Cybersecurity

Cyber and Insider Threat Subject Matter Experts

  • Incident Response

  • Data Collection, Aggregation Parsing, and Normalization

  • Data Analysis and Visualization

  • Data Analytic Experts with NetFlow, Syslog, SNMP, etc…

Image shows a person sitting at a keyboard and computer, where the person is wearing a hoodie, hiding their identity.

Certification and Accreditation

  • Risk Management Framework Experts

  • Vulnerability Threat Assessments

  • Penetration Testing

  • CISSP Certified Engineers

  • Certified Information System Auditors and Managers

Cyber Offense and Cyber Defense engineers

  • Information System and Network Security Engineering

  • Data Exploitation

  • Reverse Engineering

  • Software and Systems re-engineering

Image shows someone at a computer keyboard, superimposed is a virtual login screen with a lock symbol.

Boundary Security Subject Matter Experts

  • NextGen and Packet Filtering Firewalls

  • Cross Domain Solutions

  • Intrusions Detection Systems

  • Virtual Private Networking (VPN)

  • Device and OS Platform Hardening

  • Secure WAN and LAN Architecture and Management

  • Public Key Infrastructure (PKI)

  • Deployment and Configuration of Authentication Technologies (Biometric, Two-Factor, Radius, Active Directory)

Person at a keyboard of a laptop, superimposed is a set of virtual images showing different applications.