Private Security Advisory

Institutional knowledge.
Operational reality.

Vigilance provides expert advisory across the full spectrum of private security — from red team assessment and protocol development to physical security installation, personnel vetting, and executive protection — applied to private and institutional needs.

Red Team Assessment Protocol Development Physical Security Advisory Personnel Vetting Executive Protection OPSEC Review Armed Security Advisory Training & Exercises Installation Oversight Threat Assessment Red Team Assessment Protocol Development Physical Security Advisory Personnel Vetting Executive Protection OPSEC Review Armed Security Advisory Training & Exercises Installation Oversight Threat Assessment

About

Judgment Before Method.

Vigilance is a specialist advisory practice offering structured security counsel to private and institutional clients. Our practitioners bring direct operational experience to assessments, protocol development, systems advisory, and training — applied with the seriousness that consequential security work requires.

There is no such thing as perfect security. What is achievable is a well-matched combination of intuition, systematization, and current methods and technology calibrated to a given context, threat environment, and organization. That combination can make all the difference — and it is what we work to identify and build with our clients.

We look beyond surface-level compliance to identify the vulnerabilities that actually matter. Our assessments are honest, our scopes are defined before any work begins, and our deliverables are written to be used — not filed.


Services

Full-Spectrum Security Advisory

All work is scoped by written commission after an initial assessment of your requirements, threat environment, and operating context. Pricing is subject to scope, practitioner availability, and demand.

Assessment

Red Team Assessment

Adversarial review of your physical, procedural, and organizational security. We test your defenses as a motivated adversary would, identify exploitable gaps, and deliver ranked findings.

  • Physical penetration and access control testing
  • Social engineering and human factor assessment
  • Procedural gap analysis and protocol review
  • Prioritized risk register with remediation guidance
Documentation

Security Protocol Development

Many protocols are ambiguous under pressure or written by people unfamiliar with how adversaries operate. We write security procedures that are clear, realistic, and executable by the people using them.

  • Standing operating procedure development
  • Incident response and escalation frameworks
  • Crisis communication and lockdown protocols
  • Protocol testing and tabletop exercise support
Infrastructure

Physical Security Installation Advisory

We advise on access control, surveillance architecture, perimeter hardening, and alarm infrastructure — ensuring systems are specified correctly, installed by qualified vendors, and configured for your actual threat environment.

  • Access control specification and vendor oversight
  • Surveillance system placement and coverage review
  • Perimeter assessment and hardening recommendations
  • Integration review: systems that work together
Personnel

Personnel Vetting & Staffing Advisory

The most sophisticated physical security system fails when the wrong person sits behind it. We advise on vetting frameworks for security personnel, executives, and contractors — and assist in identifying candidates who meet a genuine standard.

  • Vetting framework design and screening standards
  • Candidate assessment and reference evaluation
  • Armed security staffing advisory and sourcing support
  • Security clearance context and fitness-for-duty guidance
Protection

Executive & Principal Protection Advisory

Protection begins before a visible threat materializes. We advise on travel risk, threat assessment, advance work, and the selection and management of protective personnel.

  • Threat environment and risk assessment
  • Travel security planning and advance guidance
  • Protective detail structure and staffing advisory
  • Vendor and provider selection support
Intelligence

Operational Security & OPSEC Review

Information is the most underprotected asset in most organizations. We review how your organization handles sensitive communications and critical information — identifying exposure points before they are exploited.

  • Information handling audit and classification review
  • Insider threat scenario modeling
  • Communications security assessment
  • Social engineering vulnerability analysis
Training

Training, Preparedness & Tabletop Exercises

Plans only function if the people responsible have rehearsed them under realistic conditions. We develop and facilitate training programs, tabletop exercises, and scenario-based rehearsals tailored to your threat environment and personnel. The objective is not to pass an audit — it is to be genuinely ready.

  • Scenario development based on credible threat profiles
  • Tabletop exercises for leadership and operational teams
  • After-action review and protocol refinement
  • Emergency response and mass casualty preparedness
  • Hostile environment awareness for traveling executives and staff
  • Security staff training program design and delivery
Technology

AI, Operational Technology & Systems Advisory

Independent advisory on the adoption of AI tools in security operations, and on the specification and sourcing of operational technology — including drone systems for surveillance, perimeter monitoring, and operational applications. We advise on vendor evaluation and procurement; we do not sell or represent any system or supplier.

  • AI tools integration for security and operational workflows
  • Drone systems advisory — surveillance, perimeter, and field applications
  • Security technology specification and procurement process support
  • Operational technology risk review and integration assessment

Scope & Pricing. All engagements are bespoke and priced by scope, practitioner availability, and time. We do not publish a fee schedule. Engagements are available across a range of scales — clients are assessed on the nature and seriousness of their requirements, not the size of their budget. Begin with a short, candid introduction describing your situation and objectives.


Approach

Field Experience.
Structured Deliverables.

We ask the right questions before offering answers, scope work honestly, and deliver outputs concrete enough to act on. We do not produce reports designed to look impressive. We produce assessments designed to reduce risk.

01 — Honesty

Candid Assessment

We tell clients what we find, including findings that are uncomfortable. Security advisory that avoids difficult conclusions is liability management theater.

02 — Scope

Defined Before We Begin

Every engagement begins with a written scope defining objectives, deliverables, access requirements, and timelines. Ambiguity is how security engagements fail.

03 — Delivery

Outputs You Can Use

Deliverables are written for practitioners and decision-makers. Findings are ranked by priority. Recommendations are specific.

04 — Discretion

Professional Confidentiality

All engagements are handled with strict professional confidentiality. Client relationships are not disclosed without consent. All practitioners operate under written confidentiality obligations.

05 — Fit

We Decline When Appropriate

We work exclusively on lawful matters and decline any engagement that conflicts with applicable law or professional standards. We say no when the fit is not right.

06 — Continuity

Long-Term Availability

Threats change. Security posture evolves. We are available for follow-on engagements, protocol updates, and ongoing advisory — not just a one-time report.


Process

Step One

Initial Contact

A short email describing your organization, the nature of your concern, and your approximate timeline. General description is sufficient at first contact.

  • Reviewed for fit, legality, and practitioner availability
  • We respond with a frank assessment and proposed next step
  • All initial contact treated with professional discretion
Step Two

Scoping & Written Commission

If there is a credible fit, we produce a written scope defining objectives, deliverables, access requirements, confidentiality terms, timeline, and fee. No work begins without a written scope.

  • Deliverable definitions — what you receive and when
  • Access and cooperation requirements
  • Confidentiality terms governing the engagement
  • Fee structure tied to scope and practitioner time

Contact

Begin a Confidential Inquiry

Send a brief email describing your organization, the nature of your security concern, and your timeline. Sensitive details are not required at first contact.

Please include "Vigilance Inquiry" in the subject line.

  • Type of organization and approximate scale
  • Nature of concern — general description is sufficient
  • Geographic context and timeline
chartulary@protonmail.com

Commission Standards

All engagements reviewed for legal compliance, scope viability, and practitioner fit before acceptance.

We do not accept engagements that would require or facilitate unlawful activity.

Client information and the existence of client relationships are confidential by default.

Pricing is demand and availability-adjusted. All fees are defined in writing before work begins.

If your matter is urgent, state that clearly in the subject line.

All services are advisory in nature unless otherwise specified in a written agreement. All engagements are conducted in accordance with applicable laws and regulatory requirements. We do not act as an agent, employer, or contracting party unless explicitly stated in writing. No specific outcomes or results are guaranteed; recommendations are based on professional judgment and available information. Specialists or contractors identified through our network operate as independent professionals unless otherwise specified. Information shared in the course of inquiry or engagement is handled with professional discretion in accordance with applicable privacy and data protection laws.