management presentation included
  • Ongoing support after delivery available
  • NDA and confidentiality guarantee as standard

Statement of Work

Every project starts with a detailed Statement of Work in which scope, deliverables, timeline, project team and price are established. You know exactly what you will receive, when you will receive it and what it will cost.

Request a project proposal

Frequently Asked Questions about Cybersecurity Projects

READY TO START YOUR CYBERSECURITY PROJECT?

Get in touch for a no-obligation project estimate. We analyse your situation and deliver a clear proposal with a fixed price and defined deliverables.