Skip to main content

Our Services


We provide a variety of consulting services to include: Cyber Compliance, Cyber Engineering, and Defensive Cyber Support.

 

Cyber Compliance


  •  - Risk Management Framework
  •  - NIST SP 800-800-53r4 and r5
  •  - Joint SAP Implementation Guide (JSIG)
  •  - DISA STIGs
  •  - eMASS and Xacta Administration
  •  - Assured Compliance Assmt. Solution (ACAS)
  •  - SCAP Compliance Checker (SCC)
  •  - Security Impact Assessments
  •  - Negotiation with Authorizing Officials
  •  - Patch Management
  •  - Log Analysis
  •  - Zero Trust
  •  - Body of Evidence Creation
  •  - ATO, IATT, ATC Submissions
  •  - Alignment of Cyber Requirements to RMF

Cyber Engineering


 - System Development Lifecycle (SDLC)

 - ERB/CCB Proposals

 - Cyber Architecture and Design

 - VMWare, Windows, and RHEL

 - Test Access Points (TAPs)/Aggregators

 - Intrusion Detection Systems (IDS)

 - Security Info and Event Manager (SIEM)

 - Ansible Automation Platform (AAP)

 - Trellix (Formerly McAfee EPO)

 - Cisco and Palo Alto Firewalls

 - Cross-Domain Solutions (CDS)

 - Cisco Identity Services Engine (ISE)

 - KG Network Encryptors

 - Highly Resilient Systems

 - Active Directory, DNS, LDAPS, GPOs

 
 

Defensive Cyber


 - SIEM Monitoring

 - Threat Hunting

 - Baseline Monitoring

 - Trend Analysis

 - Search for Indicators of Compromise (IoCs)

 - Risk Assessments

 - Incident Response

 - QoS Monitoring

 - Required Reporting

 - Threat Assessments

 - Vulnerability Assessments

 - Log Analysis

 - Packet Inspection

 - Data Correlation

 - CSSP Integration