Cybersecurity
Cybersecurity (CY) demands are very fluid in the operational environment. New vulnerabilities and exploits are discovered and propagated daily. Customer directives prompt immediate changes to processes, production systems and documentation. We believe that the key to rapid response in dynamic operating environments is maintaining security management process discipline.
Our team has extensive CY experience to include Security Engineering, Deployment Support, Certification and Accreditation (C&A)/Authorization and Accreditation (A&A) for DoD, Vulnerability Management, Incident Response and Security Monitoring. We couple industry best-practices and internal procedures developed through accumulated lessons learned to form mature and responsive CY support.
In the DoD, we have demonstrated this by successfully accrediting and reaccrediting multiple systems with different architectures and configuration baselines concurrently in support of various programs. We use our expert security and systems knowledge, stakeholder communication, and impact analyses to rank and execute tasks. We review and revise priorities during scheduled or unscheduled meetings.
Highlights
- IT Security Testing – evaluating a computer systems’ security implementation through verification and validation
- Risk Assessment – performing both qualitative and quantitative risk estimates against a particular threat
- Technical Security Services – providing IT security during the life cycle of a system or network from initiation decommissioning
- Threat Response – capability to effectively identify and respond efficiently to intrusion attempts
- Anti-virus/Malware – capability to effectively identify and respond efficiently to intrusion attempts
- Disaster Recovery – providing protection plans, policies, and procedures that minimize the negative effects of a disaster whether natural or man-made to resume critical business operations and business continuity
- Network Security – provide protection of infrastructure components via firewalls, network intrusion detection systems, port security, etc.
- Application Security – provide protection of software assets from external malicious actors