We build secure software, AI systems, and internal tools for organizations with serious technical requirements.
Core Brim Tech is a software engineering practice focused on security infrastructure, machine learning systems, and custom platforms. We work with institutions, development organizations, and enterprises that need reliable technology built to specification.
Recognized by security programs at
Services
What We Deliver
Each engagement produces documented deliverables with clear handover processes.
Process
How We Work
Our approach is structured around clear deliverables and regular communication. We prioritize understanding your problem before building anything.
Problem Definition
We start by understanding your constraints, requirements, and existing systems. This includes technical audits, stakeholder interviews, and documentation review to define the actual problem before proposing solutions.
System Architecture
We design the technical architecture with clear boundaries, data flows, and integration points. You receive detailed specifications before any code is written, ensuring alignment on scope and approach.
Implementation
Development follows established engineering practices: version control, code review, testing, and documentation. We deliver working software in phases, with regular check-ins and demonstrated progress.
Deployment & Support
We handle deployment, monitoring setup, and handover documentation. Long-term maintenance agreements are available for systems that require ongoing security updates and operational support.
Selected Work
Systems We Have Built
Internal tools and pilot projects that demonstrate our engineering approach. These systems are in active use for security research and client work.
AI Job Application System
Automated job search pipeline with structured data extraction, profile matching, and application tracking. Processes 500+ listings daily with 85% accuracy in relevance scoring.
SecuriScan
Vulnerability scanner for web applications implementing automated OWASP Top 10 detection. Used internally for client assessments and bug bounty research.
Cloud Security Analyzer
Infrastructure assessment tool for AWS, Azure, and GCP environments. Generates compliance reports against CIS benchmarks with remediation guidance.
Reconnaissance Automation Platform
Automated asset discovery and reconnaissance for security research. Integrates subdomain enumeration, port scanning, and technology fingerprinting.
Threat Detection System
Machine learning pipeline for log analysis and anomaly detection. Processes structured logs to identify patterns indicating potential security incidents.
Vulnerability Tracking Dashboard
Internal platform for managing vulnerability findings across engagements. Tracks remediation status, generates reports, and maintains audit trails.
Founder
Momodu Kamara-Kolleh
Security researcher and software engineer with verified contributions to bug bounty programs at HackerOne, Bugcrowd, NSA, Huawei, and other enterprise security platforms.
Background spans penetration testing, cloud security (AWS, Azure, GCP), full-stack development, and machine learning systems. Core Brim Tech was founded to bring engineering discipline to organizations in West Africa and globally that need secure, well-architected software.
Technical Background
Contact
Start a Conversation
Describe your technical requirements and we will respond within one business day. Initial consultations are free and focus on understanding your specific situation.
What to Expect
- 1.We respond within 24 hours to acknowledge your message
- 2.Initial call to discuss requirements and constraints (30-45 min)
- 3.Written proposal with scope, timeline, and pricing within one week
- 4.No obligation - we only proceed if there is a clear fit