Now serving small businesses across the U.S.
Twilight Tech
James "Twilight" Destrades Jr.  ·  Atlanta, GA

Enterprise-grade IT support and cybersecurity — delivered with clarity, consistency, and a security-first mindset at a price point that makes sense for the businesses that can't afford to be breached.

🛡️ Managed IT & Cybersecurity MSP
🤖 AI Security Platform Builder
🔬 Twilight Sentinel & HackBot Creator
8+
Years IT Experience
3
MSP Service Tiers
1hr
Emergency Response
113K+
Lines of Platform Code
100%
Security-First
Microsoft 365 Support Endpoint Security Identity & Access Management Backup & Recovery Active Directory Patch Management MFA Enforcement Help Desk Support Threat Detection AI Security Analysis HackBot Purple Team Twilight Sentinel Scanning PC Hardware Builds Incident Response Microsoft 365 Support Endpoint Security Identity & Access Management Backup & Recovery Active Directory Patch Management MFA Enforcement Help Desk Support Threat Detection AI Security Analysis HackBot Purple Team Twilight Sentinel Scanning PC Hardware Builds Incident Response
// Managed Service Plans

Choose Your Protection Level

Subscription-based IT support with cybersecurity baked in — flat monthly pricing, no surprises, no lock-in tricks.

🔹
Twilight Essentials
// Solo pros & micro-businesses
$75/ user / month
⏱ Same Business Day Response
  • Remote help desk support (business hours)
  • Microsoft 365 user & account support
  • Password resets & account lockouts
  • Endpoint health & uptime monitoring
  • OS & application patch management
  • Microsoft Defender antivirus
  • Monthly system health summary
Get Started
⚔️
Twilight Sentinel
// High-risk & regulated environments
$175/ user / month
🚨 1-Hour Emergency Response
  • Everything in Secure, plus:
  • Endpoint Detection & Response (EDR)
  • Huntress threat hunting & managed detection
  • Vulnerability scanning & remediation
  • Security event monitoring (SOC-lite)
  • After-hours emergency support
  • Monthly executive security report
  • Incident response support
Get Started

Full Plan Comparison

Feature Essentials
$75/user
Secure ⭐
$125/user
Sentinel
$175/user
Remote Helpdesk Support
Microsoft 365 Support
Endpoint Monitoring
Patch Management
Microsoft Defender AV
MFA Enforcement
Identity & Access (Entra ID)
Email Security & Phishing Protection
Backup & Verified Restores
Quarterly Security Review
Advanced EDR (Huntress)
Vulnerability Scanning
After-Hours Emergency Support
Monthly Executive Security Report
SLA Response Time Same business day 4 hours (biz hours) 1 hour emergency
// À La Carte Services

No Subscription Required

Not ready for a managed plan? No pressure. Every service below is one-time, flat-rate, and zero commitment.

🔧

Think of it like calling a plumber.

You don't pay a plumber monthly — you call when something breaks. Twilight Tech works the same way. One-time help, done right, no commitment required. Most clients start here, then upgrade to managed services when it makes sense for them.

🔐
MFA & Security Hardening
Enable MFA, lock down accounts, and apply security policies across your environment.
$199
one-time
  • MFA enabled for all users
  • Conditional access policies applied
  • Admin accounts secured
  • Security baseline hardening
Book This Service →⚡ No subscription · Pay once · Done right
🚨
Incident Response
Something went wrong. Twilight Tech responds, contains the damage, and gets you back online.
$150
/ hour
  • Available to non-managed clients
  • Malware, ransomware, breach response
  • Containment & recovery
  • Post-incident documentation
Get Help Now →⚡ No contract required
🎓
Security Awareness Training
Teach your team to recognize phishing, social engineering, and cyber threats.
$10
/ user / month
  • Simulated phishing campaigns
  • Training modules for your team
  • Monthly completion reports
  • Add-on to any plan or standalone
Learn More →⚡ Add-on or standalone
👤
User Onboarding & Offboarding
New hire gets set up right. Departing employee gets locked down immediately.
$75
onboarding · $50 offboarding
  • Account creation, licensing, MFA setup
  • Group & mailbox access configured
  • Offboarding: account disabled, data secured
  • Licenses recovered & documented
Book This Service →⚡ Per user · No subscription
💼
Laptop Setup for New Hires
New employee starts Monday. Their laptop is ready Friday — enrolled, secured, documented.
$125
/ device
  • OS configuration & updates applied
  • Entra ID / domain enrollment
  • Required software installed
  • Defender & backup agent deployed
Book This Service →⚡ Per device · No subscription
🌐
Network & WiFi Troubleshooting
Slow WiFi, dead zones, devices that won't connect — diagnosed and fixed fast.
$99–$199
one-time
  • WiFi performance & coverage diagnosis
  • Router & modem configuration
  • Device network troubleshooting
  • Home or small office network setup
Book This Service →⚡ No subscription · Pay once · Done right
🔧
PC / Laptop Hardware Repair
Broken screen, bad battery, won't boot, overheating — real hardware repair from a real tech.
$75+
diagnostic + parts at cost
  • Flat $49 diagnostic (applies to repair)
  • Hardware diagnosis & repair estimate
  • Parts sourced & installed
  • Post-repair performance verification
Book This Service →⚡ No subscription · Pay once · Done right
💬
IT Consultation
Don't guess what you need. Get a plan from someone who actually knows. 1-hour minimum.
$100
/ hour
  • Current environment review
  • Prioritized recommendations delivered
  • No work performed — advice only
  • Written summary follow-up included
Book a Consult →⚡ 1-hour minimum · No commitment
// Twilight Sentinel Platform

AI-Powered Security Scanning

The security platform built in-house by Twilight Tech — automated domain scanning, AI risk analysis, and client-ready reports, all in one deployable system.

Active Development // MIT Licensed
twilight-platform
// AI-Assisted Cybersecurity Analysis & Purple Team Platform

A unified security platform combining automated domain scanning, Claude AI-powered risk analysis, and a purple team AI agent (HackBot) into a single deployable system. Built for MSPs, security consultants, and red/blue teams who need actionable intelligence fast.

113K+
Lines of Python
333
Python Files
2,380
Tests (100% Pass)
127
REST/WS Endpoints
123
Pydantic Schemas
29
HackBot Modules
11.5K
Dashboard Lines
5
AI Agents
View Repository HackBot Details Join Early Access

Sentinel — Web Scanning Capabilities

Domain Scanning

SSL/TLS, DNS, HTTP headers, port scanning, subdomain enumeration, technology fingerprinting

AI Risk Analysis

Claude AI evaluates scan results, generates executive summaries and remediation guidance

Risk Scoring Engine

Weighted scoring across all scan dimensions with letter-grade ratings

PDF Report Generation

Branded, client-ready reports with charts, findings, and recommendations

Discovery Engine

Find businesses via search and automatically create leads for outreach pipeline

Batch + Scheduled Scans

CSV bulk scanning, cron-based recurring scans with drift detection

Client Portal

Tenant-scoped read-only access for your MSP clients with billing and credits

Webhook Notifications

Push results to Slack, PagerDuty, or any HTTP endpoint

+-------------------+ | Dashboard UI | | (SPA + Chat UI) | +--------+----------+ | +--------v----------+ | FastAPI Gateway | | JWT Auth + RBAC | +--------+----------+ | +--------------+--------------+ | | +---------v---------+ +-----------v-----------+ | Twilight Sentinel | | HackBot AI Agent | | Scanning Engine | | ReAct + Tool Use | | Risk Scoring | | MITRE + Intel | | Report Gen | | Kill Chain Orch. | +---------+---------+ +-----------+-----------+ | | +--------+ +-------------+ | | +------v-----v------+ | Integration Layer | | Redis Event Bus | | Enrichment | +-------------------+ | +------------+------------+ | | +-----v-----+ +------v------+ | PostgreSQL | | SQLite | | (Sentinel) | | (HackBot) | +------------+ +-------------+
// HackBot — Purple Team AI Agent

HackBot by Twilight Tech

Claude-powered autonomous security agent with MITRE ATT&CK integration, multi-phase kill chain orchestration, and real-time threat intelligence.

HackBot — Purple Team AI Agent

ReAct Agent Loop

Claude-powered reasoning with tool use, scope enforcement, and audit trails across 25 iterative cycles

MITRE ATT&CK Engine

14 tactics, 214 techniques, kill chain mapping with Dijkstra pathfinding

Threat Intelligence

NVD, CISA KEV, Exploit-DB, GTFOBins, LOLBAS feeds with CVE cross-correlation

5 Compliance Frameworks

NIST 800-53, CIS v8, PCI-DSS v4, HIPAA, SOC 2 with 113 mapped controls

Detection Engineering

Auto-generate Sigma, YARA, and Snort rules. 90 pre-built SIEM hunt queries

Multi-Phase Kill Chain

12-phase orchestration with session pause/resume and 5-specialist agent system

IR Playbooks

8 incident types with containment, eradication, recovery phases and compliance timelines

Knowledge Graph

Entity-relationship mapping with episodic learning and adaptive decision-making

OSINT Module

DNS history, WHOIS pivoting, subdomain enumeration, tech fingerprinting via parallel asyncio

Desktop Companion

System Tray App

Native Windows via pywebview + Edge WebView2 with Ctrl+Shift+H global hotkey overlay

Voice I/O

Speech-to-text input, neural TTS output, auto-speak on critical security alerts

Trust-Gated Agent

File management, app control, clipboard, screenshots with granular permission levels

Gmail + News + Scheduler

OAuth2 email, RSS/Atom aggregation with AI digests, cron task automation

Tech Stack

Python 3.12+FastAPIAnthropic Claude APIPostgreSQL 16SQLite WALRedis 7Pydantic v2SQLAlchemy AsyncasyncioWebSocketsSSEJWT + RBACDocker ComposeGitHub ActionsPrometheusGrafanapywebviewTauri/RustNginxMCP ServerOllamaOpenAI APIKubernetes

Development Journey

Phase 1 // Foundation
Core Architecture & Sentinel Scanner

Established the twilight-platform repo, designed FastAPI gateway with JWT auth + RBAC. Built the Sentinel scanning engine with SSL/TLS, DNS, HTTP header analysis, port scanning, and subdomain enumeration. Created the risk scoring engine and first PDF report templates.

Phase 2 // AI Agent
HackBot ReAct Loop & Multi-Agent System

Engineered the Claude-powered ReAct autonomous agent with 25 iterative reasoning cycles and deterministic scope enforcement. Built the 5-specialist agent system (Recon, Vulnerability, Attack, Defense, Report) with typed inter-agent communication and dependency-ordered execution.

Phase 3 // Intelligence
MITRE, Threat Intel & Compliance

Integrated MITRE ATT&CK (214 techniques), NVD/CISA KEV/Exploit-DB threat feeds, 5 compliance frameworks (113 mapped controls), detection rule generation (Sigma/YARA/Snort), and 90 pre-built SIEM hunt queries across Splunk, Sentinel, and Elastic.

Phase 4 // Platform
SaaS Features, Desktop App & MCP Server

Built integration layer (Redis pub/sub event bus + enrichment pipeline), multi-tenant billing system, plugin marketplace, client portal, desktop companion with voice I/O, MCP server (21 tools, 3 resources, 6 prompts), and Tauri/Rust installer.

Phase 5 // Current
Scale, Polish & Open Source

Reached 113,557 lines across 333 files. Achieved 2,380 tests (100% pass, 0 warnings). Built CI/CD with Ruff linting, Bandit security scanning, multi-stage Docker builds. 30 iterative development rounds using Claude Code as AI pair-programming partner.

// What's Next

Platform Roadmap

Now // Active

Production Polish

  • Finalize SaaS deployment pipeline (Docker + K8s)
  • Onboard first MSP beta clients through Sentinel portal
  • Expand automated test coverage beyond 2,380
  • Ship desktop companion Tauri installer for Windows
Next // Near-Term

Go-To-Market

  • Launch HackBot as a hosted SaaS product
  • Multi-tenant onboarding and self-serve billing
  • Public API docs and developer SDK
  • Pursue CompTIA Security+ certification
Growth // Mid-Term

Enterprise Features

  • SOC integration (Microsoft Sentinel, Splunk HEC)
  • Advanced attack path simulation with graph analytics
  • Automated remediation playbook execution
  • Open-source community program
Vision // Long-Term

Scale Twilight Tech

  • Twilight Tech managed security contracts (10+ clients)
  • Conference talks and security community presence
  • Cybersecurity training lab / course offering
  • Multi-LLM agent swarm for parallel analysis
// Process

How Support Works

01
Discovery & Inventory

We audit your users, devices, and M365 environment to understand your current security posture and identify gaps.

02
Tool Deployment

RMM agents, endpoint protection, and backup tools are deployed across all devices with zero disruption to your workflow.

03
Security Baseline

MFA enforced, admin accounts secured, security policies applied. Your environment is hardened to Twilight Tech standards.

04
Documentation

Everything is documented — credentials, network diagrams, SOPs, vendor contacts. Nothing lives only in someone's head.

05
Client Handoff

Orientation call, support walkthrough, and your dedicated support channel goes live. You're officially Twilight Tech managed.

01
Pick Your Service

Browse the À La Carte section. Not sure? Book a $100 IT Consultation and we'll tell you exactly what you need.

02
Submit Your Request

Use the intake form below, or email twilighttech.builds@gmail.com. Describe your situation and we'll confirm same day.

03
Invoice & Confirm

You'll receive a flat-rate invoice before any work begins. Pay once, no surprises. Work starts after payment is confirmed.

04
Work Gets Done

Most services are completed remotely within 24–48 hours. You'll get a full summary of everything done.

05
No Obligation After

That's it. You're not subscribed to anything. Managed plans are here when you're ready — but there's zero pressure.

🛡️ Twilight Sentinel — AI Security Platform

Our next-generation Sentinel platform uses AI-assisted cybersecurity analysis to continuously scan your domain, analyze security risks, and generate actionable threat reports. Coming soon for managed clients.

Join the Early Access List
🌒
James "Twilight" Destrades Jr.
Founder & AI Engineer
📍 Atlanta, Georgia
Google Cybersecurity Certificate
CompTIA A+
ISC2 CC
8+ Yrs IT Help Desk
Microsoft 365 Specialist
// About Twilight Tech

Built by Someone Who's Done the Work.

Twilight Tech was founded by James "Twilight" Destrades Jr., an IT professional with over 8 years of hands-on help desk experience and a decade of customer service expertise. Based in Atlanta, Georgia, Twilight Tech brings enterprise-grade thinking to small businesses that deserve real protection.

This isn't a call center. Every ticket, every policy, every security configuration is handled with direct expertise in Microsoft environments, Active Directory, endpoint security, and identity management. Cybersecurity isn't an afterthought here — it's the foundation.

James has built and repaired custom PCs, deployed Microsoft 365 tenants, hardened endpoints, managed Active Directory, responded to security incidents, and built an AI-powered cybersecurity platform from scratch — 113,000+ lines of production code. Twilight Tech exists to make that expertise accessible to the businesses that need it most.

Windows & Microsoft 365
Active Directory / Entra ID
PC Hardware Builds & Repair
Network Troubleshooting
Endpoint Security (EDR)
PowerShell Automation
Backup & Disaster Recovery
Remote Support (RMM)
AI Agent Engineering
MITRE ATT&CK Framework
// Career Path

Experience Timeline

2025 — Present
Founder & Solo Architect / AI Engineer
Twilight Tech LLC — Atlanta, Georgia
  • Solo-designed and built a 113,557-line production platform combining agentic AI, multi-agent orchestration, RAG knowledge systems, and real-time LLM streaming
  • Engineered a ReAct autonomous agent with 25 iterative reasoning cycles, 5-specialist multi-agent system, and deterministic scope enforcement
  • Built multi-provider LLM abstraction (Claude, GPT-4o, Ollama) with automatic failover, token/cost tracking, and MCP server (21 tools)
  • Architected event-driven enrichment pipeline with Redis pub/sub, connecting async scanning to AI threat analysis
  • Shipped native desktop companion with voice I/O, trust-gated agent, and Tauri/Rust installer
8+ Years Experience
Help Desk Technician / IT Support
Enterprise IT Environments
  • Administered Microsoft 365, Active Directory, and Azure AD environments supporting hundreds of users
  • Provided Tier 1-2 support: account provisioning, Group Policy, hardware troubleshooting
  • Managed endpoint deployment, imaging, and lifecycle across Windows environments
  • Created SOPs and documentation that reduced average ticket resolution time
10+ Years Total
Customer-Facing Technical Support
Multiple Organizations
  • Translated complex technical issues into clear guidance for non-technical stakeholders
  • Developed client communication skills critical for MSP consulting and cybersecurity advisory
// Arsenal

AI Engineering Competencies

⚙️ Agentic AI Systems

  • ReAct (Reason-Act-Observe) autonomous agent with 25 iterative reasoning cycles
  • Claude API tool_use integration with 5 core tools and adaptive strategy engine
  • 23 failure-pattern recognizers triggering automatic technique pivots

Multi-Agent Orchestration

  • 5-specialist system (Recon, Vuln, Attack, Defense, Report) with task classifier routing
  • Typed inter-agent communication via Pydantic models with semaphore concurrency
  • Dependency-ordered execution with shared context propagation (1,500+ lines)

LLM Architecture

  • Multi-provider abstraction (851 lines) — Claude, GPT-4o, Ollama + offline fallback
  • Token/cost tracking with ContextVar injection, budget alerts, 11 REST endpoints
  • 5-domain intent classifier with 40+ regex patterns and confidence scoring

RAG & Knowledge Systems

  • Entity-relationship knowledge graph with Dijkstra-based attack chain pathfinding
  • 3-tier memory system: working + episodic + knowledge base
  • Cross-engagement episodic learning feeding back into agent reasoning loop

Real-Time AI Streaming

  • WebSocket chat with async-generator streaming for token-by-token LLM delivery
  • MCP server: 21 tools, 3 resources, 6 prompts, dual-transport (stdio + SSE)
  • Browser-native voice I/O with auto-speak on critical security notifications

Platform Engineering

  • JWT + RBAC auth with tenant isolation across 127 endpoints + JSONL audit trails
  • 11 OWASP headers, CSP nonces, circuit breaker, token-bucket rate limiting
  • CI/CD: Ruff, Bandit, pip-audit, 2,380-test suite, multi-stage Docker builds
LLM & Agentic AI
ReAct Agent Loops
Claude API (tool_use)
Multi-Agent Orchestration
Prompt Engineering
MCP Server
Python & Backend
FastAPI + Pydantic v2
asyncio / aiosqlite
PostgreSQL + SQLAlchemy
Redis (pub/sub + queues)
WebSockets / SSE
Security Domain
MITRE ATT&CK (214 tech)
CVE / Threat Intel
Sigma / YARA / Snort
Compliance (NIST, CIS)
OSINT / Reconnaissance
DevOps & Quality
Docker Compose
GitHub Actions CI/CD
Prometheus + Grafana
pytest (2,380 tests)
OWASP Security
// Submit a Request

Get Help Now

Select the type of request below. Our intake process ensures you get the right tech, right away.

🖥️ Computer Repair Request
01

Your Information

// Let us know who we're helping

Step 1 of 4
02

Device & System Info

// Tell us about the machine

1
Press Windows + Pause — or right-click Start → System. Shows CPU, RAM, and Windows version.
2
For GPU: press Ctrl + Shift + Esc → Performance tab → GPU.
3
Or press Windows + R, type msinfo32, press Enter — shows everything at once.
1
Click the 🍎 Apple menu in the top-left corner.
2
Select About This Mac — shows chip, memory, and macOS version.
3
Click More Info... then scroll to Storage to see drive size.
Step 2 of 4
03

Issue Details

// Describe what's happening

💡 Pro tip: What exactly happens? Any error messages? Does it happen every time or randomly? What were you doing when it started?
Step 3 of 4
04

Urgency & Authorization

// Set priority and give us access

⚠️ Data Notice: Twilight Tech strongly recommends backing up your data before any repair work begins. While we take every precaution, we are not responsible for data loss during repair.
Step 4 of 4
Request Submitted!

Thanks for reaching out to Twilight Tech. We've received your repair request and will contact you within your selected urgency window. Check your email for a confirmation.

Email Us Directly →
// Build Tier Explorer — Click a tier to pre-fill the form below
Entry Level
The Reliable Workhorse
$500 – $800
  • CPURyzen 5 5600 or Intel i5-12400
  • RAM16 GB DDR4
  • Storage500 GB NVMe SSD
  • GPUIntegrated / RX 6500 XT
Home office, Microsoft 365, video calls, light multitasking.
⭐ Mid-Range
The All-Rounder
$900 – $1,400
  • CPURyzen 7 7700X or Intel i7-13700
  • RAM32 GB DDR5
  • Storage1 TB NVMe SSD (Gen 4)
  • GPURTX 4060 or RX 7600 XT
Gaming at 1080p/1440p, content creation, streaming, video editing.
High-End
The Power Build
$1,800 – $3,000+
  • CPURyzen 9 7900X or Intel i9-13900K
  • RAM64 GB DDR5
  • Storage2 TB NVMe + 4 TB HDD
  • GPURTX 4080 or RX 7900 XTX
4K gaming, professional rendering, AI workloads, streaming + gaming simultaneously.

All tiers are starting points — every build is fully customized to your needs and budget. ↓ Fill out the form below.

⚙️ Custom PC Build Request
01

Your Information

// Who is this build for?

Step 1 of 5
02

Build Purpose

// What will this machine do?

Step 2 of 5
03

Budget

// Set your price range

$300$500$750$1,000$1,500$2,000+
$800
Step 3 of 5
04

Components & Preferences

// What matters most to you?

Step 4 of 5
05

Timeline & Delivery

// When do you need it?

📋 What Happens Next: Twilight Tech will review your request and send a custom parts list with pricing within 1–2 business days. No commitment required until you approve the build quote.
Step 5 of 5
🛠️
Build Request Received!

Your custom PC build request is in. Twilight Tech will review your specs and budget and send you a custom parts list and quote within 1–2 business days.

Email Us Directly →
// Contact

Let's Talk

Ready to get started, need a one-time service, or just want to understand your security posture? Whether you're a small business owner or a fellow security engineer — Twilight Tech is standing by.

📧
Email
twilighttech.builds@gmail.com
📍
Location
Atlanta, Georgia (Remote-First)
🕘
Business Hours
Mon–Fri, 9 AM – 6 PM EST
🚨
Emergency Support
Sentinel Plan Clients — 1hr Response
Send a Message