Freetown, Sierra Leone

We build secure software, AI systems, and internal tools for organizations with serious technical requirements.

Core Brim Tech is a software engineering practice focused on security infrastructure, machine learning systems, and custom platforms. We work with institutions, development organizations, and enterprises that need reliable technology built to specification.

Recognized by security programs at

HackerOneBugcrowdNSAHuaweiIntigritiYesWeHackMINDEF SingaporeSanofiMediaMarktSaturn

Services

What We Deliver

Each engagement produces documented deliverables with clear handover processes.

Security Assessments
Infrastructure audits with prioritized remediation roadmaps. Deliverables include vulnerability reports, risk matrices, and implementation guidance.
Bug Bounty Consulting
Program setup, policy development, and ongoing vulnerability triage. We help organizations establish and manage responsible disclosure programs.
AI System Development
Custom LLM integrations, automation pipelines, and data processing systems. Built for production use with monitoring and maintenance documentation.
Web Application Audits
OWASP-aligned security testing with detailed findings and fix recommendations. Includes re-testing to verify remediation.
Technical Training
Hands-on training in penetration testing, secure coding, and security operations. Customized curriculum for your team's skill level.
Custom Platform Development
Internal tools, dashboards, and operational systems built to your specifications. Full documentation and knowledge transfer included.

Process

How We Work

Our approach is structured around clear deliverables and regular communication. We prioritize understanding your problem before building anything.

01

Problem Definition

We start by understanding your constraints, requirements, and existing systems. This includes technical audits, stakeholder interviews, and documentation review to define the actual problem before proposing solutions.

02

System Architecture

We design the technical architecture with clear boundaries, data flows, and integration points. You receive detailed specifications before any code is written, ensuring alignment on scope and approach.

03

Implementation

Development follows established engineering practices: version control, code review, testing, and documentation. We deliver working software in phases, with regular check-ins and demonstrated progress.

04

Deployment & Support

We handle deployment, monitoring setup, and handover documentation. Long-term maintenance agreements are available for systems that require ongoing security updates and operational support.

Selected Work

Systems We Have Built

Internal tools and pilot projects that demonstrate our engineering approach. These systems are in active use for security research and client work.

Internal Tool

AI Job Application System

Automated job search pipeline with structured data extraction, profile matching, and application tracking. Processes 500+ listings daily with 85% accuracy in relevance scoring.

PythonLLM IntegrationPostgreSQL
Security Tool

SecuriScan

Vulnerability scanner for web applications implementing automated OWASP Top 10 detection. Used internally for client assessments and bug bounty research.

PythonDockerREST API
Security Tool

Cloud Security Analyzer

Infrastructure assessment tool for AWS, Azure, and GCP environments. Generates compliance reports against CIS benchmarks with remediation guidance.

PythonCloud SDKsTerraform
Internal Tool

Reconnaissance Automation Platform

Automated asset discovery and reconnaissance for security research. Integrates subdomain enumeration, port scanning, and technology fingerprinting.

GoPostgreSQLQueue System
Pilot Project

Threat Detection System

Machine learning pipeline for log analysis and anomaly detection. Processes structured logs to identify patterns indicating potential security incidents.

PythonML PipelineElasticsearch
Internal Tool

Vulnerability Tracking Dashboard

Internal platform for managing vulnerability findings across engagements. Tracks remediation status, generates reports, and maintains audit trails.

Next.jsPostgreSQLAuth

Founder

Momodu Kamara-Kolleh

Security researcher and software engineer with verified contributions to bug bounty programs at HackerOne, Bugcrowd, NSA, Huawei, and other enterprise security platforms.

Background spans penetration testing, cloud security (AWS, Azure, GCP), full-stack development, and machine learning systems. Core Brim Tech was founded to bring engineering discipline to organizations in West Africa and globally that need secure, well-architected software.

Technical Background

Security ResearchPenetration Testing, Vulnerability Analysis
DevelopmentPython, TypeScript, React, Node.js
Cloud PlatformsAWS, Azure, GCP
AI/MLLLM Integration, Automation Systems
LocationFreetown, Sierra Leone
info@corebrimtech.com

Contact

Start a Conversation

Describe your technical requirements and we will respond within one business day. Initial consultations are free and focus on understanding your specific situation.

What to Expect

  • 1.We respond within 24 hours to acknowledge your message
  • 2.Initial call to discuss requirements and constraints (30-45 min)
  • 3.Written proposal with scope, timeline, and pricing within one week
  • 4.No obligation - we only proceed if there is a clear fit
Built with v0