Product & Services
Security Access, Audit & Administration
Security Access, Audit & Administration
- Information Assurance Policies and Procedures
- Identity and Access Management
- Cybersecurity framework
Cybersecurity & Network Operations
Cybersecurity & Network Operations
- NOC/SOC Support Services
- CONOPS; Monitor; Assess; Defend
- CloudSOC
- Incident Management
- Forensics
Security Threat Analysis & Data Protection
Security Threat Analysis & Data Protection
- Endpoint Detection and Response
- Network Traffic Analysis
- OSS Security Scanning and Software Composition Analysis
- Vulnerability Scan, Penetration Test, and Analysis
- Application and Database Security
- Insider Threat Analysis
Mobile Security
Mobile Security
- Device
- Data
- Incident Management
- Forensics
- Cloud utilization
Project Management Security
Project Management Security
- Planning and Tracking
- Establishing and Enforcing Network Security Policies and Procedures
- Opportunity and Risk Identification
- Regulating Access to Information
- Implementing Security Measures
- Training
Security & Risk Management Framework
Security & Risk Management Framework
- Identifying Risks
- Prioritizing Risks
- Mitigating Risks
- Aligning Risks and Strategy
- Cybersecurity Hygiene Training
Regulatory Compliance Assessment
Regulatory Compliance Assessment
- Security Controls Assessment & Validation
- Remediation
- Authority to Operate
- GDPR – General Data Protection Regulation
- FCPA – Foreign Corrupt Practices Act
- ITAR – International Traffic in Arms Regulations
Big Data
Big Data
- Cloud
- Protection / Data Security
- Encryption
- Backup and Restore
- De-duplication
- Optimized Performance and Storage
IT Program Management
IT Program Management
- Governance
- Management
- Financial Management
- Infrastructure
- Planning