Pyrrias Consulting Services Ltd, provides Intelligence led risk management solutions and is, together with our strategic partners, one of the leading providers of security management services to a variey of governmental agencies, multinational companies, non-governmental organizations (NGO’s) and VIP private clients.

Our aim is to personalize our services around the requirements of our clientele thereby offering them a seamless solution which puts their needs and requirements first at all times.

We are also able to offer our clients a discrete network of senior political and security risk analysts with direct knowledge of each country, its political and business elite, its macro-economic structure and the range of political and security risks that are likely to be encountered.
We specialize in finding practical solutions to political and security risk-management issues that strictly adheres to good corporate governance and the requirements of international regulatory authorities. Pyrrias has actively supplied personnel to various fields in the Security and Trade Industry in the Middle East and Africa. During the past several years, we have placed in excess of 2000 qualified personnel in Iraq, Afghanistan, Kuwait, Sudan, Somalia, Uganda and multiple other countries in the region.

Critical Infrastructure Security  

Airport/Aviation Security
Risk assessments
Basic Bomb Awareness
Incident Commanders (I.C.)
Emergency Control Officers (E.C.O.)
Explosive Ordinance Disposal (E.O.D.)
Improvised Explosive Device Disposal (I.E.D.D.)
VIP Protection Training
Offensive & Defensive Driving
Medical Training
Electronic & Specialized Surveillance
Health & Safety Officers
Loss Control Officers
Commercial & Specialized Diving
Interviewing & Interrogation
Nature Conservation Related Training


Systems upgrades for all platforms
Rapid Deployment Forces e.g. Motorcycle Infantry & Mounted Infantry
Survival Skills
Tracking Skills
Special Forces Training
Military Engineering Training
Mine Clearance
Quality Control
Quality Assurance
Mechanical Mine Clearance
Mine Detection Dogs & Handlers
Explosive Detection Dogs (Scent Dogs)
Tracker Dogs (Scent Dogs)
Narcotic Dogs (Scent Dogs)


Host Country site and project health risk and needs analysis
Scoping of appropriate medical services, including Emergency Medical evacuation capability
Turnkey medical facility infrastructure planning
Medical facility design
Design of Medical facility protocols, documentation and support procedures
Recruitment, training and induction of project medical staff
Management oversight and advise during construction and development phase
Sourcing and Procurement of Medical equipment and consumables
Equipment Commissioning

critical infrastructure - terrorist targets

train stations

Were a chemical agent attack to occur, authorities would instruct citizens to either seek shelter where they are and seal the premises or evacuate immediately. Exposure to chemical agents can be fatal.

Airport Terminals

Terrorists look for visible targets where they can avoid detection before or after an attack such as international airports, large cities, major international events, resorts, and high-profile landmarks.

oil and gas platforms

Attacking offshore oil and gas installations is not a new phenomenon. Philips Petroleum Company in Yarmouth, England, received three anonymous telephone calls with callers announcing that underwater charges with delayed‑action fuses had been attached to the legs of offshore production platforms in the Hewett field, some 20 miles to the east off Norfolk coast. Three platforms were evacuated immediately. A Royal Navy vessel, helicopters, and an expert diving team were dispatched. Two days later, it was concluded that the threat was a hoax, and normal production operations were resumed. The incident cost to the British taxpayers about USD $500,000.

cyber terrorism

Terrorists realize the benefits they can reap from using this technology. Equipped with a personal computer and an Internet connection, small players can level the playing field with their larger opponents in the “cyber arena.” Terrorists do not have to expend large resources on a global intelligence collection organization or match their opponents weapon-for-weapon on the battlefield to execute an operation. Terrorist groups can use cyber capabilities to assist them in planning and conducting their operations, and also to create destruction and turmoil by attacking critical infrastructures. Although many people believe terrorists only operate in the world of physical violence, many terrorist groups have well educated people and modern computer equipment to compete in cyberspace.

Kensington high street 219 - Kensington - London - W8 6BD - Tel +44(0)20 76177926 - Silent Circle +44 20 3695 5764

©Pyrrias Consulting Services Ltd 2015 - Design: HTML5 UP