Enterprise-grade IT support and cybersecurity — delivered with clarity, consistency, and a security-first mindset at a price point that makes sense for the businesses that can't afford to be breached.
Subscription-based IT support with cybersecurity baked in — flat monthly pricing, no surprises, no lock-in tricks.
| Feature | Essentials $75/user |
Secure ⭐ $125/user |
Sentinel $175/user |
|---|---|---|---|
| Remote Helpdesk Support | ✓ | ✓ | ✓ |
| Microsoft 365 Support | ✓ | ✓ | ✓ |
| Endpoint Monitoring | ✓ | ✓ | ✓ |
| Patch Management | ✓ | ✓ | ✓ |
| Microsoft Defender AV | ✓ | ✓ | ✓ |
| MFA Enforcement | — | ✓ | ✓ |
| Identity & Access (Entra ID) | — | ✓ | ✓ |
| Email Security & Phishing Protection | — | ✓ | ✓ |
| Backup & Verified Restores | — | ✓ | ✓ |
| Quarterly Security Review | — | ✓ | ✓ |
| Advanced EDR (Huntress) | — | — | ✓ |
| Vulnerability Scanning | — | — | ✓ |
| After-Hours Emergency Support | — | — | ✓ |
| Monthly Executive Security Report | — | — | ✓ |
| SLA Response Time | Same business day | 4 hours (biz hours) | 1 hour emergency |
Not ready for a managed plan? No pressure. Every service below is one-time, flat-rate, and zero commitment.
The security platform built in-house by Twilight Tech — automated domain scanning, AI risk analysis, and client-ready reports, all in one deployable system.
A unified security platform combining automated domain scanning, Claude AI-powered risk analysis, and a purple team AI agent (HackBot) into a single deployable system. Built for MSPs, security consultants, and red/blue teams who need actionable intelligence fast.
SSL/TLS, DNS, HTTP headers, port scanning, subdomain enumeration, technology fingerprinting
Claude AI evaluates scan results, generates executive summaries and remediation guidance
Weighted scoring across all scan dimensions with letter-grade ratings
Branded, client-ready reports with charts, findings, and recommendations
Find businesses via search and automatically create leads for outreach pipeline
CSV bulk scanning, cron-based recurring scans with drift detection
Tenant-scoped read-only access for your MSP clients with billing and credits
Push results to Slack, PagerDuty, or any HTTP endpoint
Claude-powered autonomous security agent with MITRE ATT&CK integration, multi-phase kill chain orchestration, and real-time threat intelligence.
Claude-powered reasoning with tool use, scope enforcement, and audit trails across 25 iterative cycles
14 tactics, 214 techniques, kill chain mapping with Dijkstra pathfinding
NVD, CISA KEV, Exploit-DB, GTFOBins, LOLBAS feeds with CVE cross-correlation
NIST 800-53, CIS v8, PCI-DSS v4, HIPAA, SOC 2 with 113 mapped controls
Auto-generate Sigma, YARA, and Snort rules. 90 pre-built SIEM hunt queries
12-phase orchestration with session pause/resume and 5-specialist agent system
8 incident types with containment, eradication, recovery phases and compliance timelines
Entity-relationship mapping with episodic learning and adaptive decision-making
DNS history, WHOIS pivoting, subdomain enumeration, tech fingerprinting via parallel asyncio
Native Windows via pywebview + Edge WebView2 with Ctrl+Shift+H global hotkey overlay
Speech-to-text input, neural TTS output, auto-speak on critical security alerts
File management, app control, clipboard, screenshots with granular permission levels
OAuth2 email, RSS/Atom aggregation with AI digests, cron task automation
Established the twilight-platform repo, designed FastAPI gateway with JWT auth + RBAC. Built the Sentinel scanning engine with SSL/TLS, DNS, HTTP header analysis, port scanning, and subdomain enumeration. Created the risk scoring engine and first PDF report templates.
Engineered the Claude-powered ReAct autonomous agent with 25 iterative reasoning cycles and deterministic scope enforcement. Built the 5-specialist agent system (Recon, Vulnerability, Attack, Defense, Report) with typed inter-agent communication and dependency-ordered execution.
Integrated MITRE ATT&CK (214 techniques), NVD/CISA KEV/Exploit-DB threat feeds, 5 compliance frameworks (113 mapped controls), detection rule generation (Sigma/YARA/Snort), and 90 pre-built SIEM hunt queries across Splunk, Sentinel, and Elastic.
Built integration layer (Redis pub/sub event bus + enrichment pipeline), multi-tenant billing system, plugin marketplace, client portal, desktop companion with voice I/O, MCP server (21 tools, 3 resources, 6 prompts), and Tauri/Rust installer.
Reached 113,557 lines across 333 files. Achieved 2,380 tests (100% pass, 0 warnings). Built CI/CD with Ruff linting, Bandit security scanning, multi-stage Docker builds. 30 iterative development rounds using Claude Code as AI pair-programming partner.
We audit your users, devices, and M365 environment to understand your current security posture and identify gaps.
RMM agents, endpoint protection, and backup tools are deployed across all devices with zero disruption to your workflow.
MFA enforced, admin accounts secured, security policies applied. Your environment is hardened to Twilight Tech standards.
Everything is documented — credentials, network diagrams, SOPs, vendor contacts. Nothing lives only in someone's head.
Orientation call, support walkthrough, and your dedicated support channel goes live. You're officially Twilight Tech managed.
Browse the À La Carte section. Not sure? Book a $100 IT Consultation and we'll tell you exactly what you need.
Use the intake form below, or email twilighttech.builds@gmail.com. Describe your situation and we'll confirm same day.
You'll receive a flat-rate invoice before any work begins. Pay once, no surprises. Work starts after payment is confirmed.
Most services are completed remotely within 24–48 hours. You'll get a full summary of everything done.
That's it. You're not subscribed to anything. Managed plans are here when you're ready — but there's zero pressure.
Our next-generation Sentinel platform uses AI-assisted cybersecurity analysis to continuously scan your domain, analyze security risks, and generate actionable threat reports. Coming soon for managed clients.
Join the Early Access ListTwilight Tech was founded by James "Twilight" Destrades Jr., an IT professional with over 8 years of hands-on help desk experience and a decade of customer service expertise. Based in Atlanta, Georgia, Twilight Tech brings enterprise-grade thinking to small businesses that deserve real protection.
This isn't a call center. Every ticket, every policy, every security configuration is handled with direct expertise in Microsoft environments, Active Directory, endpoint security, and identity management. Cybersecurity isn't an afterthought here — it's the foundation.
James has built and repaired custom PCs, deployed Microsoft 365 tenants, hardened endpoints, managed Active Directory, responded to security incidents, and built an AI-powered cybersecurity platform from scratch — 113,000+ lines of production code. Twilight Tech exists to make that expertise accessible to the businesses that need it most.
Select the type of request below. Our intake process ensures you get the right tech, right away.
// Let us know who we're helping
// Tell us about the machine
Windows + Pause — or right-click Start → System. Shows CPU, RAM, and Windows version.Ctrl + Shift + Esc → Performance tab → GPU.Windows + R, type msinfo32, press Enter — shows everything at once.🍎 Apple menu in the top-left corner.About This Mac — shows chip, memory, and macOS version.More Info... then scroll to Storage to see drive size.// Describe what's happening
// Set priority and give us access
Thanks for reaching out to Twilight Tech. We've received your repair request and will contact you within your selected urgency window. Check your email for a confirmation.
Email Us Directly →All tiers are starting points — every build is fully customized to your needs and budget. ↓ Fill out the form below.
// Who is this build for?
// What will this machine do?
// Set your price range
// What matters most to you?
// When do you need it?
Your custom PC build request is in. Twilight Tech will review your specs and budget and send you a custom parts list and quote within 1–2 business days.
Email Us Directly →Ready to get started, need a one-time service, or just want to understand your security posture? Whether you're a small business owner or a fellow security engineer — Twilight Tech is standing by.